This policy defines the boundaries of the acceptable use of SSC's computing and communication resources, including computers, networks, electronic mail services, electronic information ,sources 'and other communication resources.
The computing and communication resources are property of SSC and are to be used for the advancement of educational, research, service, community outreach and administrative purposes. The computing and communication resources are provided for the use of faculty, staff, currently enrolled students, and other properly authorized users. Access to computing and communication resources afforded to users will be terminated once user affiliation with SSC ends.
Users of SSC's computing and communication resources are required to comply with this policy, other applicable school policies, and local and national ,laws. When necessary, enforcement will be, consistent with other applicable policies, SSC administrative and academic policies and procedures.
Requirements and Prohibited Uses
Requirements for the Use of SSC Computing and Communications Resources
1. Users must comply with all applicable local and national laws and regulations, and with SSC policies.
2. Users must be truthful and accurate in personal and computer identification.
3. Users must respect the rights and privacy of others, including intellectual property rights and personal property rights.
4. Users must not 'compromise the integrity of electronic networks, must avoid restricted areas and must refrain from activities that may damage the network, or transmitted or stored data.
5. Users must maintain the security of accounts and are advised to protect and regularly change their account passwords. Individuals responsible for system administration are required to regularly change passwords to protect information and maintain security.
Prohibited Uses of SSC Computing and Communication Resources
1. Unlawful communications including threats of violence, obscenity, child pornography, and harassing communications are prohibited.
2. Use of SSC computing and communication resources for private business or commercial activities, fund raising or advertising for personal gains or for and in behalf of non-SSC organizations is prohibited.
3. Use of SSC computing and communication resources for personal, political or religious beliefs offensive to the Catholic Faith for which the Institution stands, is prohibited.
4. Unauthorized disposal or selling of SSC computing resources and information derived from the various information systems is prohibited.
5. Unauthorized use of School's trademarks and logos and other protected trademarks and logos is prohibited.
6. SSC home pages may link to commercial Web Sites, but any link that generates or has the potential to generate revenue to SSC or to any individual or company, including but not limited to click trade or banner advertising, is prohibited unless duly approved by the President's Office.
7. College department, office and unit Web sites may include links to commercial Web sites to provide information related to the mission or function of the college, department, office or unit. Any link that generates, or has the potential to generate revenue to the, college, department, office or unit is prohibited unless duly approved by the lT Office. All revenues are coursed to the Business Office for proper accounting.
8. Any alteration of addresses, uniform source locator (URL), or other action that masks the ssc.edu.ph domain as a host site is prohibited.
9. Unauthorized anonymous and pseudonymous communications are prohibited. All users are required to cooperate with appropriate SSC personnel or other authorized personnel when investigating the source of anonymous messages.
10. Misrepresenting or forging the identity of the sender or the source of an electronic communication is prohibited.
11. Unauthorized attempts to acquire and use passwords of others are prohibited.
12. Altering the content of a message originating from another person or computer with the intent to deceive is prohibited.
13. Unauthorized modification or deletion of any information stored in the various systems or computing resource is prohibited.
14. Use and access of SSC computer resources or electronic information without authorization or beyond one's level of authorization is prohibited.
15. Allowing access to SSC computing resources to individuals not affiliated with SSC without the approval of the President's Office is prohibited.
16. Interception or attempted interception of communications by parties not authorized or intended to receive them is prohibited.
17. Intentionally or recklessly compromising the privacy or security of electronic information is prohibited.
18. Infringing up an the copyright, trademark, patent, or other intellectual property rights of others in computer programs or electronic information (including plagiarism and unauthorized use or reproduction) is prohibited. The unauthorized staring, copying or use of audio files, images, graphics, computer software, data sets, bibliographic records and other protected property is prohibited except as permitted by law.
19. Interference with or disruption of the computer or network accounts services or equipment of others is prohibited. The intentional, propagation, of computer "worms" and "viruses", the sending of electronic chain mail and inappropriate ,"broadcasting" of messages to large numbers of individuals or hosts are prohibited.
20. Revealing passwords or otherwise permitting the use by others (by intent or negligence) of personal accounts for computers and network access without authorization is prohibited.
21. Altering or attempting to alter files or systems without authorization is prohibited.
22. Unauthorized network scanning for purposes of looking for security vulnerabilities is prohibited.
23. Attempting to alter any SSC computing or networking component (including, but not limited to bridges, routers, and hubs) without approval or beyond one's level of authorization is prohibited.
