1. Policy Statement
Information technology resources are used by individual employees, students, and other persons affiliated with the Community College System of New Hampshire (CCSNH) and its Colleges. These resources are to be used for educational and business purposes in serving the interests of CCSNH and its Colleges. Misuse of information technology resources poses legal, privacy and security risks and therefore it is important for all users to understand the appropriate and acceptable use of such resources. Effective security and protection is a team effort. It is the responsibility of every user to know this policy, the standards contained herein, and to conduct their activities accordingly.
2. Policy Purpose
This policy establishes the proper use of CCSNH information technology resources and makes IT Users aware of what CCSNH deems as acceptable and unacceptable use.
3. Scope of Policy
This policy applies to employees, students and any other person who has access to CCSNH information technology resources including computers, email, Internet, social media, the network and any other CCSNH information technology or storage system (collectively “IT Users”). All IT Users are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with CCSNH policy and standards.
4. Privacy
CCSNH reserves the right to monitor, duplicate, record, and/or log all use of CCSNH technology resources with or without notice. This includes, but is not limited to, email, Internet access, file access, logins, and/or changes to access levels. IT Users shall have no expectation of privacy in the use of CCSNH technology resources.
5. General Use, Access and Ownership
- CCSNH Information Assets stored on electronic and computing devices, whether owned or leased by CCSNH, employees, students, or a third-party, remain the property of CCSNH. Computer and telecommunication equipment, software, operating systems, storage media, Intranet, network accounts providing electronic mail, Internet access and browsing, and related network systems, are the property of CCSNH. These systems are to be used for educational and business purposes serving the interests of CCSNH and its Colleges
Access to CCSNH technology resources is a privilege, not a right.
- CCSNH technology resources include, but are not limited to, computers, equipment, email, Wi-Fi, Internet access and browsing, Intranet, social media, telecommunications and network services, video network services, web services, software, applications, printing and scanning services, and user and technical support provided by Information Technology Staff. Accepting access to any CCSNH technology resource carries an associated expectation of responsible and acceptable use. Failure to meet the standards set forth herein or constitutes a violation of this policy and may result in disciplinary action up to and including termination or denial of access, termination of employment or, for students, dismissal from the College.
- IT Users may access, use and share CCSNH Information Assets only to the extent and for such purposes that access is authorized. This policy expressly prohibits accessing or attempting to obtain unauthorized access, supplying false or misleading information to access, and circumventing user authentication or security of any host, network or account. IT Users are prohibited from accessing data not intended for the IT User, logging into a server or account without express authorization, and probing the security of systems or networks without express authorization.
- An IT User’s access to technology is not transferable. Access privileges may not be shared with any other person.
- IT Users have a responsibility to promptly report the theft, loss or unauthorized disclosure of CCSNH Information Assets.
- CCSNH reserves the right to immediately, and without prior notice, disconnect any system or terminate any user access to protect the security of CCSNH technology resources, CCSNH Information Assets, and CCSNH IT Users.
6. Password Security and Protection
- Passwords are a critical component of information security. Passwords serve to protect user accounts; however, a poorly constructed password may result in the compromise of individual systems, data, or the network. CCSNH has established the following standards for password security and protection.
- IT Users should create passwords that: 3. IT Users should not create passwords that
- Contain at least 14 alphanumeric characters and not more than 64 alphanumeric characters.
- It can be a combination of any upper and lower case letters, numbers and special characters.
- It can be a phrase.
- IT Users should not create passwords that,
- Can be found in a dictionary, including foreign language, or exist in a language slang, dialect, or jargon.
- Contain personal information such as birthdates, addresses, phone numbers, or names of family members, pets, friends, and fantasy characters.
- Contain work-related information such as building names, system commands, sites, companies, hardware, or software.
- Contain number patterns such as aaabbb, qwerty, zyxwvuts, or 123321.
- Contain common words spelled backward or preceded or followed by a number (for example, terces, secret1 or 1secret).
- Are some version of “Welcome123” “Password123” “Changeme123”
- IT Users should not write passwords down or store them anywhere in their office or in a file on a computer system or mobile devices (phone, tablet) without encryption. Instead, IT Users should create passwords that can be remembered easily. One way to do this is to create a password based on a song title, affirmation, or other phrase. For example, the phrase, "This May Be One Way to Remember" could become the password TmB1w2R! or another variation.
