FERPA / en Information Technology Acceptable Use Policy /policy/information-technology-acceptable-use-policy <span class="field field--name-title field--type-string field--label-hidden">Information Technology Acceptable Use Policy</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>reedc</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2023-03-13T15:33:01-04:00" title="Monday, March 13, 2023 - 15:33" class="datetime">Mon, 03/13/2023 - 15:33</time> </span> <div class="field field--name-field-policy-image-media field--type-entity-reference field--label-hidden field__item"><div class="media media--type-image media--view-mode-policy-image"> <div class="field field--name-field-media-image field--type-image field--label-visually_hidden"> <div class="field__label visually-hidden">Image</div> <div class="field__item"> <img loading="lazy" src="/sites/default/files/styles/policy_page_logo/public/images/geneseo-and-suny-logo_0.png?itok=JceXUryZ" width="300" height="100" alt class="img-fluid image-style-policy-page-logo"> </div> </div> </div> </div> <div class="field field--name-field-policy-number field--type-string field--label-hidden field__item">1-021</div> <div class="field field--name-field-policy-approved-by field--type-string field--label-hidden field__item">Cabinet</div> <div class="field field--name-field-policy-effective-date field--type-datetime field--label-hidden field__item">08-01-1989</div> <div class="field field--name-field-policy-date-last-revised field--type-datetime field--label-hidden field__item">10-21-2025</div> <div> <div>Category</div> <div>General College</div> </div> <div class="field field--name-field-policy-responsible-office field--type-string field--label-hidden field__item">Computing and Information Technology </div> <div class="field field--name-field-responsible-office-number field--type-telephone field--label-hidden field__item"><a href="tel:585-245-5577">585-245-5577</a></div> <div class="clearfix text-formatted field field--name-field-policy-scope field--type-text-long field--label-hidden field__item"><p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy applies to all individuals who access, use, or manage 好色先生鈥檚 information technology (IT) resources, regardless of location, device ownership, or employment status. This includes, but is not limited to:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Faculty, staff, and students.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Retirees with extended access.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Contractors, consultants, and vendors.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Volunteers, affiliates, and visitors.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Third-party service providers with access to 好色先生 systems.</span></li> </ul> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Covered IT resources include all college-owned or managed:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Computing devices (e.g., desktops, laptops, tablets, mobile phones).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Network infrastructure (e.g., wired and wireless networks, VPN).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Software and applications (e.g., licensed software, cloud services, AI tools).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Cloud storage platforms (e.g., Google Drive, Microsoft OneDrive, SharePoint).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Learning Management Systems (e.g., Brightspace).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Data and storage systems (e.g., institutional data, backups, shared drives).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Communication platforms (e.g., email, messaging systems, listservs).</span></li> </ul> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy applies to all use of 好色先生 IT resources, whether on campus or remotely. All users are expected to comply with this policy and related institutional policies, procedures, and applicable laws.</span></p> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">好色先生 provides information technology resources to support its academic, research, administrative, and outreach missions. These resources include computing systems, networks, software, data, and communication platforms that are essential to the daily operations of the college.</span></p> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy establishes expectations for the responsible and ethical use of IT resources by all members of the campus community. It is designed to protect the integrity, security, and availability of institutional systems and data, ensure compliance with applicable laws and regulations, and promote a respectful and inclusive digital environment.</span></p> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users of 好色先生鈥檚 IT resources are expected to:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Use resources in a manner consistent with the college鈥檚 mission and values.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Respect the rights and privacy of others.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Protect institutional data and systems from unauthorized access or misuse.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Handle institutional data in accordance with 好色先生鈥檚 </span><a href="/policy/data-classification-and-protection-policy"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Data Classification and Protection policy</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">, which define levels of sensitivity and appropriate safeguards.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Comply with all relevant policies, including those related to data classification, listserv management, and copyright.</span></li> </ul> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy applies regardless of device ownership or location of access, including use of personal devices and remote connections.