Campus Computing & Networking provides general and technical information services to support the Rio Grande faculty, staff, students, and affiliates.
Delivering advanced voice & data services to our customers is our primary focus.
It is our goal to support the campus technology needs of the university stakeholders with effective professional services enabling the faculty, staff, and students to achieve their goals. Our responsibilities include: Campus Network Infrastructure, Network Security, Internet Connectivity, Desktop Computing, Computer Lab Management, Server Virtualization, Operating system, Software Deployment, Phones & Voicemail.
Acceptable & Ethical Use of Technology Resources Policy
University of Rio Grande
Rio Grande Community College
Acceptable & Ethical Use of Technology Resources Policy
– Board Approved (summer 97) –
Statement of Intent
It is the express intent of the University of Rio Grande and Rio Grande Community college to promote the responsible use of computing resources in support of the primary educational and academic missions of these entities. It is furthermore the express intent of the University of Rio Grande and Rio Grande Community College to adhere to the provisions of state and federal laws concerning use of computers, installation and/or use of software, copyrights, and information access, and to promote responsible academic activities within these boundaries.
Campus Technology resources at the University of Rio Grande and Rio Grande Community College (URGRGCC) are essential and indispensable tools for learning, research and administration. It is the policy of the University that its computing, telecommunications, video, and associated network facilities be used ethically and legally, in accord with applicable licenses and contracts, and according to their intended use in support of the University’s mission.
Any use that would impede teaching and research, hinder the functioning of the University, violate an applicable license or contract, violate a state or federal law, or damage community relations or relations with institutions with whom we share responsibility, is a violation of this policy.
Violation of this policy may result in suspension of privileges to access the information technology involved, initiation of University disciplinary procedures or, in extreme cases, criminal prosecution under federal or state law.
Please refer any questions about this policy or its applicability to a particular situation to the Vice President Technology and Long Range Planning.
To these ends the following ethical guidelines have been developed.
Ethical Use of Campus Technology Resources
Campus computing, networking, media and technology resources are provided for the use of University students, faculty, and staff in support of the programs of the University. Most people use these resources in an ethical and responsible manner. However, as with many shared resources, it is possible that misuse, either accidental or willful, can seriously disrupt the work of others. The guidelines below are provided to increase your awareness of the issues involved.
Campus Technology Resources
(CTR) include, but are not limited to, terminals, computers, computer peripherals, communication devices, telephones and telecommunications equipment, fax machines, computer data networks, video equipment and video networks, photocopying machines, computer software, supporting documentation, supplies, storage media, support facilities and energy sources. Computer systems are limited to those leased, rented, owned by, or loaned to the University.
Campus Technology Services
(CTS) consist of Management Information Systems (administrative computing), Campus Computing and Network Services, Instructional Media Center, and telecommunications services. An example of these “other services” is an external network infrastructure such as the Internet or an audio visual instructional network connecting partnering institutions.
Electronic Information (Information)
(EI) includes all material stored in or moved by electronic information technology systems including, but not limited to data, records, files, data bases, electronic mail, text, digital images, video images, digital sounds, voice mail, discussion group postings, electronic bulletin board discussions, software, programs, codes and electronic procedures.
User Authentication Codes
(UAC) are any form of information used to authenticate, secure or control electronic information technology systems. This includes, but is not limited to, logon ID’s, passwords, keys, and account numbers.
Campus Technology Services Administrator
(CTSA) is the person responsible for the administration and use policy for a particular portion of Campus Technology Resources. The Campus Technology Resource environment is a collection of separately administered and often interconnected Campus Technology Resources. For example, one portion might be a departmental local area network, including local servers, printers, etc. connected to a University backbone network. A portion might also be shared central computers, the telecommunications network or the campus-wide video network. The campus-wide data network provides dial-in access and access to external national and international data networks.
The CTSA will often delegate specific responsibilities to designated individuals. A portion might be a departmental local area network, including local servers, printers, etc. connected to a University backbone network. In this case the delegated individual responsible might be the department or division head or school chairperson.
The CTSA for the campus-wide data network, the telecommunications network, the campus- wide video network and MIS computing is the Vice-Provost for Technology and Long-Range Planning.
Departmental Technology Coordinator
(DTC) Departments or Schools may appoint a coordinator of technology services for the purpose of autonomy and/or responsiveness to local needs. By necessity, this individual needs to be in close communications with the CTSA and the persons responsible for Campus Technology Services and have expertise with the technologies involved. The DTC may employ the assistance of Lab Coordinators and/or other student labor resources to extend the management and supervision of localized technology services.
Technology Services – Organizational Structure
Campus Technology Services Administrator (CTSA)
Management Information Systems(MIS)
Campus Computing and Networking Services(CCNS)
Instructional Media Center(IMC)
Media Center Staff
Out-Sourced to a Vendor or Campus Staff
Departmental Technology Coordinator(DTC)
Department Head School Chair Delegated Person(s)
1. Campus Technology Resource (CTR) Ethics
Access to Campus Technology Resources is a privilege that is granted by the University and comes with a responsibility to respect the rights of other users and the rights of the University. To do otherwise is unethical. Issues concerning ownership and privacy of Information are addressed in the attached University Conditions of Use of Campus Technology Resources statement. If you will not abide by the University Conditions of Use of Campus Technology Resources, it is unethical to use any portion of the University CTR.
2. User Authentication Code Usage
A. Access to Campus Technology Resources is a privilege that has an accompanying responsibility to protect those systems. In general, you are responsible for all usage done under your Authentication Codes. Should you choose to disclose your User Authentication Code(s) to others, you will be held responsible for the resulting usage. In particular, you should never disclose User Authentication which were intended to provide you alone with personal access to University Campus Technology Resources. You should avoid disclosing your CTR Access Codes, even when requested to by someone who says it is necessary to work on a problem.
Disclosure of User Authentication may put you and/or the person to whom you have disclosed your User Authentication in violation of an applicable license or contract. You should take all reasonable precautions, including but not limited to frequent password changes and other file protection measures, to prevent unauthorized use of the systems and software accessible by means of your Access Codes.
B. You should only use CTR User authentication that you are authorized to use. You should not try in any way to obtain CTR User authentication codes in an unauthorized or fraudulent manner. This includes, but is not limited to, providing false or misleading information for the purpose of obtaining Access Codes, capturing of User authentication or theft of Access Codes. It is unethical to engage in activity that is intended to produce entry into a CTR by persuading CTR users to reveal their access codes.
