Skip to:

IT Acceptable Uses (formerly G-054) : 1.08.05.00

Policy/Guideline Area

Governance, Organization, and General Policies

Applicable Divisions

TCATs, Community Colleges, System Office, Board Members

Purpose

The objectives of this policy include: 1) to articulate the rights and responsibilities of persons using information technology resources owned, leased, or administered by the Tennessee Board of Regents (TBR) and member institutions; 2) to protect the interests of users and the TBR and its member institutions; and 3) to facilitate the efficient operation of TBR and institutional information technology systems.

Definitions

  • Information technology resources or IT resources - include computers and computer time, data processing or storage functions, computer systems and services, servers, networks, printers and other input/output and connecting devices, and related computer records, programs, software, and documentation.
  • Institutions - shall mean the TBR Community Colleges and Tennessee Colleges of Applied Technology.
  • Personal or private for-profit use - shall mean a use of TBR information technology resources which has as a primary objective of financial gain for the user. Activities by a student which are typical of the student job search process (e.g. use of campus e-mail to contact potential employers or posting of one's resume on the institution's website, if allowed under institutional policies and procedures) are not to be considered personal or private for-profit uses.
  • Public record - means all documents, papers, letters, maps, books, photographs, microfilms, electronic data processing files and output, films, sound recordings, or other material, regardless of physical form or characteristics made or received pursuant to law or ordinance or in connection with the transaction of official business by any governmental agency. T.C.A. § 10-7- 301(6) I.