</span></p> </div> <div class="field field--name-field-policy-definitions field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/taxonomy/term/2438" hreflang="en">Computing Resources</a></div> <div class="field__item"><a href="/taxonomy/term/425" hreflang="en">FERPA</a></div> <div class="field__item"><a href="/taxonomy/term/2439" hreflang="en">Mass Digital Communications</a></div> <div class="field__item"><a href="/taxonomy/term/2440" hreflang="en">Multi-Factor Authentication (MFA)</a></div> <div class="field__item"><a href="/taxonomy/term/3455" hreflang="en">Data Classification</a></div> </div> <div class="clearfix text-formatted field field--name-field-policy field--type-text-long field--label-hidden field__item"><h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Acceptable Use</span></h3> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">Computing resources at 好色先生 are provided for educational and business purposes. As a convenience to the 好色先生 user community, limited incidental personal use of computing resources is permitted. Examples of acceptable incidental personal use include checking personal email, reading news, or briefly browsing non-work-related websites. Such use must not be illegal, interfere with job responsibilities, or compromise the integrity or availability of 好色先生 IT systems. Faculty and staff are responsible for exercising good judgment about personal use in accordance with 好色先生 and SUNY policies and ethical standards for state officers and employees. State officers and employees are expected to pursue a course of conduct that maintains public trust.</span></p> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">Use of AI tools (e.g., Copilot, Gemini) is permitted when aligned with institutional goals and data protection standards. These tools may be used for productivity, learning, or research, but must not be used to circumvent academic integrity or handle sensitive data.</span></p> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users may utilize cloud services such as Google Workspace and Microsoft 365 OneDrive and SharePoint provided their use complies with institutional guidelines and data protection policies.</span></p> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">All digital communications conducted through 好色先生 IT resources must be respectful, professional, and consistent with 好色先生鈥檚 mission and values.</span></p> <h3 style="line-height:21.0pt;margin-bottom:2.25pt;margin-left:0in;margin-right:0in;margin-top:9.75pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Unacceptable Use</span></h3> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">The following activities are prohibited when using 好色先生鈥檚 computing resources. These examples represent violations of institutional policy, compromise security, or conflict with the college鈥檚 mission and values.</span></p> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Unauthorized Access and Sharing</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Accessing systems, accounts, or data without proper authorization.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Sharing college-provided devices (e.g., laptops, desktops, tablets) with others, including family members or roommates.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using another person鈥檚 好色先生 credentials or allowing others to use your own.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using former system privileges after your association with 好色先生 has ended.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Confidential Data on Personal Devices</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Accessing or storing confidential institutional data on personally owned devices.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using personal cloud accounts or email services to transmit or store confidential college data.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Malicious or Illegal Activity</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Uploading, downloading, or distributing illegal content, including pirated software or media.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Engaging in phishing, malware distribution, or other forms of cyberattack.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Attempting to circumvent security controls or exploit system vulnerabilities.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using packet sniffers, keystroke loggers, or similar tools without authorization.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Harassment and Abuse</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using IT resources to harass, threaten, impersonate, or deceive others.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Sending messages or posting content that is discriminatory, abusive, or violates campus conduct policies.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Disruption of Services</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Running bots, scripts, or programs that interfere with normal system operations or monopolize shared resources.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Intentionally or recklessly interfering with 好色先生鈥檚 network infrastructure (e.g., wired, wireless, VPN) or transmitting unauthorized signals.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Performing Denial of Service (DoS) attacks or similar actions intended to render services inaccessible to other authorized users.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Circumvention and Misrepresentation</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Falsifying identity or using aliases to avoid accountability.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Attempting to bypass monitoring, logging, or usage restrictions.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Sending messages or printing files that do not show the correct username of the user performing the operation.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Abuse of Incidental Personal Use</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using 好色先生 IT resources for personal financial gain or commercial ventures not affiliated with the college.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using IT resources for personal activities that are illegal, interfere with work responsibilities, result in measurable cost to the college, or conflict with 好色先生鈥檚 nonprofit status.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;"><strong>Wasteful Use of Resources</strong></span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span class="citation-58" style="font-family:&quot;Aptos&quot;,sans-serif;">Excessive or non-essential&nbsp;</span><a href="https://www.suny.edu/sunypp/documents.cfm?doc_id=890"><span style="font-family:&quot;Aptos&quot;,sans-serif;">printing</span></a><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;">&nbsp;</span><span class="citation-58" style="font-family:&quot;Aptos&quot;,sans-serif;">of documents without a legitimate academic or business purpose.