C. Although you have a right to access the Information for which you are authorized, you should not attempt to circumvent User Authentication procedures or Information protection schemes or uncover security loopholes or attempt to break authentication procedures or encryption protocols. These activities are sometimes called “hacking” or “cracking.” Using loopholes in CTR security systems to access your own data is inappropriate and may be hazardous. Using loopholes in CTR security systems for unauthorized access or activities is unethical and in many cases illegal (for partial example, see 18 USC 1030, 1343, 2071, 2314, 2701-2711; ORC 2913.04). These activities include, but are not limited to, the unauthorized changing of access rights, privileges, ownership, resource allocations, or quotas. You should refrain from experiments that attempt to find or demonstrate CTR vulnerabilities without the prior permission of the appropriate CCTSA. In particular, it is expected that you will not use University Campus Technology Resources to “hack” or “crack” External Campus Technology Resources. It is also expected that you will respect the financial structure of the Campus Technology Resources by not intentionally developing or using any unauthorized mechanisms to alter or avoid charges levied for CTR access or use. If you find that you have unintentionally gained unauthorized access, stop. Take no further action on the system and immediately contact the appropriate CTSA.
3. Anonymous Activity
A. Sending information, especially electronic mail, that does not correctly identify the sender is unethical, and can be illegal (see for partial example, 18 USC 1030, 1343; ORC 4165.02).
B. It is also the responsibility of the CTSA to ensure that Campus Technology Resources do not permit “public” User authentication which permit the anonymous distribution of arbitrary Information. For example, it would be fine to allow access to public domain software or documentation through a public “Guest” Access Code, but would be inappropriate to allow “Guests” to send electronic mail to just anyone. It would also be inappropriate for the CTSA to allow “Guests” to access resources outside the domain of his or her CTR. For example, it would be improper to provide “Guests” with general access to the Internet.
C. CTSAs should refrain from setting up “generic” or “project” computer accounts with the intent to grant the same CTR Access Code to multiple people. Multiple access can obscure anonymous activity. Other technical solutions should be explored for such purposes, such as a distribution list that receives a message and forwards it to several unique IDs.
D. Setting up an CTR to “masquerade” as another CTR for the purpose of anonymous activity is unethical and may be illegal. (For example, see ORC 4165.02).
4. Illegal Activity
In general, it is unethical to store and/or give access to Information on Campus Technology Resources that could result in legal action against the University. You should not use Campus Technology Resources in the course of any illegal activity. Individuals using CTR should be familiar with the Electronic Communications Act (18 USC 2701-2711) and various Ohio statutes governing computing activities, such as ORC 2913.04 and 4165.02. A non-exhaustive list of these and additional statutes which may apply (along with Web addresses) may be found in Appendix A.
Campus Technology System Administrators responsible for CTR Information servers have the responsibility to ensure that their Information servers are operated in an ethical manner. In particular, the CTSA for CTR Information servers should ensure that access to licensed Information on their servers conforms to the terms and conditions of the license. Legal questions should be referred to the appropriate CTSA, the Vice-Provost for Technology and Long-Range Planning, and/or University Counsel.
5. Communication Tampering
A. It is unethical and may be criminal to attempt to monitor other people’s communications without their permission. Likewise, you should not view, read, listen to, copy, change, execute or delete another user’s Information without that user’s or the owner’s permission. This includes but is not limited to monitoring, reading, or tampering with electronic-mail of which you are neither the author nor the addressee. In particular, you should not read electronic mail messages without the consent of one of the addressees. Exceptions for legitimate purposes should be obtained from the Vice Provost for Technology and Long-Range Planning. Authorization to possess and use packet/data observation software for legitimate diagnostic purposes may be obtained from the appropriate CTSA.
B. CTSAs may authorize CTR “postmasters” to read electronic mail headers as necessary in order to correct addresses on “dead letters” or to perform other legitimate diagnostic tasks.
6. Restricted Software and Hardware
A. You should not knowingly possess, give to another person, install on any CTR, or run, programs or other Information which could result in the violation of any University policy or the violation of any applicable license, contract, State or Federal Statute. This is directed towards but not limited to software known as viruses, Trojan horses, worms, password breakers, and packet observers. Authorization to possess and use Trojan horses, worms, viruses and password breakers for legitimate research or diagnostic purposes can be obtained from the Vice President for Technology and Long-Range Planning. Authorization to possess and use packet/data observation software for diagnostic purposes may be obtained from the appropriate CTR.
B. The unauthorized physical connection of monitoring devices to the CTR which could result in the violation of University policy or applicable licenses or contracts or state or federal statutes is unethical. This includes but is not limited to the attachment of any electronic device to the CTR for the purpose of monitoring data, packets, signals or other Information. Authorization to possess and use such hardware for legitimate diagnostic purposes must be obtained from the appropriate CTR.
7. Copying and Copyrights
A. Respect for intellectual labor and creativity is essential to academic discourse. This tenet applies to works of all authors and publishers in all media. It includes respect for the right to acknowledgment and right to determine the form, manner, and terms of publication and distribution. If a copyright exists, as in most situations, it includes the right to determine whether the work may be reproduced at all. Because electronic Information is volatile and easily reproduced or altered, respect for the work and personal expression of others is especially critical in CTR environments. Viewing, listening to or using another person’s Information without authorization is unethical. Ethical standards apply even when this Information is left unprotected.
(The above paragraph is adapted with permission from “Software Initiative Publishes Statement on Software and Intellectual Rights”, EDUCOM Bulletin, Spring 1987)
B. Users of Campus Technology Resources must abide by the University of Rio Grande and Rio Grande Community College (URGRGCC) Copyright Policy, which covers copyright issues pertaining to University faculty, staff and students as well as commissioned works of non-employees.
C. For Information which the individual or the University does not hold the copyright, written permission from the copyright holder is required to duplicate any copyrighted material. This includes duplication of audio tapes, videotapes, photographs, illustrations, computer software and all other Information for educational use or any other purpose. Exceptions to this policy must be obtained in writing from University counsel.
D. In particular, you should be aware of and abide by the University Policy on Copying and Using Computer Software. Most software that resides on Campus Technology Resources is owned by the University or third parties, and is protected by copyright and other laws, together with licenses and other contractual agreements. You are required to respect and abide by the terms and conditions of software use and redistribution licenses. Such restrictions may include prohibitions against copying programs or data for use on Campus Technology Resources or for distribution outside the University; against the resale of data or programs, or the use of them for non-educational purposes or for financial gain; and against public disclosure of information about programs (e.g., source code) without the owner’s authorization. University employees who develop new packages that include components subject to use, copying, or redistribution restrictions have the responsibility to make any such restrictions known to the users of those packages.
