Administrative Policies
Information and Information Technology Responsible Use PolicyPolicy Number: 4.2.5 Current Effective Date: 01/31/2023 Original Effective Date: 09/05/2000 Revision Dates: 9/18/2000, 06/21/2006, 05/10/2007, 5/20/2008, 07/20/2010, 11/02/2010, 05/04/2015, 10/01/2021, 05/19/2022, 01/31/2023 Revision Number: 10 Revision Summary: added new procedure reference Responsible Official: Vice President Technology Solutions References: Administrative Procedure 4.2.5-P, Administrative Procedure 4.2.5A-P This policy applies to the entire KCTCS community of students, employees (both faculty and staff), affiliates, and authorized guests. KCTCS requires all individuals to responsibly use information and the information technology employed to collect, process, store, and disseminate it. Acceptance of this policy shall be acknowledged before being allowed access to KCTCS information technology. This policy complies with other KCTCS policies and procedures, particularly policies related to ensuring a harassment-free, discrimination-free, respectful, and professional education/work environment. Information is data about people, objects, and events, as well as derivations of these data. Information may be text, sounds, and images in electronic form, as well as on paper and other tangible media. Information shall be subject to appropriate and consistent protection, whether in transit, stored in a shared server, cloud storage, workstation, laptop, personal digital device, file cabinet,or wastebasket, copier, fax, database, or other possible locations. Information created using KCTCS information technology is an asset of KCTCS. The information includes confidential and restricted information as well as public information. Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data. KCTCS information technology includes all hardware, software, and communication networks that KCTCS owns, leases, or has been assigned control. It also includes non-KCTCS hardware and software while it is connected to the KCTCS communication network or to other KCTCS information technology. 4.2.5.1 Categories of Responsible Use of Information and Information TechnologyDerived from the values held by KCTCS, there are five categories of responsible use: Privacy, Lawfulness, Integrity of Information and Information Technology, Improper Use of Information and Information Technology, and Courtesy. PrivacyKCTCS requires faculty, staff and students to ensure the privacy of personal information. Violating or disregarding an individual’s right to privacy is a violation of this policy. KCTCS technology and information technology user account information, including but not limited to user passwords,may not be transferred to or shared with another without explicit written authorization by the KCTCS Legal Services in consultation with KCTCS Vice-President responsible for Technology Solutions. LawfulnessKCTCS requires individuals to obey laws related to information and information technology. Integrity of Information and Information TechnologyKCTCS requires individuals to ensure the integrity of the information and information technology. Improper Use of Information and Information Technology ResourcesKCTCS requires individuals to utilize information and information technology resources for business and educational related purposes only. CourtesyKCTCS requires individuals to use information technology in a manner consistent with maintaining optimal professional and respectful work and study environments. 4.2.5.2 Confidential and Restricted InformationA specific focus of this policy is placed on confidential and restricted information, since KCTCS values the privacy of the individual. Within the central repositories, each data item or dataset shall be categorized to ensure that sensitive information is limited to those who have a legitimate educational or KCTCS business-related purpose to use it. KCTCS requires individuals to safeguard confidential and restricted information from irresponsible use. Confidential information, the highest level of sensitivity, is defined as information that could cause substantial damage to or liability for KCTCS if treated irresponsibly. Restricted information is defined by the need for special safeguards beyond that taken for public information. Public information, the lowest level of sensitivity, may be released according to rules, guidelines, and definitions developed to safeguard the information entrusted to KCTCS. All information in this policy includes the secure transmission and disposal of information or information technology. All forms of recorded information and access to that information: written, oral, and visual, regardless of the media, including paper and electronic, shall be safeguarded. The external distribution of confidential and restricted information regardless of the media, including electronic and paper, shall be limited. Safeguarded precautions shall be utilized when providing information in electronic form or other media. Email security by default is not suitable for transmitting sensitive information and the use of email for sending sensitive information without the proper safeguards applied beforehand is not permitted. 4.2.5.3 Information and Information Technology Responsible Use ComplianceEmployees shall complete and sign a compliance agreement in which he/she agrees to comply with the Information and Information Technology Responsible Use Policy. The compliance agreement shall be available for electronic, as well as handwritten, signature. Other accommodations shall be made for special needs pursuant to state and federal law. 4.2.5.4 Roles and Responsibilities for Ensuring Responsible Use of Information and Information TechnologyThe KCTCS President has ultimate responsibility for the information, including that information intended to reside primarily at the System Office, and for the information technology on which it is stored or processed. The KCTCS President or his/her designee shall:
The KCTCS Vice-President for Technology Solutions shall recommend policies and procedures that ensure:
Requests for exceptions to this policy shall be submitted for approval to the KCTCS President or his designee the KCTCS Vice-President responsible for Technology Solutions. All requests shall be submitted in written or electronic form. In addition, the KCTCS Vice-President responsible for Technology Solutions shall:
The KCTCS Chancellor, KCTCS Vice President primarily responsible for Student Services, KCTCS Vice President primarily responsible for Human Resources, and the KCTCS Vice President primarily responsible for Finance shall:
The KCTCS Vice President primarily responsible for Institutional Advancement shall:
KCTCS Legal Services shall:
The system-level Information Security Officer shall:
The system-level Senior Information Security Analyst shall:
The college presidents/chief executive officers shall oversee information intended to reside primarily at the college and supervise the information technology located at their college. The college president/chief executive officer shall:
The college-level Information Security Officer shall:
The college senior administrator primarily responsible for information technology shall:
4.2.5.5 Orientation Training, Ongoing Professional Training and Annual Compliance and Acceptance Review of Responsible Use of Information and Information TechnologyAll KCTCS employees shall:
Some KCTCS employees may be required to complete advanced training based on their level of access. 4.2.5.6 Non-compliance Regarding Responsible Use of Information and Information TechnologyKCTCS students, employees, affiliates, and authorized guests shall comply with related laws and KCTCS policy. Violations shall not be permitted and shall be addressed appropriately by KCTCS. 4.2.5.6.1 Examples of Non-compliance Regarding Responsible Use of Information and Information TechnologyViolations of this policy or any attempt to violate this policy constitute irresponsible use. Violations include, but are not limited to: Privacy
Lawfulness
Integrity of Information and Information Technology
Courtesy
4.2.5.6.2 Potential Implications of Non-Compliance Regarding Use of Information and Information TechnologyFor a student found to have made irresponsible use of information or information technology, the consequences shall be appropriate disciplinary action up to and including, but not limited to, expulsion. For an employee found to have made irresponsible use of information or information technology, the consequences shall be disciplinary action as appropriate, up to and including, but not limited to, termination. In addition, KCTCS may require the individual to reimburse KCTCS for the computing and personnel charges incurred in the investigation of violation of the rules, including compensation of staff hours and costs for external services provided. As appropriate, an employee may receive additional training related to the use of information or information technology, be reassigned to another position or other duties in which the employee will not be responsible for using the particular information or information technology, and/or have all or part of their access to information or information technology changed or revoked. Violations of KRS 434.840 through 434.860 (Unlawful access to a computer) may be referred to the Commonwealth Attorney or the police for investigation and/or prosecution. Similarly, violations of 18 U.S.C. Sec. 1030 (Computer Fraud and Abuse Act) may be referred to the Federal Bureau of Investigation. |