Policy on Computing and Network Resource Use

New England Institute of Technology (NEIT) maintains and makes available to the campus community of students, faculty, and staff, computer information systems and network infrastructure resources (e.g. email, Internet, Intranet, and a wide variety of computer programs and applications, hereafter referred to as “Computing & Network Resources”) to support its business activities, academic programs, and related activities.

The use of NEIT’s Computing & Network Resources is a privilege. The effective use of those resources requires the mutual respect and cooperative conduct of all users to ensure that everyone has necessary access and protection from interference or harassment. Following is NEIT’s policy with regard to use of, access to, and disclosure of NEIT’s Computing & Network Resources.

Privacy and Confidentiality Considerations: NEIT will make reasonable efforts to maintain the integrity and effective operation of its Computing & Network Resources, but users are advised that the systems should in no way be regarded as secure media for the communication of sensitive or confidential information. Because of the nature and technology of electronic communication, NEIT can assure neither the privacy of an individual user’s use of NEIT’s Computing & Network Resources, nor the confidentiality of particular messages or materials that may be created, transmitted, received, or stored thereby.

Authorized Users: Only NEIT faculty, staff, students and other persons who have received permission under the appropriate NEIT authority are authorized users of NEIT’s Computing & Network Resources. All authorized users will be issued a “username” and a “password” to access the various Computing & Network Resources available. Certain employees may also be provided with access to specific applications which are further protected by some form of additional “username” and “password.”

The use of “usernames” and “passwords” is an important aspect of NEIT’s Computing & Network Resources security. Usernames and passwords are the front line of protection for information maintained on the system. PROTECT YOUR “USERNAME” and “PASSWORD”. DO NOT SHARE THEM WITH ANYONE, including students or other employees. All “usernames” and “passwords” are to be treated as confidential NEIT information.

Permitted Uses of NEIT’s Computing & Network Resources: The use of NEIT’s Computing & Network Resources is provided to support NEIT’s business activities, academic programs and related activities. Computing & Network Resources shall be used in a manner consistent with those purposes. All activities inconsistent with those purposes are considered to be inappropriate and may jeopardize a user’s continued use or access to NEIT’s Computing & Network Resources.

Prohibited Uses of NEIT’s Computing & Network Resources:

  • Developing or executing programs that could harass others, infiltrate the system, or damage or alter the software components of the system.
  • Violating others’ privacy, tampering with security provisions, or attempting entry to non-public hosts.
  • Threatening, harassing, intimidating or otherwise violating the legal rights of others.
  • Publishing, posting, collecting, distributing or disseminating defamatory, infringing, obscene, unlawful, or other inappropriate material or information via the Internet.
  • Using for monetary gain or for commercial purposes that are not directly related to NEIT business or educational programs.
  • Copying, uploading or sending copies of documents or software programs in violation of copyright laws.
  • Deleting any author attributions, legal notices or proprietary designations or labels in a file in violation of copyright laws. (Software programs are protected by Section 117 of the 1976 Copyright Act. Unless they have written the program themselves, users do not have the right to make and distribute copies of programs without specific permission of the copyright holder.)
  • Falsifying the source or origin of software or other material contained in a file in violation of copyright laws.
  • Uploading files that the user has reason to believe contain a virus or corrupted data.
  • Accessing information or data for any purpose restricted or prohibited by laws or regulations.
  • Accessing the computing or networking system in a manner that adversely affects the availability of NEIT resources to other members of the university community.
  • Excessively using computing and networking resources (e.g., tying up resources through game playing or other trivial applications; sending frivolous or excessive mail, including chain mail; downloading video, audio, etc.; or printing excessive copies of documents, files, images, or data).
  • Attempting to access electronic mail without authorization or attempting to breach any security measures on any electronic mail or computer system or attempting to intercept or actual interception of any electronic mail or internet transmissions without proper authorization.
  • Physically abusing any computing equipment or supplies. (Incidences will be reported to Public Safety and to the appropriate administrative office.)
  • Downloading or use of Instant Messaging Services on NEIT computers without prior consent of NEIT.
  • Removing laptop computers containing sensitive or proprietary data or information, from campus.

No data that is classified as credit card or financial account information (including bank or other account numbers and routing information) shall be captured, transmitted, or stored via New England Tech email. This includes but is not limited to social security numbers, financial account & routing information, or tax forms. Data classified as personally identifiable information (PII), sensitive organization data, medical records/HIPPA protected information or information found in background checks, should only be captured, transmitted, or stored via New England Tech email for internal use only (i.e. only to and from [between] neit.edu email addresses). If it is necessary to exchange PII, sensitive, or protected information with an external party, encrypted email must be used. NEIT business must be conducted using NEIT email; the use of personal email accounts to conduct NEIT business is strictly prohibited.

NEIT Access, Inspection and Disclosure of Computing & Network Resources

  • NEIT reserves the right to access, inspect and disclose the contents of Computing & Network Resources as deemed necessary in its sole discretion without consent of the user.
  • To the extent permitted by law, NEIT reserves the right to access and disclose the contents of faculty, staff, students’, and other users’ electronic mail without the consent of the user.
  • Faculty, staff, students and other users are advised that NEIT’s Computing & Network Resources should be treated like a shared filing system, i.e., with the expectation that communications sent or received with the use of NEIT resources may be made available for review by any authorized NEIT official for purposes related to NEIT business.
  • Electronic mail and other data of students may constitute “education records” subject to the provisions of the federal statute known as the Family Educational Rights and Privacy Act of 1974 (FERPA). NEIT may access, inspect, and disclose such records under conditions that are set forth in the statute.
  • Any user of NEIT’s Computing & Network Resources who makes use of an encryption device to restrict or inhibit access to his or her electronic mail must provide access to such encrypted communications when requested to do so under appropriate NEIT authority.
  • Limitations on Disclosure and Use of Information Obtained: NEIT may, in its sole discretion, disclose the information contained in NEIT’s Computing & Network Resources to the extent permitted by law, without permission of the user.

Disciplinary Action: Violations of the policy on Computing & Network Resources Use may result in the immediate suspension of Computing & Network Resources privileges, disciplinary action, including but not limited to, suspension or expulsion from employment, and/or legal action.