E. With a greater emphasis on computer based assignments, students need to be especially aware of CTR ethics. In particular, academic dishonesty or plagiarism in a student assignment may be suspected if the assignment calling for independent work results in two or more solutions so similar that one can be converted to another by a mechanical transformation. Academic dishonesty in an assignment may also be suspected if a student who was to complete an assignment independently cannot explain both the intricacies of the solution and the techniques used to generate that solution. Suspected occurrences of academic dishonesty are referred to the Vice President for Academic Affairs.
University of Rio Grande and Rio Grande Community College Copyright Policy
Link to Policy’s Text
A. The University has a policy prohibiting sexual and discriminatory harassment. The University Policy Statement on Discriminatory Harassment covers all forms and means of sexual discriminatory harassment, including any such activities using Campus Technology Resources. CTR usage or Information that is perceived by its recipient as sexual or discriminatory harassment as defined by University policy may be considered a violation. In particular, many computer-mediated conferences available via External Campus Technology Resources are open to the general public. Engaging in sexual or discriminatory harassment in this context or in any public conference on a network is an unethical abuse of access privilege.
B. The display of offensive material in any publicly accessible area is likely to violate University harassment policy. There are materials available on the Internet and elsewhere that some members of the University community will find offensive. One example is sexually explicit graphics. The University can not restrict the availability of such material, but it considers its display in a publicly accessible area to be unethical. Public display includes, but is not limited to, publicly accessible computer screens and printers.
9. Wasting Resources
A. It is unethical and possibly illegal to deliberately perform any act which will impair the operation of any CTR or deny access by legitimate users to any Electronic System. This includes but is not limited to wasting resources, tampering with components or reducing the operational readiness of a CTR.
B. The willful wasting of CTR resources is unethical and potentially illegal. Wastefulness includes but is not limited to passing chain letters, willful generation of large volumes of unnecessary printed output or disk space, willful creation of unnecessary multiple jobs or processes, or willful creation of heavy network traffic. In particular, the practice of willfully using CTR for the establishment of frivolous and unnecessary chains of communication connections (“spamming”) is an unethical waste of resources.
C. Game-playing outside of an educational context is generally permitted insofar as such activities do not adversely impact others or violate other provisions of these Guidelines. “Game-playing” is developing or executing a computer program which primarily provides amusement or diversion. Game-playing may be restricted or banned by the appropriate (usually local) CTSA.
D. The sending of random mailings (“junk mail”) is strongly discouraged but generally permitted insofar as such activities do not violate the other guidelines set out in this document. It is poor etiquette at best, and harassment at worst, to deliberately send unwanted mail messages to strangers. Recipients who find such junk mail objectionable should contact the sender of the mail, and request to be removed from the mailing list. If the junk mail continues, the recipient should contact the appropriate CTSA.
10. Unrelated Use
A. CTRs are provided by the University for the sole purpose of supporting its mission. Without permission from the appropriate CTR, it is unethical to use Campus Technology Resources for: 1)commercial gain or placing a third party in a position of commercial advantage; or, 2) any non-university related activity, including non-university related communications.
This applies to each segment of the Electronic System utilized by such activity, and specifically to the Campus-Wide Data and Voice Network. Permission from the Vice Provost for Technology and Long-Range Planning must be obtained before using any portion of the Campus-Wide Data or Voice Network for these activities.
This paragraph is not intended to restrict free speech or to restrict casual, personal communications between consenting parties.
B. General University policy prohibits non-University use of University facilities. This does not prohibit the University, through its CTRs, from setting up Information servers or other CTR specifically designated for the purpose of fostering an “electronic community”. These designated Information servers may or may not conform to the guidelines in the previous paragraph.
These designated Information servers or other CTRs are not exempt from any other portion of the University Information Technology Use Policy, the Guidelines of the Ethical Use of Information Technology or other general University policies.
11. Compliance with CTR Rules
A. When using Campus Technology Resources to access External Campus Technology Resources, you are ethically bound to comply with the rules, regulations, and appropriate use-statements of the External Campus Technology Resources. This includes but is not limited to complying with the usage rules of networks such as CREN (BITNET), USENET, EARN and NFSNet (the Internet), and The World-Wide Web (WWW).
B. You should carefully consider anything you send outside the University, because it could reflect on the whole University. In particular, anything you send to destinations outside the US, must satisfy the Department of Commerce rules (Section 779 of the Export Administration Regulations) for international transmission of information. If you send Information that does not satisfy the requirements of General License GTDA (General Technical Data Availability, Section 779.3), you must obtain the proper Individual Validated License or other available General License for the export of such material. Note in particular, that these rules severly restrict distribution outside the United States of cryptographic programs and software that implements the Data Encryption Standard (DES).
12. Additional Guidelines at Local Sites
The University Campus Technology Resources are composed of several “sites.” Each site may have local rules and regulations which govern the use of Campus Technology Resources at that site. Each site has operators, consultants, and/or supervisors who have been given the responsibility to supervise the use of that site. Each site has a CTSA with overall policy responsibility for the site. CTR users are expected to cooperate with these individuals and comply with University and local site policies. Site policies may be more restrictive than University policy. In the event that there is a conflict between site policy and University policy, the more restrictive policy shall prevail. It is the responsibility of the CTR to post or distribute local rules and regulations in an appropriate manner.
13. Connection to the Campus-Wide Data Network
Many campus buildings are already included in the Campus-Wide Data Network topology. To maintain Campus Technology Resources integrity, Campus-Wide Data Network connections are made only by specialized personnel under the direction of the Information Technology Division. You are encouraged to attach appropriate equipment only at existing user- connection points. All requests for additional Campus-Wide Data Network connections or for the relocation of a connection should be directed to the Vice Provost for Technology and Long-Range Planning.
14. Shared Responsibility
All students, faculty and staff share responsibility for seeing that Electronic Information Technology Systems are used in an ethical manner. Please notify the appropriate CTR of any suspected violation the University of Rio Grande and Rio Grande Community College (URGRGCC) Information Technology Use Policy. You may be asked to cooperate with the University should an investigation into the abuse of a Campus Technology Resource arise. You are also encouraged to report any information relating to a flaw in, or bypass of, Campus Technology Resources security to the appropriate CTR.
15. Copying of Software
The University of Rio Grande and Rio Grande Community College (URGRGCC) licenses the use of its computer software from a variety of outside companies. University of Rio Grande and Rio Grande Community College (URGRGCC) does not own this software or its related documentation and, unless authorized by the software developer, neither the University nor its employees and students have the right to reproduce it.