Policy/Guideline

  1. User Responsibilities
    1. The following lists of user responsibilities are intended to be illustrative, and not exhaustive.
      1. Access
        1. Users shall obtain proper authorization before using TBR or institutional information technology resources.
        2. Users shall not use TBR or institutional information technology resources for purposes beyond those for which they are authorized.
        3. Users shall not share access credentials.
        4. Users shall not use TBR or institutional information technology resources in an attempt to access any information technology resources external to the TBR or institution when that access is not authorized by the system's owner.
      2. Respect for others
        1. A user shall not attempt to obstruct usage or deny access to other users.
        2. Users shall not transmit or distribute material that would be in violation of existing TBR or institutional policies or guidelines using TBR or institutional information technology resources.
        3. Users shall respect the privacy of other users, and specifically shall not read, delete, copy, or modify another user's data, information, files, e-mail or programs (collectively, "electronic files") without prior authorization.
        4. Users should note that there should be no expectation of privacy or data retention for electronic files stored on a computer available for general public access.
        5. Users shall not intentionally introduce any program or data intended to disrupt normal operations into TBR or institutional information technology resources.
        6. Forgery or attempted forgery of e-mail messages is prohibited.
        7. Sending or attempts to send unsolicited junk mail or chain letters is prohibited.
        8. Flooding or attempts to flood a user's mailbox is prohibited.
      3. Respect for State-owned property
        1. A user shall not intentionally, recklessly, or negligently misuse, damage or vandalize TBR or institutional information technology resources.
        2. A user shall not attempt to modify TBR or institutional information technology resources without authorization.
        3. A user shall not circumvent or attempt to circumvent normal resource limits, logon procedures, or security regulations.
        4. A user shall not use TBR information technology resources for purposes other than those for which they were intended or authorized.
        5. A user shall not use TBR or institutional information technology resources for any private or personal for-profit activity.
        6. Except for those not-for-profit business activities which are directly related to an employee's job responsibilities or which are directly related to an organization which is affiliated with the Institution, a user shall not use TBR information technology resources for any not-for-profit business activities, unless authorized by the President or designee.
        7. Users shall at all times endeavor to use TBR or institutional information technology resources in an efficient and productive manner, and shall specifically avoid excessive game playing, printing excessive copies of documents, files, data, or programs; or attempting to crash or tie-up computer resources.
      4. Additional Responsibilities of Employees and Independent Contractors
        1. Users who are Employees or Independent Contractors shall not make use of TBR or institutional information technology resources for purposes which do not conform to the goals and mission of the TBR or institution and to the user’s job duties and responsibilities.
        2. Users shall not use TBR or institutional information technology resources for solicitation for religious or political causes.
  2. Digital/Electronic Signatures and Transactions
    1. The Tennessee Board of Regents and its institutions must comply with the Tennessee Uniform Electronic Transactions Act (T.C.A. § 47-10-101 et seq.). This Act permits the use of electronic signatures and electronic transactions under certain circumstances.
      1. In order to be legally enforceable, an electronic signature must meet the following two criteria.
        1. An electronic signature must be attributable (or traceable) to a person who has the intent to sign the record or contract with the use of adequate security and authentication measures that are contained in the method of capturing the electronic transaction (e.g., use of personal identification number or personal log-in identification username and password). (T.C.A. § 47-10- 109) (If Public Key Infrastructure, “PKI” technology is to be used in the creation of the digital signature, contact TBR Chief Information Officer prior to implementation.)
        2. The recipient of the transaction must be able to print or store the electronic record of the transaction at the time of receipt. (T.C.A. § 47-10- 109)
      2. The use of electronic/digital signatures in compliance with state and federal laws is permitted.
  3. No Unlawful Uses Permitted
    1. Users shall not engage in unlawful uses of the information technology system resources of the TBR or institution.
    2. Unlawful activities are violations of this policy. Persons engaging in these activities may be subject to civil and/or criminal penalties.
    3. This list of unlawful activities is illustrative and not intended to be exhaustive.
      1. Obscene Materials
        1. The distribution and display of obscene materials is prohibited by the laws of Tennessee (see T.C.A. § 39-17-902). Obscene materials are defined under Tennessee law (see T.C.A. § 39-17-901(10)).
        2. Federal law (18U.S.C.2252) prohibits the distribution across state lines of child pornography.
      2. Defamation
        1. Defamation is a civil tort which occurs when one, without privilege, publishes a false and defamatory statement which damage the reputation of another.
      3. Violation of Copyright
        1. Federal law gives the holder of copyright five exclusive rights, including the right to exclude others from reproducing the copyrighted work.
        2. Sanctions for violation of copyright can be very substantial. Beyond the threat of legally imposed sanctions, violation of copyright is an unethical appropriation of the fruits of another's labor.
        3. Pursuant to the Digital Millennium Copyright Act of 1998, the TBR or institutional designated agent for receipt of complaints of copyright infringement occurring with the use of TBR or institutional information technology resources is the TBR Chief Information Officer or designee.
        4. The TBR or institutional agent shall develop and maintain a guideline regarding receipt and disposition of complaints of copyright infringement.
        5. The Institutions are authorized to designate agents to serve their specific campus. The TBR and institutional Chief Information Officer shall be promptly informed of complaints received by such Institutional DMCA agents.
      4. Gambling
        1. Gambling, including that performed with the aid of the Internet, is prohibited under Tennessee state law (see T.C.A. § 39-17-502).
  4. World Wide Web Home Pages
