INTERalliance of Greater Cincinnati

ACCEPTABLE USE OF INFORMATION TECHNOLOGY RESOURCES

Last Updated: February 2024

This policy covers the acceptable use of Information Technology resources, including INTERalliance laptops and network, both by the INTERalliance Leadership Council and by attendees of INTERalliance events like TechOlympics.

A. REASON FOR POLICY

A trusted and effective information technology environment (“IT environment”) is vital to the mission of the INTERalliance of Greater Cincinnati (“INTERalliance”). To that end, the INTERalliance provides an IT environment which includes an array of computer hardware, electronic systems, computing services, networks, databases, and other resources (collectively, “IT Resources” or “Resources”). These Resources are intended to support the educational and work activities of members of the INTERalliance’s academic community and their external collaborators, support the operations of the INTERalliance, provide access to services of the INTERalliance and other publicly available information, and ensure a safe and secure IT operating environment to all members of the INTERalliance community.

This policy is intended to define and promote the responsible use of information technology at the INTERalliance while simultaneously limiting and preventing abuse of IT resources. Access to and usage of IT Resources entails certain expectations and responsibilities for both users and managers of the IT environment. This policy applies to all users of INTERalliance technology resources (“Users”), regardless of affiliation and irrespective of whether these resources are accessed from the INTERalliance office, an event venue, or from remote locations. Users covered by the policy include (but are not limited to) students, staff, teachers, sponsors, speakers, and any other guests of the INTERalliance.

Access to IT Resources is a privilege granted by the INTERalliance and must be treated as such by all Users of these systems. Effective security is a team effort involving the participation and support of every INTERalliance student, faculty, staff, retiree, non-employee associate, and guest of the INTERalliance who interacts with IT resources. It is the responsibility of every User to read and understand the terms of this Policy and to conduct their activities accordingly.

The purpose of this Policy is to protect the INTERalliance community. Inappropriate use of IT resources exposes the INTERalliance to risks including cyber security attacks, compromise of IT resources, and legal issues.

B. POLICY

1. Appropriate Uses

INTERalliance provides IT Resources during its events for use during workshops and competitions at TechOlympics and for use by the INTERalliance Leadership Council. Examples of acceptable uses are:

2. Individual Responsibilities

Incidental Personal Use

The INTERalliance allows incidental personal use of IT Resources. Such use must not consume significant IT resources, interfere with other users’ access to resources, be excessive as determined by management, or otherwise violate any federal or state laws, or any INTERalliance policies or codes of conduct.

Incidental personal use that inaccurately creates the appearance that the INTERalliance is endorsing, supporting, or affiliated with any organization, product, service, statement, or position is prohibited.

Users who make incidental personal use of IT resources do so at their own risk. The INTERalliance cannot guarantee the security or continued operation of any IT resource or the security of any personal data.

If personal use adversely affects or conflicts with INTERalliance operations or activities, the individual will be asked to cease those activities and may be subject to disciplinary actions.

Individual Responsibilities

When an individual accesses INTERalliance computing services and accepts any INTERalliance issued online account, they agree to comply with this Policy and all other related policies. All members of the INTERalliance community are responsible for familiarizing themselves with all applicable policies prior to use. The INTERalliance requires Users to engage in “safe computing” practices, such as establishing appropriate access restrictions for their accounts, setting strong passwords and guarding those passwords, keeping their personal operating systems and software applications up-to-date and patched and employing security measures on their personal devices. Users are responsible to prevent others from obtaining physical access to their IT resources and ensuring that electronic and paper files in their care are safeguarded.

Bring Your Own Device (BYOD)

Users connecting personal devices to IT resources must abide by the following requirements:

When using IT resources or third-party owned resources, Users must comply with all applicable federal, state and local laws. These include laws of general application, such as libel, copyright, trademark, privacy, obscenity, and export control, for instance, the Millennium Copyright Act (DMCA) as well as laws that are specific to computers and communication systems, such as the Computer Fraud and Abuse Act (CFAA) the Federal anti-hacking statute that prohibits unauthorized access to computers and the Electronic Communications Privacy Act (ECPA).

Users must not utilize IT resources to violate copyright, patent, trademark, other intellectual property rights, engage in plagiarism, or illegally download or share files. Upon formal notification or due to detection, IT must take down or otherwise block access to the infringing material. Users must also comply with applicable INTERalliance policies, and the terms of any contract or license which governs the use of the third-party resource and by which the Individual or the INTERalliance is bound.

