By Using IT systems on Newbold College campus you automatically agree to abide by the policy outlined below:


This policy sets forth standards for responsible and acceptable use of College information technology (IT) resources. These resources include computer systems, applications, networks, software, and files. IT resources are provided to support the academic, research, instructional, and administrative objectives of the College. These resources are extended for the sole use of College faculty, staff, students, and all other authorized guests to accomplish tasks related to the status of that individual at the College, and consistent with the College’s mission.


 Those using College IT resources, whether at the College or elsewhere, are responsible for complying with security standards set forth by the Senior Leadership Team and IT Manager, safeguarding identification codes and passwords, and for using them solely for their intended

purposes. Individuals are solely responsible for their personal use of IT resources and are prohibited from representing or implying that statements related to such use constitute the views or policies of the College.


The following provisions describe conduct prohibited under this policy:

1. Altering system software or hardware configurations without authorization; disrupting or interfering with the delivery or administration of IT resources.

2. Attempting to access or accessing another's accounts, private files, e-mail messages, or intercepting network communication without the owner's permission except as appropriate to your job duties and in accordance with legitimate College purposes.

3. Misrepresenting oneself as another individual in electronic communication.


4. Installing, copying, distributing, or using digital content (including software, music, text, images, and video) in violation of copyright and/or software agreements and state law.

5. Engaging in conduct that interferes with others’ use of shared IT resources.

6. Using College IT resources for commercial or profit making purposes or to represent the interests of groups unaffiliated with the College or not associated with the normal professional activities of faculty, staff or students without written authorization from the College.

7. Ignoring individual departmental system policies, procedures, and protocols.

8. Facilitating access to College IT resources by unauthorized users.


9. Exposing sensitive or confidential information or disclosing any electronic information that one does not have the authority to disclose.

10. Knowingly using IT resources for illegal activities. Criminal or illegal use may include obscenity, child pornography, threats, harassment, copyright infringement, College trademark infringement, defamation, theft, identity theft, and unauthorized access.

11. The maintenance, operation, and security of IT resources require responsible College personnel to monitor and access systems and networks. Unauthorized maintenance/alteration is prohibited and any issues with equipment should be reported to the IT Department of the College.



Violation of the provisions of this policy constitutes unacceptable use of IT resources, and may violate other College policies and/or state law. Known or suspected violations should be reported to the Office of Information Technology (This email address is being protected from spambots. You need JavaScript enabled to view it.). If possible, reports should include a copy of any non-sensitive information relevant to the putative violation. Violations will be acted upon by the appropriate College authorities and/or law enforcement agencies. Violations may result in the restriction or revocation of access to IT resources; faculty, staff, or student disciplinary action; academic dishonesty proceedings through the Academic Committee; or legal action.


 The IT Manager or designee may suspend, block, relocate to a secure location, or restrict access to information and network resources when necessary to protect the integrity, security, or functionality of College IT resources or to protect the College from liability. Notice of such action will be provided to the designated security contact for the affected unit.


Consistent with other College policies, this policy is subject to change an update as needed based on the recommendations of the Senior Leadership Team and IT Manager of the Newbold College.