With regard to use on local area networks or on multiple machines, University of Rio Grande and Rio Grande Community College (URGRGCC) employees and students shall use the software only in accordance with the license agreement, University Copyright Policy, and U.S. Copyright Law.
A. Reporting of Violations
University of Rio Grande and Rio Grande Community College (URGRGCC) employees and students learning of any misuse of software or related documentation within the University shall notify their supervisor or, in the case of students, the appropriate faculty member, DTC, the University Copyright Officer, or other appropriate University official.
B. Disciplinary Action
University of Rio Grande and Rio Grande Community College (URGRGCC) employees and students who make, acquire or use unauthorized copies of computer software will be disciplined as appropriate under the circumstances.
C. Civil and Criminal Liability
According to U.S. Copyright Law, a person who makes an unauthorized copy is liable to the copyright owner for actual damages and profits or statutory damages of up to $50,000.00 plus court costs and attorney fees. In addition, in certain cases the infringer may be criminally prosecuted and subject to a fine of up to $25,000 and imprisonment of up to one year.
Information Technology Use Policy
University of Rio Grande and Rio Grande Community College (URGRGCC) has established a University Policy on Information Technology Use. That policy establishes the expectation that Campus Technology Resources will be used in an ethical manner. However, Campus Technology Resources are complex, evolving and incur some risk. This statement is intended to establish the expectations for the use of the Information Technology environment at the University.
Violation of this policy may result in suspension of privileges to access the information technology involved, initiation of University disciplinary procedures or, in extreme cases, criminal prosecution under federal or state law.
Please refer any questions about this policy or its applicability to a particular situation to the Vice President Technology and Long Range Planning.
A summary of this policy appears in computing labs across campus.
1. Integrity and Privacy not Guaranteed
A. The University does not guarantee the security, the confidentiality or the integrity of a user’s Information on Campus Technology Resources. Some portions of the CTR are more secure than others. Very high standards of security and integrity prevail in portions of the CTR associated with Administrative Systems. In smaller local work group settings, the standards may not be as high. It is the user’s responsibility to assess the risk and to use all means appropriate to safeguard Information. You use CTR at your own risk. Should you feel appropriate safeguards are not in place, you are advised to not use that portion of the CTR and to discuss the situation with the appropriate CTSA. The University will not be responsible for the loss or disclosure of user Information on Campus Technology Resources.
B. The University, through its employees, will treat all of its Information on students and employees as confidential, disclosing that Information only when authorized by the student or employee in question, approved by the appropriate University Official, or required by local, state or federal law. Student and employee information is accessed by University staff, formally authorized, on a need-to-know basis, only for the business purposes of the University. Aggregate information may be released by an appropriate University Official, for example, to respond to a survey.
C. Viruses, Trojan horses, worms, password breakers and packet observer programs are known to exist or have been known to exist on campus. Although reasonable efforts will be made to eradicate dangerous and unethical software, be aware that these programs exist, and take appropriate precautions. In particular, never run a program sent to you unless you know what it does and trust the source. Some “gifts” have been known to erase the recipient’s files, send obscene messages in the recipient’s name, replicate themselves, and generally cause trouble for the Electronic System on which they were run.
D. Some CTRs have procedures associated with mis-directed mail that involve someone acting in a “Postmaster” capacity. The Postmaster, as indicated in the University Information Technology Use Policy, may read mail file headers to the extent necessary to resolve addressing problems for delivery or diagnostic purposes. Typically, someone designated by each CTR has permission to look at any file on that associated portion of the CTR for diagnostic purposes only.
2. Ownership of Information
A. Information created using or stored in University Campus Technology Resources is subject to the University of Rio Grande and Rio Grande Community College (URGRGCC) Copyright Policy, which covers copyright issues pertaining to University faculty, staff and students, as well as commissioned works of non-employees.
B. CTR users, as a condition of CTR use, recognize that the University may do as it sees fit with its owned and copyrighted Information. CTR users, as a condition of CTR use, grant the University permission to copy or delete Information they have created or stored in CTR. Some CTRs have procedures associated with the management of computer storage space that could result in Information being arbitrarily removed from a CTR. An example would be a policy of automatically deleting unread electronic or voice mail after a set period. Computer files which are unused for extended periods of time might be moved to off-line storage and eventually erased. Contact the appropriate CTSA for current storage management procedures, if any.
C. CTR users, as a condition of use, recognize that when they leave the University (cease to be an enrolled student or an employee of the University,) their Information may be removed from University CTRs without notice. CTR users must remove their Information or make arrangements for its retention prior to leaving the University. Specific CTR policies on retention and removal may vary by system.
3. Campus Technology Resources Administration of Information Servers
The University Information Technology Use Policy states, in part, “…it is unethical to store and or give access to Information on Campus Technology Resources that could result in legal action against the university”. This requires that the CTSA for an Information server be responsible for the content of the server.
Users should be aware that CTR’s will have appropriate policy and procedures set up for their Information servers as necessary to meet the requirements of University Information Technology Use Policy. When using a CTR Information server for the first time, you should find out if you have any responsibilities or restrictions beyond what has been indicated in the University Information Technology Use Policy and its Guidelines on the Ethical Use of Information Technology. This information is typically available from the CTR Information server or its CTSA.
4. Integrity and Safeguarding Activity in Shared Systems
A. Unrestricted CTR access (“Super-user Privilege”) is granted only to immediate staff by the appropriate CTSA. These authorized individuals are responsible for the integrity and safeguarding of the Campus Technology Resources and the Information within them. They are expected to respect the privacy of Information within the CTR and are not exempt from the University Information Technology Use Policy.
B. To protect the integrity of the Campus Technology Resources against unauthorized or improper use, and to protect authorized users from the effects of unauthorized or improper usage, the University reserves the right to limit permanently or restrict any user’s CTR usage; to inspect, copy, remove, or otherwise alter any Information or system resources that may undermine the authorized use of that Electronic System; and to do so with or without notice to the user. However, no such action will be taken without specific authorization from the appropriate CTSA. The University, through authorized individuals, also reserves the right to periodically check and monitor its Campus Technology Resources, and reserves any other rights necessary to protect the Campus Technology Resources.
C. The University disclaims responsibility and will not be responsible for loss or disclosure of user Information or interference with user Information resulting from its efforts to maintain the privacy, security, and integrity of its Campus Technology Resources and Information. Most CTRs have backup procedures that periodically save user Information. Backup copies may be stored off-site and may be retained for long periods of time. The intent is to be able to recover the Information in case of system disaster. CTR backup procedures and backup retention periods differ by individual CTR policy. You may or may not be able to recover lost information. The University retains the right to review Information contained in backups in conjunction with its CTR integrity and safeguarding activities or as part of an official investigation of alleged violation of University Policy.