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Excessive consumption of computing capacity for non-institutional purposes, such as cryptocurrency mining or running endless/repetitive computations.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Excessive consumption of storage capacity for non-institutional purposes, such as bulk personal data or photo storage.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Monopolizing shared resources, such as holding public computers or shared devices for extended periods when others are waiting.</span></li> </ul> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Mass Digital Communications</span></h3> <p style="line-height:115%;margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Mass digital communications at 好色先生&nbsp;鈥攕uch as email listservs, bulk messaging platforms, or shared distribution lists鈥 are intended solely to communicate important information regarding academic, college, and student business to students, faculty, and staff.&nbsp;These communications should be relevant to the intended audience, respectful in tone, and consistent with 好色先生鈥檚 mission and values.</span></p> <p style="line-height:115%;margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Unsolicited mass communications are not permitted. This policy must not be circumvented by sending multiple messages to smaller populations. Opt-in mailing lists for projects, student organizations, or external groups can use&nbsp;</span><a href="https://geneseo.atlassian.net/wiki/spaces/HELP/pages/76778708/Google+Workspace+at+好色先生"><span style="color:#345290;font-family:&quot;Aptos&quot;,sans-serif;">Google Workspace @ 好色先生</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">. Centrally managed&nbsp;</span><a href="https://geneseo.atlassian.net/wiki/spaces/HELP/pages/76779945/Mailing+List+General+Information"><span style="color:#345290;font-family:&quot;Aptos&quot;,sans-serif;">好色先生 mailing lists</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">&nbsp;are restricted to messages that meet their purpose.</span></p> <p style="line-height:115%;margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">All use of listservs must follow the&nbsp;</span><a href="/policy/listserv-management"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Listserv Management Policy</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">, which outlines approval processes, audience targeting, and appropriate content standards.</span></p> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Use of AI and Emerging Technologies</span></h3> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">好色先生 recognizes the growing role of artificial intelligence (AI) and emerging technologies in education, research, and administrative work.&nbsp;</span></p> <h4><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;"><strong>Permitted Use</strong></span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">AI tools (e.g., Copilot, Gemini, ChatGPT) may be used for tasks such as drafting content, summarizing information, generating ideas, or automating routine processes.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Use must align with institutional goals and comply with applicable laws, policies, and ethical standards.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users must be aware of potential bias in AI-generated content and exercise critical judgment when using these tools for decision-making or communication.</span></li> </ul> <h4><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;"><strong>Prohibited or Restricted Use</strong></span></h4> <ul style="list-style-type:disc;"> <li style="color:#424242;tab-stops:list .5in;"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">AI tools must not be used to process, store, or transmit institutional data classified as Sensitive or Confidential unless explicitly approved and protected under enterprise agreements.</span></li> <li style="color:#424242;tab-stops:list .5in;"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">Use of AI to circumvent academic integrity, impersonate individuals, or generate misleading or harmful content is strictly prohibited. Users should follow academic integrity guidelines as outlined by their instructors and the&nbsp;</span><a href="/tlc/resources-generative-ai-classroom"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">Teaching and Learning Center鈥檚 guidance on generative AI</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">.</span></li> </ul> <h4><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;"><strong>User Responsibilities</strong></span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users must verify the accuracy of AI-generated content before relying on it for official or academic purposes.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users are responsible for ensuring that AI use complies with copyright, licensing, and data protection requirements.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">好色先生 provides access to enterprise AI tools such as Microsoft Copilot, which include enhanced data protection and integrations with other supported services. Users are encouraged to use institutionally provisioned tools when available and avoid using commercial platforms that may not meet institutional data protection standards. Questions about appropriate use of AI tools should be directed to the Office of the CIO.</span></li> </ul> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Security, Privacy, and Monitoring</span></h3> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">好色先生 retains ownership of all institutional computing resources and reserves the right to monitor, access, or inspect their use when necessary. While the College does not routinely monitor individual usage, users should not expect privacy when using 好色先生 IT systems.</span></p> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Monitoring or inspection may occur under the following circumstances:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">To maintain system integrity, security, or performance.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">To investigate suspected policy violations or illegal activity.