24. Wiring, including attempts to create network connections, or any extension or retransmission of any computer or network service unless approved by IT network administrator is prohibited.
25. Negligent or intentional conduct leading to disruption of electronic networks or information systems is prohibited.
26. Negligent or intentional conduct leading to the damage of SSC electronic information, computing and/or networking equipment, and resources is prohibited:
Information Posted to SSC Computer or Web Pages
Restriction on Use of SSC Web Pages
SSC Web pages may be used only for SSC business and only authorized individuals may modify or post materials to these pages. No other Web pages or sites may wholly or partly suggest that they are School' s Web pages or sites. If confusion is possible, pages should contain a disclaimer and links to SSC sites.
Responsibilities of Individuals Posting Materials
By posting materials and using SSC computing facilities, the user represents that he or she has created the materials or that he or she has the right to post or use the materials. The storage, posting, or transmission of materials must not violate the rights of any third person including copyright, trademark, patent, trade secrets, and any rights of publicity or privacy of any person. The materials posted must not be defamatory, libelous, slanderous or obscene.
Prohibition against Commercial Use
The site may not be used for unauthorized commercial purposes.
Control of SSC Web Pages
The use of the site is at the sole discretion of SSC. SSC does not guarantee that the user will have continued or uninterrupted access to the site. The site may be removed or discontinued at any time at the discretion of SSC in accordance with SSC policy, or as needed to maintain the continued operation or integrity of SSC facilities.
Electronic Mail and Electronic Communications
Conditions for Restriction of Access to Electronic Mail
Access to SSC's e-mail is a privilege that may be wholly or partially restricted without prior notice and without consent of the user:
1. If required by applicable law or policy;
2. If a reasonable suspicion exists that there has been or may be a violation of law, regulation or policy; or,
3. If required to protect the integrity or operation of the e-mail system or computing resources or when the resources are required for-more critical tasks as determined by appropriate management authority.
Access to the e-mail system requires endorsement for final approval of the appropriate SSC supervisory or management authority (e.g. Unit/Department Head, Office Administrator, etc.). The ITO Head will have final approval on matters . related to access to email system. Any decision of the ITO Head can be appealed to the School President.
Condition for Permitting Inspection, Monitoring, or Disclosure
SSC may permit the inspection, monitoring, or disclosure of e-mail, computer files, and network transmissions when:
1. Required or permitted by law, including public records law, or by subpoena or court order;
2. SSC ITO Head may designated an agent if he/she reasonably believes that a violation of law or policy has occurred; or,
3. Necessary to monitor and preserve the functioning and integrity of the e-mail system or related computer systems or facilities.
All computer users agree to cooperate and comply with SSC-IT requests for access to and copies of e-mail messages or data when access or disclosure is authorized by this Policy or required or allowed by law or other applicable policies.
SSC Responsibility to Inform of User Unauthorized Access or Disclosure
If SSC believes unauthorized access to or disclosure of information has occurred or will occur, SSC will make reasonable efforts to inform the affected computer account holder, except when notification is impractical or, when notification would be detrimental to an investigation of a violation of law or policy.
Prohibition against Activities Placing Strain on Facilities
Activities that may strain the e-mail, or network facilities more than can be reasonably expected are in violation of this policy. These activities include, but are not limited to: sending chain letters; "spam," or the widespread dissemination of unsolicited e-mail; and "letter bombs" to resend the same e-mail repeatedly to one or more recipients.
Confidentiality of e-mail and other network transmissions cannot be assured. Therefore all users should exercise caution when sending personal, financial, confidential, or sensitive information by e-mail or over the network.
Privacy and Security
Routine Logging and Monitoring
Certain central service and network activities from workstations connected to the network are routinely logged and monitored. These activities include:
1. Use of passwords and accounts accessed;
2. Time and duration of network activity;
3. Access to Web pages;
4. Access to network software;
5. Volume of data storage and transfers; and
5. Server space used for e-mail.
Detailed Session Logging
In cases of suspected violations of SSC policies, especially unauthorized access to computing systems; the lTO Head may authorize detailed session logging. This may involve a complete keystroke log of an entire session. In addition, the ITO Head upon approval from SSC President may authorize limited searching of user files to gather evidence on a suspected violation.
Responsibility for Data Security
Software and physical limitations, computer viruses, and third party intrusions can compromise security of data storage and communications. SSC takes reasonable precautions to minimize risk. Users in charge of the various information systems must protect and back up critical data. Individual users and departments should develop policies to ensure regular backups of data and implement steps to ensure that all critical data is compatible with all current generations of computing equipment, storage, media arid media readers.