D. The University reserves the right to take emergency action to safeguard the integrity and security of Campus Technology Resources. This includes but is not limited to the termination of a program, job, or on-line session, or the temporary alteration of user Access Codes. Such emergency action will be taken on the authorization of the appropriate CTSA. The taking of emergency action does not waive the rights of the University to take additional actions under this policy.
5. User Responsibility
A. To protect all users of Campus Technology Resources, you should contact the appropriate CTSA if you believe your rights have been compromised when using Campus Technology Resources. In such instances, please provide details including a description of the incident, date, time, and persons involved. If you suspect that your files have been altered or access has been gained to your Information, STOP. Do not alter, access or execute anything. Notify your instructor, DTC and/or CTSA immediately.
B. If you use a “personal” system, even if it is provided by the University, it is your responsibility to insure that the system is properly backed up and that the Information contained in that “personal” system is safeguarded. Contact your local CTSA for assistance if necessary.
C. In order to receive user support either from the University or vendors, you may be asked to produce the manuals, original diskettes, serial number, or other proof of proper software licensing. In addition, vendors may require proof of purchase to upgrade to a new version of the product. It is the responsibility of the appropriate CTSA, or the individual user in the case of a “personal” system, to insure that proper documentation and records are maintained.
6. Exposure to Offensive Material
Users should be aware that the University has no control over the content of Information servers on External Campus Technology Resources, for example, the World Wide Web. This is to inform you that some Information may be offensive to you and/or unsuitable for certain audiences. User discretion is advised.
7. Disclaimer of Liability
The University will not be liable for any losses, including lost revenues, or for any claims or demands against the user of an CTR by any other party. In no event will the University be liable for consequential damages, even if the University has been advised of the possibility of such damages. The University will not be responsible for any damages due to the loss of output, loss of data, time delay, Campus Technology Resources performance, software performance, incorrect advice from a consultant, or any other damages arising from the use of the University’s Campus Technology Resources and Information. The University will make reasonable attempts to correct conditions and restore Information losses.
8. Information Technology Use Policy Procedures
A. Users of Information Technology at the University are expected to comply with the University of Rio Grande and Rio Grande Community College (URGRGCC) Information Technology Use Policy. In the event of a suspected violation, the appropriate instructor or CTSA will (in conjunction with University Counsel and University Security personnel, if necessary) investigate the allegations and determine if an offense has occurred.
B. The University will deal with violations of these policies in the same manner as violations of other university policies and may conduct a disciplinary review. In such a review, the accused may be subject to the full range of disciplinary sanctions, which include the loss of computer use privileges, dismissal from the University, and civil or criminal legal action.
Some violations of these policies may constitute a criminal offense. Individuals using campus computer facilities should be familiar with 18 USC 2701-2711 and ORC 2913.04.
The following is a partial list of Federal and State statutes critical to the development of the above policies:
Ohio Revised Code
2913.04 Unauthorized Use, Hacking, Cracking, etc.
4165.02 Forged origination information
United States Code (Revised) Statutes
18 U. S. C. 646 Embezzlement by a bank employee
18 U. S. C. 793 Gathering, transmitting, or losing defense information
18 U. S. C. 912 Impersonation of a government employee to obtain a thing of value
18 U. S. C. 1005 False entries in bank records
18 U. S. C. 1006 False entries in institution records
18 U. S. C. 1014 False statements in loan and credit applications
18 U. S. C. 1029 Credit card Fraud Act of 1984
18 U. S. C. 1030 Computer Fraud and Abuse Act
18 U. S. C. 1343 Wire fraud (use of a phone, wire, radio, or television transmissions to further a scheme to defraud
18 U. S. C. 1361 Malicious mischief to government property
18 U. S. C. 2071 Concealment, removal, or mutilation of public records
18 U. S. C. 2314 Interstate transportation of stolen property
18 U. S. C. 2319 Willful infringement of a copyright for profit
18 U. S. C. 2701-2711 Electronic Communications Privacy Act
Anti-Piracy Hotline: 1-800-688-2721
United States Code statutes…Search
Overview & Purpose
University of Rio Grande & Rio Grande Community College’s copyright policy is based upon United States Copyright Law, Title 17, U.S. Code, 1976. The copyright law of the United States governs the making of photocopies or other reproductions of copyrighted material. Our policy is based on careful review of the law itself, the Fair Use of Guidelines of 1997, the TEACH Act of 2002, the Digital Millennium Copyright Act, and the DMCA exemptions of 2006.
This Copyright Policy has been prepared in an effort to help the University community better understand what is allowable by law, and why some services that are technically possible may nevertheless be restricted. The University of Rio Grande & Rio Grande Community College will always remain open to receiving any new information on or interpretation of copyright law.
This policy applies to all members of the University of Rio Grande & Rio Grande Community College, including faculty, staff, students, alumni, and any other person who has access to information technology resources at the University.
Copyright law protects original works of authorship fixed in any tangible medium. The University of Rio Grande & Rio Grande Community College upholds the principle that faculty retain copyright ownership for traditional works that they have created, including books, films, music, and other works of art. The University of California’s policies on Copyright Ownership and Ownership of Course Materials clarify who owns the copyright to original works when produced by members of the faculty. There are occasions, however, when a work produced by an employee may fall under a “work made for hire” as defined in section 101 of the 1976 Copyright Act. In these instances, copyright ownership would be ascribed to the institution.
Compliance with the federal copyright law and with this policy is the
responsibility of every member of the University of Rio Grande & Rio Grande Community College, including faculty, staff and students. An up-to-date policy is posted on Rio Grande’s website and all members of the academic community are expected to take a personal interest in becoming informed about how copyright law affects our work at the University of Rio Grande & Rio Grande Community College.
It is the intent of the University of Rio Grande & Rio Grande Community College to adhere to the provisions of state and federal copyright laws as described above. The following tenants represent a sincere effort to comply with those laws
A. The ethical and practical problems caused by illegal copying should be included in the University’s in-service and faculty development programs.
B. Only legal copies of copyrighted materials may be made or used on University equipment.
C. The University of Rio Grande & Rio Grande Community College does not give permission for any illegal copying of University owned copyrighted materials.
D. No student shall be advised that they may copy protected materials other than those allowed by the guidelines defined by copyright law and in this policy.
E. It shall be the policy of the University of Rio Grande & Rio Grande Community College to negotiate for specific copyright releases when applicable.