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">To comply with legal obligations, including subpoenas, FOIL requests, or litigation.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">When an account exhibits unusual, excessive, or malicious activity.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">When a user has voluntarily made content publicly accessible.</span></li> </ul> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">The College may also monitor or inspect the activity of individual users of college computing resources, including individual login sessions and the content of individual communications, or delete user content that is not required to be kept by retention policy without notice or permission. Retention requirements are governed by&nbsp;</span><a href="https://system.suny.edu/compliance/records/records-retention/records-retention-schedule/#stateop"><span style="font-family:&quot;Aptos&quot;,sans-serif;">SUNY鈥檚 Records Retention Schedule</span></a><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;">.</span></p> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Routine IT operations may involve:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Backups of data and communications.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Logging of activity and usage patterns.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">System diagnostics and performance monitoring.</span></li> </ul> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users must respect the privacy of others. Unauthorized access to another user鈥檚 files, email, or account is prohibited. Any attempt to circumvent security controls or exploit vulnerabilities to gain access to private information is a violation of this policy.</span></p> <p>&nbsp;</p> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Roles and Security Responsibilities</span></h3> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Effective implementation of this policy requires shared responsibility across the campus community. All users and designated roles must follow secure computing practices and comply with institutional policies and applicable laws.</span></p> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">End Users</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">All individuals who access 好色先生 IT resources are responsible for:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using resources in accordance with this policy and related institutional policies.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Protecting their credentials and devices.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Enabling Multi-Factor Authentication (MFA) and using strong passphrases.</span></li> <li style="color:#424242;tab-stops:list .5in;"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">Reporting suspected security incidents or policy violations using the&nbsp;</span><a href="https://go.geneseo.edu/securityincidentform"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">Security Incident Report Form</span></a><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Respecting the privacy and rights of others.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Complying with applicable local, state, and federal laws, including copyright,</span><ins cite="mailto:Amy%20Sheldon" datetime="2025-10-21T12:54"><span style="font-family:&quot;Aptos&quot;,sans-serif;">&nbsp;</span></ins><span style="font-family:&quot;Aptos&quot;,sans-serif;">data protection, FERPA, HIPAA, and Payment Card Industry regulations.</span></li> </ul> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">Supervisors and Department Heads</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Responsible for:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Ensuring their teams understand and comply with this policy.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Supporting secure practices within their departments.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Coordinating with CIT on access needs and incident response.</span></li> </ul> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">Account Managers</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Designated individuals responsible for managing generic accounts (e.g., departmental, club, or initiative accounts) must:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Ensure accounts are used appropriately and securely.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Maintain accountability for all activity under the account.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Update access permissions as roles change.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Ensure compliance with institutional security standards.</span></li> </ul> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">Computing &amp; Information Technology (CIT)</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Responsible for:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Maintaining and securing 好色先生鈥檚 IT infrastructure and systems.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Monitoring performance, usage, and security across institutional platforms.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Investigating incidents, enforcing policy violations, and coordinating response efforts.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Developing and maintaining IT and security policies, standards, and procedures.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Advising on data protection, compliance, and risk mitigation strategies.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Supporting users with secure computing practices and technology guidance.</span></li> </ul> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">Data Stewards</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Individuals responsible for specific institutional data sets must:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Classify and protect data in accordance with the Data Classification and Protection policy, ensuring appropriate safeguards based on sensitivity level.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Ensure appropriate access controls are in place.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Collaborate with CIT on data governance.