Unauthorized Use

Users will not engage in unauthorized use of IT resources. Users will use only computers, computer accounts and data for which they have authorization. Examples of activities that violate these Terms include, without limitation, the following.

Use of Enterprise Tools

The INTERalliance purchases and maintains enterprise collaboration, social media, learning, research, and other technology platforms. Faculty and staff should leverage these enterprise tools available to them in the INTERalliance technology ecosystem. The use of enterprise tools reduces the risk to the INTERalliance and increases compliance with INTERalliance policies, procedures, standards and guidelines, and applicable regulatory requirements.

3. INTERalliance Rights and Responsibilities

The INTERalliance reserves the right to access, monitor, and disclose the contents and activity of an individual User on any INTERalliance IT resources and any personal device connected to or interfering with INTERalliance IT resources. Such actions may be taken at the institutional or local level and may include, but are not limited to, scanning, sanitizing, or monitoring stored data, network traffic, usage patterns and other uses of IT Resources. It may also include blocking unauthorized access to and unauthorized uses of its networks, systems, and data. This action may be taken for any reasonable cause, including, without limitation, the following:

Users who violate the Policy may be subject to disciplinary action handled through the INTERalliance’s normal student and employee disciplinary procedures.

C. DEFINITIONS

Users: All individuals that have access to INTERalliance’s IT Resources, including but not limited to all students, full time and adjunct faculty, staff, retirees, non-employee associates and guests using INTERalliance IT Resources, whether on or off site.

IT Resources: Includes an array of institutional electronic systems, computing services, networks, databases, and other resources (collectively, “IT Resources” or “Resources”). Sensitive INTERalliance Data: Sensitive INTERalliance Data is defined as documents or data whose loss, misuse, or unauthorized access can adversely affect the privacy or welfare of an individual or the INTERalliance, including information protected by privacy regulations and data classification policies.

Digital Millennium Copyright Act (DMCA):sets forth a general prohibition on circumvention of technological measures that control access to a digital work even if the resulting use of the work would otherwise be fair use.

Misuse: Technology or Data not used as intended based on policy, legal compliance or as defined in the Unauthorized Use or BYOD section.

D. PROCEDURES

Reporting and Enforcement

An individual’s access to IT Resources may be limited, suspended, or terminated without warning if that individual violates this or any other INTERalliance policy. Alleged or suspected violations of this policy will be addressed by the INTERalliance Central Ofice. Violations of INTERalliance policies governing the acceptable use of IT Resources may result in action against the User.

The INTERalliance Central Office and Tech Team reserves the right to remove or disconnect any device from IT Resources if such device negatively impacts, or has the potential to negatively impact, INTERalliance operations as determined by the INTERalliance Teech Team.

Investigations of information technology systems or services misuse is limited only to the INTERalliance IT Team or the INTERalliance Central Office. In addition to its own administrative review of possible violations of this policy and other INTERalliance policies, the INTERalliance is obligated to report certain uses of IT resources to law enforcement agencies. If an investigation involving review of the content of a faculty member, staff member or student’s files is required, authorization will be obtained from the INTERalliance Central Office. Disciplinary action for violation of this policy is handled through the INTERalliance’s normal student and employee disciplinary procedures.

Technical Issues

For technical issues send a request to the INTERalliance Tech Team at tech@INTERalliance.org.

Grievances

Grievances for decisions made regarding this policy should be sent to the Executive Director.

DISCLAIMER

The INTERalliance is not responsible for the content on websites or social media pages, other than the official web pages (https://INTERalliance.org and subdomains, https://TechOlympics.org) and our official social media pages. Such unofficial websites may include unmoderated public forums containing the personal opinions and expressions which do not represent the opinions or expressions of INTERalliance. The content of these unofficial websites and any links posted to third-party websites are not screened, approved, reviewed, or endorsed by the INTERalliance or any entity affiliated with the INTERalliance. The text and other material on the unofficial websites reflect the opinion of the specific author and are not statements of advice, opinion, or information of the INTERalliance. No one may use INTERalliance web pages for fundraising or advertising for commercial or non- commercial organizations, except for INTERalliance partners and the events of INTERalliance partners in compliance with policies governing these activities.

NOTIFICATION OF POLICY CHANGES

The INTERalliance of Greater Cincinnati reserves the right to change the Policy on Acceptable Use of IT Resources at any time. Such changes will be posted on the INTERalliance website (www.INTERalliance.org) and will become effective upon posting.

REVIEW CYCLE

This policy will be periodically reviewed and updated as appropriate.