- All system-level passwords (for example: root, enable, NT admin, application administration accounts, and soon) must be changed on at least a quarterly basis.
- All user-level passwords (for example: email, web, desktop computer, and so on) must be changed at least every twelve months. The recommended change interval is every four months.
- Passwords must not be shared with anyone, including administrative assistants, secretaries, managers, co-workers, and family members. All passwords are to be treated as sensitive, confidential CCSNH information.
- Passwords must not be inserted into email messages or other forms of electronic communication or saved using the "Remember Password" feature of applications (for example, Internet browsers). Any IT User suspecting that his/her password may have been compromised must report the incident and change all passwords.
7. Unacceptable Use
7.1 System and Network Activities
The following activities are strictly prohibited:
- Connecting computers or other devices directly to the CCSNH network that have not been registered with, or approved by, CCSNH.
- Installing software or hardware on or modifying the software or hardware configuration of a CCSNH-owned IT asset without appropriate authorization from CCSNH Chief Information Officer.
- Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including but not limited to, the installation or distribution of “pirated” or other software products that are not appropriately licensed for use by CCSNH.
- Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which CCSNH or the end user does not have an active license is strictly prohibited.
- Violation of federal, state or local laws and regulations regarding access and use of information resources (e.g., Family Education Rights and Privacy Act, Gramm-Leach-Bliley Act, Computer Fraud and Abuse Act, code of professional conduct, etc.).
- Except for Internet browsing, accessing data, a server or an account for any purpose other than CCSNH educational or business purposes, even if access is otherwise authorized, is prohibited.
- Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws, is illegal. The appropriate CCSNH official should be consulted prior to export of any material that is in question.
- Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, email bombs, etc.)
- Using a CCSNH technology resource to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws and policies.
- Effecting security breaches or disruptions of network communication.
- Security breaches include, but are not limited to, accessing data that the IT User is not an intended recipient of or logging into a server or account that the IT User is not expressly authorized to access. For purposes of this section, disruption includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes.
- Using any kind of program, script, or command designed to interfere with a user’s computer or network session or collect, use or distribute another user’s personal information.
- Port scanning, security scanning and executing any form of network monitoring that will intercept data not intended for the IT User’s host.
- Circumventing user authentication or security of any host, network or account.
- Introducing honeypots, honeynets, or similar technology on the CCSNH network.
- Interfering with or denying service to any user other than the IT User’s host (for example, denial of service attack).
- Providing information about, or lists of, CCSNH employees or students except as expressly authorized.
7.2 Email and Communication Activities
CCSNH faculty and staff must use their assigned CCSNH email address for all email communication to students and other official business of CCSNH and its Colleges. CCSNH faculty and staff shall not forward CCSNH email to personal email addresses.
When using CCSNH technology resources to access and use the Internet, users must realize that their communications may be viewed as representing CCSNH unless they clearly indicate otherwise.
The following activities are strictly prohibited:
- Sending unsolicited email messages including sending “junk mail,” chain letters, Ponzi or other pyramid schemes of any type, or other inappropriate use of email distribution lists.
- Any form of harassment via email, telephone or texting, whether through language, frequency, or size of messages.
- Unauthorized use, or forging, of email header information.
- Unauthorized use of CCSNH and its Colleges registered Internet domain names.
- Solicitation of email for any other email address, other than that of the sender’s account with the intent to harass or to collect replies.
7.3 Blogging and Social Media
- CCSNH employees who engage in blogging or use social media, whether using CCSNH’s technology resources or personal computer systems, should at all times be accurate, should exercise appropriate restraint, should show respect for the opinion of others, and should make every effort to indicate when the CCSNH employee is and is not an institutional spokesperson.
- When an employee is expressing his or her beliefs and/or opinions in blogs or social media, the employee may not, expressly or implicitly, represent themselves as a representative of CCSNH or its Colleges.
- The name, seal, images and other insignia of CCSNH or any of CCSNH’s Colleges shall not be used without the express written permission of CCSNH.
- CCSNH hosted web pages and blogs are not to be used for activities unrelated to the business purposes or educational mission of CCSNH or its Colleges without prior written authorization.
- CCSNH IT Users are prohibited from revealing any CCSNH confidential or proprietary information, trade secrets or any other Restricted Internal, Confidential or Private Information when engaged in blogging or use of social media.