F. University of Rio Grande & Rio Grande Community College will make a copy of this policy available to all University employees.
G. The College will create and maintain the position of copyright officer for this institution.
H. Employees may exceed these policies only with the permission of the copyright officer and/or in consultation with the University’s legal counsel.
I. The appended guidelines will be modified periodically to reflect changes in the law and/or technology.
Note: This text provides only a summary of the main provisions of the United States copyright laws. For more details regarding these laws in their entirety, or questions as to what is and what is not permissible under Copyright, please visit the U.S. Copyright Office at http://www.copyright.gov/ or the Copyright Clearance Center at http://www.copyright.com
General Information About Copyright
Copyright grants to the author or originator the sole and exclusive privilege of creating multiple copies of literary or artistic productions and publishing and selling them. Copyright protection exists for original works fixed in any tangible medium of expression, including:
1. Literary works
2. Musical works, including any accompanying words
3. Dramatic works, including any accompanying music
4. Pantomimes and choreographic work
5. Pictorial, graphic, and sculpture work
6. Motion pictures and other audiovisual works
7. Sound recordings.
Copyright Protections and Fair Use Principles
To help members of the University of Rio Grande & Rio Grande Community College understand and comply with copyright laws, this section summarizes basic principles of copyright law including the application of “fair use”. The principle of Fair Use offers additional access privileges in educational settings.
Copyright law is inherently complex. A fair use of a copyrighted work depends upon a specific determination based upon the circumstances of the use. The principles below are intended to provide an initial context for complying with the law.
Principle 1: The copyright holder has important and exclusive rights. Copyright law protects original works such as writings, music, visual arts, and films by giving the copyright holder a set of exclusive rights in that work. These rights include the right to copy, distribute, adapt, perform, display, and create derivative or collected works. In general, any use of copyrighted materials requires permission from, and potentially payment of royalties to, the copyright holder unless the use falls within an exemption in the law, such as the fair use exemption.
Principle 2: Responsible decision-making means that University of Rio Grande & Rio Grande Community College members must make demonstrable good faith efforts to understand the fundamentals of copyright law and the reasonable application of fair use. When University members plan to use a copyrighted work in their teaching or research, they must examine the specifics of their use within the context of the law in order to determine whether they should seek permission for the use or depend instead upon the fair use exemption.
Principle 3: An appropriate exercise of fair use depends on a case-by-case application and balancing of four factors as set forth in a statute enacted by Congress. A proper determination of fair use – in daily practice and in the courts – requires applying these four factors to the specific circumstances of the use. These factors must be evaluated to determine whether most of them weigh in favor of or against fair use. The four factors include:
1. The purpose and character of the use, including whether the copied material will be for nonprofit, educational, or commercial use. This factor at first seems reassuring; but unfortunately for educators, several courts have held that absence of financial gain is insufficient for a finding of fair use.
2. The nature of the copyrighted work, with special consideration given to the distinction between a creative work and an informational work. For example, photocopies made of a newspaper or newsmagazine column are more likely to be considered a fair use than copies made of a musical score or a short story. Duplication of material originally developed for classroom consumption is less likely to be a fair use than is the duplication of materials prepared for public consumption. For example, a teacher who photocopies a workbook page or a textbook chapter is depriving the copyright owner of profits more directly than if copying one page from the daily paper.
3. The amount, substantiality, or portion used in relation to the copyrighted work as a whole. This factor requires consideration of 1) the proportion of the larger work that is copied and used, and 2) the significance of the copied portion.
4. The effect of the use on the potential market of the copyrighted work. This factor is regarded as the most critical one in determining fair use; and it serves as the basic principle from which the other three factors are derived and to which they are related. If the reproduction of a copyrighted work reduces the potential market and sales and, therefore, the potential profits of the copyright owner, that use is unlikely to be found a fair use.
Principle 4: Nonprofit educational purposes are generally favored in the application of the four factors of fair use, but an educational use does not by itself make the use a “fair use.” One must always consider and weigh all four factors of fair use together. The educational purpose of the University of Rio Grande & Rio Grande Community College will usually weight the first of the four factors, the purpose or character of the use, in favor of fair use. However, an educational use does not mean that the use is, by that factor alone, a fair use. All four factors must be weighed in making a decision.
Copying Materials for Instructional Use
Under certain conditions specified in copyright law, a photocopy or other reproduction is not to be “used for any purpose other than private study, scholarship, or research.” If a user makes a photocopy or reproduction for purposes in excess of “fair use”, that user may be liable for copyright infringement.
Primary and secondary school educators have, with publishers, developed guidelines which allow an instructor to distribute photocopied materials to students in a class, without the publisher’s prior permission, upon compliance with these conditions:
The distribution of the same photocopied materials does not occur every semester.
Only one copy is distributed for each student, which must become the student’s property.
The materials include a copyright notice on the first page of the portion of material photocopied.
The students are not assessed any fee beyond the actual cost of the photocopying.
The amount of material should be reasonable in relation to the total amount of material assigned for one term of a course.
The effect of copying the material should not be detrimental to the market for the work. In general, the library should own at least one copy of the work, and the use of the work.
General Guidelines for Print and Electronic Reserve
• One chapter from a book.
• One article from a journal issue or newspaper.
• Multiple excerpts from a single book or journal issue will be accepted only if the total length of the submission is 10% or less of the total length of the book or journal issue.
• A short story, short essay, or short poem.
• A chart, diagram, drawing, graph, cartoon, or picture.
Materials in excess of Fair Use may still be used with appropriate permission and/or fees to the copyright holder.
Displaying Media on Campus
Users must secure public performance rights prior to showing a copyrighted work on campus, unless the work was purchased with public performance rights attached. The only exemption to this requirement is for classroom showings (i.e., the Face-to-Face exemption).
Classroom use or showing of a copyrighted video (VHS, DVD, Blu-ray) is permissible under the following conditions:
The use must be by instructors or by students.
The use is part of the curriculum for a specific course and is confined to members in a discrete course or other teaching activity.
The entire audience is involved with the teaching activity.
The showing takes place in a classroom or other instructional venue.
The video is lawfully made; the person responsible has no reason to believe that the video was not lawfully made.
Unless a film has public performance rights attached, it should be assumed that permission is required for a public screening of the film. Public performance rights must be obtained prior to scheduling, advertising, or showing a copyrighted film.
If the film is being shown for entertainment purposes, if it includes viewers not enrolled in the course showing the film, or if the film is advertised, it is considered a public (open) showing. The screening of the film is not excused from the “public” designation just because it is an “educational” film, it is being advertised only on campus, or admission is not being charged. The licensing status of the film or work should be determined prior to any advertisement. If it is determined that a public performance license is required, the copyright holder will need to be identified and permission secured. The person showing the film is responsible for securing permission and paying any performance fees.