</span></li> </ul> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Policy Violations and Enforcement</span></h3> <p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Violations of this policy include any activities outlined in the 鈥淯nacceptable Use鈥 section, as well as other actions that compromise the integrity, security, or availability of 好色先生鈥檚 IT resources. Reports of suspected violations may be submitted through a supervisor, the Office of the CIO, the CIT Help Desk, or via the&nbsp;</span><a href="https://go.geneseo.edu/securityincidentform"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Security Incident Report Form</span></a><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;">.</span></p> <p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users who violate this policy may be denied access to college computing resources and may be subject to disciplinary action, including expulsion or dismissal. Alleged violations will be handled through applicable college disciplinary procedures.</span></p> <p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">CIT may suspend, block, or restrict access to accounts when necessary to protect system integrity or prevent further unauthorized activity. Suspected violations of law may be referred to law enforcement.</span></p> <p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users are expected to cooperate fully in investigations. CIT may coordinate with campus offices such as the Dean of Students, Human Resources, and University Police. During investigations, CIT may suspend access to computing facilities for involved users.</span></p> </div> <div class="clearfix text-formatted field field--name-field-frequency-review-update field--type-text-long field--label-hidden field__item"><p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy will be reviewed every 3 years by CIT, in consultation with relevant campus stakeholders. Interim updates may be made as needed to reflect changes in technology, legal requirements, or institutional priorities.</span></p> </div> <div class="field field--name-field-periodic-review-completed field--type-datetime field--label-hidden field__item">10-21-2025</div> <div class="field field--name-field-policy-signed-by field--type-string field--label-hidden field__item">Paul Jackson</div> <div class="field field--name-field-name-title field--type-string field--label-hidden field__item">CIO and Director, CIT</div> <div class="field field--name-field-policy-date-signed field--type-datetime field--label-hidden field__item">10-21-2025</div> Mon, 13 Mar 2023 19:33:01 +0000 reedc 149672 at Social Security Number Policy /policy/social-security-number-policy <span class="field field--name-title field--type-string field--label-hidden">Social Security Number Policy</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>Anonymous (not verified)</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2019-09-30T11:24:35-04:00" title="Monday, September 30, 2019 - 11:24" class="datetime">Mon, 09/30/2019 - 11:24</time> </span> <div class="field field--name-field-policy-image-media field--type-entity-reference field--label-hidden field__item"><div class="media media--type-image media--view-mode-policy-image"> <div class="field field--name-field-media-image field--type-image field--label-visually_hidden"> <div class="field__label visually-hidden">Image</div> <div class="field__item"> <img loading="lazy" src="/sites/default/files/styles/policy_page_logo/public/images/geneseo-and-suny-logo_0.png?itok=JceXUryZ" width="300" height="100" alt class="img-fluid image-style-policy-page-logo"> </div> </div> </div> </div> <div class="field field--name-field-policy-number field--type-string field--label-hidden field__item">1-020</div> <div class="field field--name-field-policy-approved-by field--type-string field--label-hidden field__item">Cabinet</div> <div class="field field--name-field-policy-effective-date field--type-datetime field--label-hidden field__item">01-01-2009</div> <div class="field field--name-field-policy-date-last-revised field--type-datetime field--label-hidden field__item">08-29-2025</div> <div> <div>Category</div> <div>General College</div> </div> <div class="field field--name-field-policy-responsible-office field--type-string field--label-hidden field__item">Chief Information Officer</div> <div class="field field--name-field-responsible-office-number field--type-telephone field--label-hidden field__item"><a href="tel:585-245-5577">585-245-5577</a></div> <div class="clearfix text-formatted field field--name-field-policy-scope field--type-text-long field--label-hidden field__item"><p>This policy applies to all departments, faculty, staff, and students at the College. Social Security Numbers are highly confidential and legally protected data. 好色先生 is committed to protecting the privacy and legal rights of its community members and to protecting community members from identity theft, one of the fastest-growing crimes.</p> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The purpose of this policy is to:</p> <ol> <li>To protect the privacy and legal rights of the members of the College community.</li> <li>To generate broad awareness of the confidential nature of the Social Security Number.</li> <li>To reduce the use of the Social Security Number (including partial SSN) for identification purposes.</li> <li>To promote confidence by students and employees that Social Security Numbers are handled in a confidential manner.</li> </ol> </div> <div class="field field--name-field-policy-definitions field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/taxonomy/term/424" hreflang="en">Federal Privacy Act of 1974</a></div> <div class="field__item"><a href="/taxonomy/term/425" hreflang="en">FERPA</a></div> <div class="field__item"><a href="/taxonomy/term/426" hreflang="en">NY State Law: Chapter 16, Article 1, Title 1, Section 2b</a></div> <div class="field__item"><a href="/taxonomy/term/427" hreflang="en">NY State Information Security Breach and Notification Act</a></div> <div class="field__item"><a href="/taxonomy/term/428" hreflang="en">Social Security Number</a></div> </div> <div class="clearfix text-formatted field field--name-field-policy field--type-text-long field--label-hidden field__item"><p>It is the policy at 好色先生 that the use of the Social Security Number be restricted, except where required for approved processes, including employment, financial aid, and a limited number of other business transactions.</p> <p>Disclosure statements will be provided whenever a Social Security Number is requested, in compliance with the Federal Privacy Act of 1974.