AUP

OIT Units - Policy, Planning and Cybersecurity 

FAQs - Acceptable Use Policy (AUP)

 

 

Questions:

Q1.  What is Montgomery College’s policy on the acceptable use of information technology resources?
Q2.  Why do we need a policy?
Q3.  What are my responsibilities under the AUP?
Q4.  What are the College’s responsibilities under the AUP?
Q5.  What are examples of inappropriate use?
Q6.  What if I need to do something related to my work but it is classified as inappropriate by the AUP?
Q7.  Who is in charge of making sure that the AUP is followed?
Q8.  What should I do if I suspect that someone is violating this policy?
Q9.  How are the investigations handled?
Q10.  What are the penalties for violations of this policy?
Q11.  Where do I go if I have questions about the Acceptable Use Policy?

Answers:

Q1. What is Montgomery College’s policy on the acceptable use of information technology resources?

 A. Montgomery College’s official policy on the acceptable use of information technology resources is defined by College policy and procedures, 66001/66001CP - Acceptable Use of Information Technology Resources ("AUP Policies").. The policy provides direction on the acceptable use of the College’s technology resources by members of the College community and non-College individuals who have been authorized to use these resources. The policy applies to all technology devices used at and supported by the College.

 Q2. Why do we need a policy?

 A. The College's AUP Policies provide standards for all with regards to the utilization of College technical equipment and facilities as well as standards of acceptable behavior towards other individuals while using these College resources. Adherence to these standards promotes good business, limits legal liabilities and supports the instructional mission of the College.

 Q3. What are my responsibilities under the AUP?

 A. Every technology user in the College community should be familiar with their specific user responsibilities as detailed in the policy. To summarize these responsibilities, every user should:

  • abide by the College’s security requirements
  • abide by existing federal, state, and local laws and regulations as well as license requirements
  • adhere to a standard of behavior that is not disruptive to the business of the College
  • promote good stewardship in the safeguarding of College files, records, and information.

 Q4. What are the College’s responsibilities under the AUP? 

 A. Montgomery College has the responsibility to adhere to industry standards and provide the optimum service levels possible to its students and employees. The College will take reasonable steps to assure that confidential information is protected appropriately and that its networks are protected from external threats that might prove to be disruptive to the business of the College. To the extent possible, the College will respect the privacy of its community members and treat all technology users fairly in accordance with College policies and procedures, federal, State of Maryland and local laws and regulations. The College’s responsibilities do not include providing error or defect free services and is not liable for any damages that users may incur due to such interrupted services or as a result of relying on information retrieved from the Internet.

 Q5. What are examples of inappropriate use?

A. It would be inappropriate to use Montgomery College technology to:

  • harass, threaten, or otherwise cause harm to members of the College community
  • use another person’s login and password to gain access to the College’s network and their files
  • connect non-College equipment that has not met College technical or security standards to the College network
  • ignore copyright laws or licensing agreements.

 Q6. What if I need to do something related to my work but it is classified as inappropriate by the AUP? 

 A. Inform your management of the task’s conflict with the AUP. If this does not change the direction of the work, contact the Office of Information Technology Policy Administrator (ITPA) for guidance.

 Q7. Who is in charge of making sure that the AUP is followed?

 A. Everyone who uses Montgomery College technology has the responsibility to make sure that the AUP is followed. The IT Policy Administrator (ITPA) working in coordination with the Office of General Counsel (OGC) has the responsibility of assuring that the AUP is effective and will investigate all reported violations in accordance with the AUP Policies..

 Q8. What should I do if I suspect that someone is violating this policy?

 A. Inform your supervisors that you suspect that someone is violating the AUP. If this does not stop the violation, notify the Office of Information Technology Policy Administrator (ITPA) of the situation.

 Q9. How are the investigations handled?

A. The ITPA is responsible for investigating and keeping a record of all reported violations. in accordance with the AUP Policies. During an investigation, information is gathered, appropriate affected parties are notified, and an incident damage assessment is performed. Assistance and guidance relative to the final disposition of the investigation may involve management from the office of the person under investigation, the Office of Human Resources, Development and Engagement (HRDE), and the OGC.

 Q10. What are the penalties for violations of this policy?

 A. Penalties for employee violations of the AUP are determined by the supervisor in consultation with the Director of Human Resources. Student disciplinary actions are handled by the campus Dean of Students. Violations that may involve existing federal, state or local laws will be referred to the OGC .

 Q11. Where do I go if I have questions about the Acceptable Use Policy? 

A. Questions about the Acceptable Use Policy should be directed to the ITPA on the ITPA Confidential Reporting Line (240) 567-3200 or by email to itpa@montgomerycollege.edu.