• Off-air broadcasts may be recorded and legally shown once to a single class within the first ten days after the date of the broadcast. This does not allow for multiple showings or general showings within the University of Rio Grande & Rio Grande Community College.
• The recording must be from a commercial broadcast (no premium cable channels).
• After ten days the recording may not be shown unless copyright clearance is
The professor may retain the recording for an additional 35 days for personal evaluation purposes only. After that time the recording must be erased or copyright clearance obtained.
Using Multimedia Materials
The use of multimedia materials is governed by the Fair Use Guidelines cited above.
Existing Video Footage
Faculty and students are permitted to copy portions of video materials for the purpose of incorporating the clips into a new production for educational use in the classroom, without obtaining permission from the copyright holder.
The borrowed material may not constitute more than 3 minutes of the original work, nor may it comprise the majority of the finished product. The opening screen of the project and any accompanying print material must include a notice that certain materials have been used under the fair use exemption of the U.S. Copyright Law.
The Digital Millennium Copyright Act (DMCA) of 1998 specifically addressed digital media, including DVDs, and introduced new restrictions on copying. Section 1201 of the DMCA prohibits the circumvention of encryption on all digital media. It is a violation of the DMCA, for example, to make a digital copy of an encrypted DVD, because doing so would require breaking the copy protection. In November 2006, several exemptions to the DMCA restrictions were approved. One of the new exemptions is for multimedia works included in the educational library of a college or university’s film or media studies department, when circumvention is accomplished for the purpose of making compilations of portions of those works for educational use in the classroom by media studies or film professors.
Guidelines for Using Multimedia Sources
Existing multimedia (music, lyrics, music videos, motion media, photographs, and illustrations) can be incorporated into a student or faculty multimedia project. The amount of the copyrighted work that a student may use in her/his educational multimedia project is restricted by specific portion limitations (see below). In particular, the portion limitations relate to the amount of copyrighted work that can reasonably be used in educational multimedia projects regardless of the original medium from which the copyrighted works are taken. Only two copies of the student educational multimedia project may be made, for reserve and preservation purposes.
Attribution and acknowledgement are required. Students must credit the sources of the copyrighted works, display copyright notice and ownership information, and include notice of use restrictions.
Copyrighted Music, Lyrics, and Music Videos: up to 10%, but in no event more than 30 seconds.
Motion Media Work: no more than 3 minutes.
Photographs and Illustrations: no more than 5 images by an artist or photographer. For photographs or illustrations from a published collective work, no more than 10% or 15 images, whichever is less.
Digital Millennium Copyright Act (DMCA)
The Digital Millennium Copyright Act (DMCA) provides an opportunity for Internet service providers (ISP’s) to shield themselves from liability for the actions of their users that infringe on the copyrights of others. All institutions of higher education that provide Internet access fall within the scope of the definition of an ISP, with relevant users being their students, faculty and staff.
As an ISP, the University of Rio Grande & Rio Grande Community College are potentially liable for monetary damages (plus attorneys’ fees) if any of its users provide Internet access to material that infringes on the copyrights of others. The same is true if, for example, a user transmits infringing materials in an e-mail message. Copyright owners are entitled to recover either their “actual” damages, or statutory damages that range as high as $30,000 per work infringed. (In the case of willful infringement, the statutory damages can be as high as $150,000 per work.) In all cases, the “fair-use” exemption that allows use of copyrighted materials in narrowly defined circumstances applies to materials in digital form just as it applies to traditional media.
University of Rio Grande & Rio Grande Community College DMCA Procedures
The DMCA does not require that the University of Rio Grande & Rio Grande Community College “police” the Internet activities of its faculty, staff or students. Rather, it requires that the University respond in specified ways to avoid institutional liability when evidence of infringing activity is brought to its attention or when it receives information that makes it apparent that infringing activity is occurring. The University of Rio Grande & Rio Grande Community College follows DMCA requirements in the following way:
When the University of Rio Grande & Rio Grande Community College receives a notice from an agent (the RIAA, MPAA or other agent) or the copyright holder, the University will investigate who is attached to the network address given in the notice. Following receipt of a proper notification, the University must “expeditiously” remove (“take down”) the infringing material or block access to it when identified content is hosted on institutional resources.
The University of Rio Grande & Rio Grande Community College must “promptly” notify the user of the University’s action. Such notification coupled with the removal of the material shields Rio Grande from liability for damages sought for the actions of the user. A member of the Office of Campus Computing & Networking (CC&N) or the campus Copyright Officer will contact the person in question via email to meet with him or her. At this meeting, the specific implications of the infraction will be outlined along with actions required and information on potential legal or disciplinary outcomes.
The person receiving the notice must sign a statement acknowledging receipt of the notice and understanding that receipt of a second notice will trigger notification to appropriate University officials to determine what sanctions may be issued.
Upon receipt of a second notice the University of Rio Grande & Rio Grande Community College will follow all of the above procedures, and the individual will be required to additionally meet with the Provost.
If the individual receives a third notice, the Provost will bring an honor code charge against the individual for disciplinary action.
In February 2007, the RIAA began sending pre-settlement and settlement letters to individuals they believed were infringing upon their rights as copyright owners. If the College receives any such letters, it will notify students or staff that such pre-settlement letters have been received and will forward those settlement letters to the individuals for whom they are intended. If an individual receives such a letter, they are personally responsible for interpreting the Policy and laws and retaining legal advice, if they so choose.
Higher Education Opportunity Act of 2008
The University of Rio Grande follows the Educause recommendations for compliance with the Higher Education Opportunity Act of 2008.
The HEOA legal mandate states more specific requirements for U.S. colleges and universities regarding copyright infractions through the use of Peer to Peer file-sharing technologies. Failure to meet compliance and having repeated offenses from your campus could impact Federal Financial Aid to the institution.
Educause highly encourages three measures of proactive action.
1. An annual disclosure to students describing copyright law and campus policies related to violating copyright law.
2. A plan to “effectively combat the unauthorized distribution of copyrighted materials” by users of its network, including “the use of one or more technology-based deterrents”.
3. A plan to “offer alternatives to illegal downloading”.
Campus Computing & Networking addresses the Educause recommendations with the following:
1. Rio Grande posts on the website language regarding the use of P2P file sharing and provides training to all LA10001 (Student Success) classes each term.