</p> <ol> <li>Control and approval of the use of Social Security Number in any electronic system or form is assigned to the Information Security Program team. Social Security Numbers should be collected only for the purpose of processing student loans, employment, enrollment and to meet other legal obligations. The collection, use, and dissemination of student SSNs or any part thereof for other purposes is strongly discouraged. For SSN access in Banner, a director or department head must submit a Banner Social Security Number Access Request Form. To request approval to use SSN on any other electronic system or to request SSN on a form (electronic or paper), a director or department head must submit a <a href="https://docs.google.com/forms/d/e/1FAIpQLSdn3_aWnnwBcJUVQj_snG40qT9IdNMr2ZJ9SQZXHYzhRH0aMA/viewform" media_library="Media Library">Social Security Number Request to Use Form</a>.</li> <li>好色先生 or SUNY ID Numbers shall be used to identify, track, and service individuals associated with the College.</li> <li>All forms on which persons are required to provide Social Security Numbers must contain or have appended to them a statement explaining the College request; e.g., the legal obligation on which the request is based, if there is one and the use that will be made of the Social Security Number. <ul> <li>For example, on an employment form, the following text can be used: <em>The Federal Privacy Act of 1974 requires that you be notified that disclosure of your Social Security Number is required pursuant to the Internal Revenue Service Code. The Social Security Number is required to verify your identity</em>.</li> <li>If a Social Security Number is requested, but not required, it should be clearly stated that providing it is voluntary.</li> <li>If the Social Security Number is not mandated by law, but is needed for a business purpose, e.g., in the early stages of the admissions process (e.g., to match standardized test scores such as SATs, ACTs, etc.), a disclosure statement of the following form may be used: <em>The Federal Privacy Act of 1974 requires that you be notified that disclosure of your Social Security Number is not mandated by law, however, the College uses your Social Security Number to match your application credentials correctly and quickly</em>. <ul> <li>Except where the College is legally required to collect a Social Security Number, individuals will not be required to provide their Social Security Number, verbally or in writing, at any <em>point of service</em>, nor will they be denied access to those services should they refuse to provide a Social Security Number. However, individuals may volunteer their Social Security Number, if they wish, if the primary means for identification is unavailable.</li> <li>Social Security Numbers will be stored as a confidential attribute associated with an individual. They will be used as allowed and mandated by law.</li> <li>Social Security Numbers will not be publicly displayed on any list or roster.</li> <li>Encryption of Social Security Numbers is required between server and client workstations and whenever data are transmitted over public unsecured networks. Web applications transmitting SSN must use encryption. Email must be encrypted if transmitting SSN over email is unavoidable.</li> <li>Paper and electronic documents containing Social Security Numbers will be handled, used, and disposed of in a proper fashion. Proper disposal is defined as any method that shreds the record before the disposal of the record; or destroys the personal identifying information contained in the record; or modifies the record to make the personal identifying information unreadable; or takes actions consistent with commonly accepted industry practices to ensure that no unauthorized person will have access to the personal identifying information contained in the record. For more information on handling private information, view&nbsp;<a href="http://www.geneseo.edu/info_security/best_practices" media_library="Media Library"><em>Information Security Best Practices</em></a>&nbsp;document.</li> <li>Records or reports containing SSNs or other confidential information will not be downloaded or stored on College or personal computers or other electronic devices that are not secured against unauthorized access. Devices storing SSN or confidential information must be encrypted.</li> <li>Social Security Numbers will be released by the College to entities outside the College only as allowed by law, when the individual grants permission, when the external entity is acting as the College鈥檚 contractor or agent and adequate security measures are in place to prevent unauthorized dissemination to third parties or when Legal Counsel has approved the release.</li> <li>Social Security Number breaches must be immediately reported to the <a href="/info_security/team" media_library="Media Library">Chair of the Information Security Program Team</a> directly or by completing the <a href="https://docs.google.com/forms/d/e/1FAIpQLSdMJE4rsGy7Y5uZqxp8nf6d8O9HEBBbC-etOsZ4PAWnDadT8A/viewform" media_library="Media Library">Information Security Incident Reporting Form</a>.</li> </ul> </li> </ul> </li> </ol> <h2>Compliance</h2> <p>An employee or student who has substantially breached the confidentiality of Social Security Numbers will be subject to disciplinary action or sanctions up to and including discharge and dismissal in accordance with College policy and procedures.</p> <p>Violation may also result in criminal prosecution. It is a felony, punishable by up to 5 years in prison, to compel a person to provide a Social Security Number in violation of Federal Law.</p> </div> <div class="clearfix text-formatted field field--name-field-frequency-review-update field--type-text-long field--label-hidden field__item"><p>Every 3 years</p> </div> <div class="field field--name-field-periodic-review-completed field--type-datetime field--label-hidden field__item">08-29-2025</div> <div class="field field--name-field-policy-signed-by field--type-string field--label-hidden field__item">Paul Jackson</div> <div class="field field--name-field-name-title field--type-string field--label-hidden field__item">CIO &amp; Director, CIT</div> <div class="field field--name-field-policy-date-signed field--type-datetime field--label-hidden field__item">08-29-2025</div> Mon, 30 Sep 2019 15:24:35 +0000 Anonymous 87341 at