    1. The principles of use articulated above in Sections I. and III. are generally applicable to World Wide Web home pages.
      1. For example, use of TBR or institutional information technology resources to post a web page for personal or private for-profit use is prohibited under Section I.A.3.e. Illegal content in web pages stored on TBR IT resources is prohibited under Section I.A.2.b. Obscene content is prohibited under Section III.C.1. Incorporation of copyrighted material, without either permission of the copyright holder or under a lawful exemption, is prohibited under Section III.C.3.
      2. In addition to the principles of use outlined in Sections I. and III., users may not incorporate into web pages or other electronic documents the trademarks or logos of others without express, written permission.
      3. Persons who are not employees of an Institution may not make use of Institutional trademarks or logos without express, written permission.
      4. Institutions are authorized to develop policies and regulations regarding use of Institutional trademarks on the Institution's website by employees.
      5. The Institution Presidents are authorized to designate persons (e.g. campus web master) who may approve a proposed use of the Institution's trademarks and logos by employees on Institutional web pages.
  5. Advertising
    1. Use of TBR or institutional information technology resources to promote or advertise activities or entities which are not related to the Institution is prohibited, unless such use is consistent with the mission of the Institution and results in substantial benefit to the Institution.
    2. The President of each TBR Institution is authorized to determine whether a given use is consistent with the mission of the Institution and results in substantial benefit to the Institution, consistent with other TBR policies/guidelines.
    3. Sale of advertising in web-based versions of Institution-affiliated student publications is specifically permitted.
  6. TBR Monitoring and Inspection of Electronic Records
    1. Electronic records sent, received, or stored on computers owned, leased, or administered by the TBR is the property of the Tennessee Board of Regents.
    2. As the property of the TBR, the content of such records, including electronic mail, is subject to inspection by TBR personnel.
    3. While the TBR does not routinely do so, the TBR reserves the right to monitor and/or log all network activity of users without notice, including all email and Internet communications.
    4. Users should have no reasonable expectation of privacy in the use of these resources.
  7. Disclosure of Electronic Records
    1. Pursuant to T.C.A. § 10-7-101 et sq., and subject to exemptions contained therein, electronic files (including email correspondence) may be subject to public inspection upon request by a citizen of the State of Tennessee, if they are:
      1. Generated or received by TBR or institutional employees, and
      2. Either owned or controlled by the State, or
      3. Maintained using TBR or institutional IT resources.
    2. TBR or institutional personnel receiving such a request for public inspection should refer the request to the President, or designee, of their Institution.
    3. Institutions may charge reasonable fees for making copies of such records, pursuant to T.C.A. § 10-7-506.
    4. While disclosure under T.C.A. § 10-7-101 et sq. applies to employees, disclosure of the electronic records of all users which are maintained using TBR or institutional IT resources may be made pursuant to a valid subpoena or court order, when otherwise required by federal, state or local law, or when authorized by the President of the Institution.
  8. Retention of Electronic Records
    1. Electronic records needed to support Institutional functions must be retained, managed, and made accessible in record-keeping or filing systems in accordance with established records disposition authorizations approved by the Public Records Commission and in accordance with TBR Policy 1.12.01.00, Records Retention and Disposal.
    2. Each employee of the TBR, with the assistance of his or her supervisor as needed, is responsible for ascertaining the disposition requirements for those electronic records in his or her custody.
    3. The system administrator is not responsible for meeting the record retention requirements established under T.C.A. § 10-7-101 et sq., and the TBR, as owner of electronic records stored on TBR computers, reserves the right to periodically purge electronic records, including email messages.
    4. Users who are either required to retain an electronic record, or who otherwise wish to maintain an electronic record should either:
      1. Print and store a paper copy of the record in the relevant subject matter file; or
      2. Electronically store the record on a storage medium or in an electronic storage location not subject to unannounced deletion.
  9. Violation of this Policy
    1. Reporting Allegation of Violations
      1. Persons who have reason to suspect a violation of this policy, or who have direct knowledge of behavior in violation of this policy should report that allegation of violation to the Institution President or designee.
    2. Disciplinary Procedures
      1. Allegations of violation of this policy shall be referred by the President or designee to the appropriate person(s) for disciplinary action.
      2. If a student, the policy violation will be referred to the judicial officer of the institution under TBR Policy 3.02.00.01.
      3. If an employee, the policy violation will be referred to the immediate supervisor.
      4. If there is a policy violation, which the designee believes rises to the level of a serious violation of this or any other TBR policy; the designee is authorized to temporarily revoke access privileges. In those cases, the revocation of access must be reviewed by the appropriate disciplinary authority for review and final determination of access privileges. In such cases the authorization of the designee carries with it the authorization to make subjective judgments, such as whether material or statements violate TBR Policy/Guideline.
    3. Sanctions
      1. Persons violating this policy are subject to revocation or suspension of access privileges to TBR or institutional IT resources.
      2. Additionally other penalties, as outlined in TBR Policy 3.02.00.01 may be imposed upon student users.
      3. Sanctions for violation of this policy by employees may extend to termination of employment. Violations of law may be referred for criminal or civil action.
    4. Appeals
      1. Sanctions imposed upon students at a TBR institution and imposed at the discretion of the President or designee, may be appealed through the appropriate process per TBR and/or institutional policy.
      2. Other sanctions may be appealed under established Institution procedure.

Sources

Authority

T.C.A. § 49-8-203; All federal and state statutes, codes, and regulations noticed in this policy

History

NEW Guideline approved at Presidents Meeting February 21, 2017; Revised and changed to policy at Special Called Meeting May 14, 2019.