2. Rio Grande uses a Palo Alto firewall which permits the blocking of all P2P protocol network activities.
3. Rio Grande instructs users of legal alternatives like Apple iTunes, Netflix, Hulu, Amazon, Google Play Store, etc.
Should the rio.edu domain “hostmaster” receive notification of a violation, the CC&N and the Dean of Students (or, Provost) provides verbal warnings informing the suspected violator that the institution has received a “notification of a suspected violation(s)” and does NOT have the ability to shield or protect the individual from legal actions initiated by outside organizations as outlined in the Summary of Civil and Criminal Penalties for Violation of Federal Copyright Laws statement.
Each campus must distribute three pieces of information related to copyright policy and law:
i) A statement that explicitly informs its students that unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the students to civil and criminal liabilities;
ii) A summary of the penalties for violation of Federal copyright laws; and
iii) A description of the institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in illegal downloading or unauthorized distribution of copyrighted materials using the institution’s information technology system.
In its “Dear Colleague” letter of June 4, 2010, the Department of Education provided the following sample text for (ii)
Summary of Civil and Criminal Penalties for Violation of Federal Copyright Laws
Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These
rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.
Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or “statutory” damages affixed at not less than $750 and not more than $30,000 per work infringed. For “willful” infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys’ fees. For details, see Title 17, United States Code, Sections 504, 505.
Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense.
For more information, please see the Web site of the U.S. Copyright Office at www.copyright.gov, especially their FAQ’s at www.copyright.gov/help/faq
Technology, Education, and Copyright Harmonization (TEACH) Act The Copyright Clearance Center summarizes the TEACH Act as “… the product of discussion and negotiation among academic institutions, publishers, library organizations and Congress. It offers many improvements over previous regulations, specifically sections 110(2) and 112(f) of the U.S. [Copyright Law, Title 17, U.S. Code, 1976]”
The TEACH Act provides additional guidance and exemptions for non-profit educational institutions to use digital media in distance learning. In order for institutions to use these copyrighted materials in distance education, the institution must meet specific criteria to qualify for its exemptions. There are specific materials to which the TEACH Act exemptions do not apply. Members of the University of Rio Grande and Rio Grande Community College using the TEACH Act exemptions for distance education should consult readily available resources (such as through the Copyright Clearance Center) to clarify what is and what is not permissible. The TEACH Act does not supersede fair use or existing digital license agreements.
Online forms for copyright clearance and permission, including Pay-Per-Use Services, can be found through the Copyright Clearance Center. If the work being used is not a well-known resource, and is not on the Copyright Clearance Center website, then the individual using the work is responsible for contacting the copyright holder and obtaining permission to use the copyrighted work.
This Policy was adapted, with permission, from Wellesley College’s “Copyright Policy” (http://www.wellesley.edu/lts/policies/copyrightpolicy).
Copyright Law of the United States accessed from http://www.copyright.gov/title17/
Fair Use section of the U.S. Copyright Law accessed from http://www.copyright.gov/fls/fl102.html
The U.S. Copyright Office website accessed from http://www.copyright.gov/
The Copyright Clearance Center website accessed from http://www.copyright.com/
Digital Millennium Copyright Act accessed from http://copyright.gov/title17/92appb.html
Copyright Basics: THE TEACH Act accessed from http://www.copyright.com/Services/copyrightoncampus/basics/teach.html
Network User Account Policy
|UNIVERSITY OF RIO GRANDE||
Policy #: 7.4.2
Responsible Executive: Provost, Vice President of Academic Affairs
Responsible Office: Campus Computing & Networking
Originally Issued: (TBD)
|Network User Account Policy|
I. Policy Statement
Network User Account Policy
The University will provision and maintain a Network User Account (RioNET) for all full and part-time students, faculty, and staff for the purpose of authentication and Federated Identity Management as a Certified Identity Provider under the authority of the Internet2 InCommon organization.
Guests, contractors, consultants, Trustees and other persons may also have RioNET accounts upon approval of Human Resources.
Users provided a RioNET account are bound to the Terms & Conditions outlined in the campus Acceptable Use Policy and others outlined by accessed content/service providers.
The University shall operate industry standard identity management systems capable of providing assurance of a user’s electronic identity plus other required attributes.
Campus Computing & Networking shall be charged with the operations of such identity management systems and shall purge delinquent and unused accounts as necessary for compliance to meet the assurance requirements of content/service providers seeking Federated Identity Management user authentication.
Student & alumni accounts remain active providing the user continues use after enrollment terms. Continued active status is achieved by e-mail logins for a minimum of six months off-line.
Staff and faculty accounts remain active during the period of employment or through the benefits extended via Emeritus status as recommended and approved by action of the Trustees.
Guest, contractors, consultant and Trustee accounts remain active during the term of the user’s engagement with the institution.
Operational procedures and best practices are maintained within the requirements of InCommon and the participating content/service providers.
InCommon, operated by Internet2, provides a secure and privacy-preserving trust fabric for research and higher education, and their partners, in the United States. InCommon’s identity management federation serves 8 million end-users (IPEDS data; October 2014). InCommon also operates a related assurance program, and offers certificate and multifactor authentication services. https://www.incommon.org/
II. Reason for Policy
External compliance for Identity Provider standards with
III. Entities Affected By This Policy
All units of the University.
IV. Who Should Read This Policy
All members of the University community.
V. Website Address for This Policy
VI. Related Documents, Forms, and Tools
|Forms and Tools|
Direct any questions about this policy to your department’s administrative manager.
If you have questions about specific issues, call the following offices: Campus Computing & Networking
|Policy Clarification and Interpretation|
|Computing & Networking|
|Instructional Design & Media Services|
|Management Information Systems|
Economy and Efficiency
Frequently Asked Questions
How do I change my RioNET password?
- While logged into a campus computer, press CTRL+ALT+DEL and select Change a Password.
- From a web broswer, naviage to myRio, then select Password Reset.
- In person on campus – Moulton Hall – B4 (fire lane entrance side)
- Email – firstname.lastname@example.org
How do I set up my student e-mail?
At orientation the Campus Computing & Networking staff are available to assist all students in changing their default passwords, connecting to the campus WiFi, accessing RioNET email for the first time and adding the Exchange email account to your mobile device.
Otherwise, one week prior to the start of the semester the new students RioNET account is created. The New User Guide for Students has step-by-step instructions.
How do I print from my personal device?
How to I connect to WiFi?
Campus Computing & Networking is located in the basement of Moulton Hall on the University of Rio Grande & Rio Grande Community College campus.
Business hours: 8-5 Monday – Friday
Closed each day from 12-1 for lunch (even the nerds need to eat)
Primary Contact: email@example.com