Restriction of Access to Sensitive Data
All SSC departments should implement policies to ensure that access to sensitive data is restricted only to those employees who have a need to access the information. Passwords restricting access to information should be changed on a regular basis and systems should be developed and implemented to assure appropriate supervisors regularly update password records.
Right to Examine Computers and Equipment
SSC-owned computers and equipment may be examined to detect illegal software and to evaluate the security of the network.
Violations and Enforcement
Any actual or suspected violation of the rules listed above should be brought to the Unit Head/Office Administrator of the equipment or facility most directly involved. In the case of a serious violation, a report may be made to the Office of the Director, Information Technology Office.
SSC Response to a Reported Violation
Upon receiving notice of a violation, SSC-lTO may temporarily suspend the user's privileges or move or delete the allegedly offending material pending further proceedings. A person accused of a violation will be notified of the charge and will have an opportunity to respond (due process) before SSC imposes a permanent sanction. Appropriate cases will be referred to the SSC President for referral to the disciplinary authority appropriate to the violator's status or to appropriate law enforcement authorities.
In addition to sanctions available under applicable laws and SSC policies, SSC may impose a temporary or permanent reduction or elimination of access privileges to computing and communication accounts, networks and other SSC services or facilities.
If SSC believes it necessary to preserve the integrity of facilities, user services, or data, it may temporarily suspend any account, whether or not the account user is suspected of any violation. SSC will provide appropriate notice to the account user. Servers and computers that threaten the security of School systems will be removed from the network and allowed to reconnect only with the approval of the network administration.
Applicable Laws and Policies
All applicable laws and SSC policies bind SSC students and employees.
E-Mail Access and Use Policy
The purpose of this policy is to define the governing rules in the use pf the e-mail facility. SSC provides all faculty, staff and students access to basic e-mail. This e-mail service is intended to improve and enhance productivity in the institution specifically for the advancement of educational, research, service, community outreach and administrative purposes.
Prohibited Uses of E-mail
This e-mail service is intended to improve and enhance productivity in the institution. The use of e-mail services must conform to the prohibitions as outlined in the following:
1. The e-mail facility must not be used for personal gains or purposes;
2. It must not interfere with the user's work time or job activities;
3. Discrimination or harassment on the basis of age, race, color, gender, creed, marital status, national origin; disability or sexual orientation is prohibited;
4. An expression regarding personal political or religious beliefs offensive to the Catholic faith to which the Institution stands is prohibited;
5. An expression of rumors or gossip about any individual or group of individuals is prohibited;
6. Any language and subject matter that is objectionable, offensive, obscene, threatening, or otherwise inappropriate is prohibited;
7. Any communication to solicit for or promote commercial ventures, political causes, outside organizations or other on-the-job related solicitations is prohibited;
8. Any deviation from pertinent policies as laid out in the SSC Acceptable Use Policy is prohibited.
Any violations of the provisions on E-Mail Use and Access Policy, SSC Acceptable Use Policy, other School policies and local and national laws are subject to the appropriate penalties as provided far in the policies and laws concerned.
This policy is deemed enforced once the SSC E-mail account has been issued to the party requesting it.
The primary office that will oversee the implementation of this policy would be the Information Technology Office (lTO). A department under the Office of President. If there are questions or concerns relating to this policy please refer the issues to the ITO Head with a copy to the Office of the President.
Clients agree that it shall defend, indemnify, save and hold SSC and its related companies and individuals entirely harmless from any and all demands, liabilities, loses, costs and claims, including reasonable attorney's asserted against SSC, its customers, officers and employees, that may arise or result from any services provided or performed or agreed to be performed. Clients agree to defend, indemnify and hold harmless SSC against liabilities arising out of:
1. any injury to person or property caused by any products or services sold or distributed from SSC servers;
2. any material supplied by customer infringing or allegedly infringing on the proprietary rights of the third party;
3. copy right infringement; and
4. any materials that libels or allegedly libels a third party available from SSC's servers.
SSC does not guarantee that our services will be uninterrupted and will not be held liable for any claims resulting from the use or the inability to use SSC's Hosting services - including but not limited to, loss of data resulting from delays, non-deliveries, wrong delivery, and any and all service interruptions caused by SSC server and its employees, Internet connectivity problems, unauthorized access to SSC servers, domain name registrar problems, DNS caching, Internet bandwidth congestion, power failures, and natural disasters. SSC reserves the right to revise its policies at any time.