Duo will protect Confluence as of Saturday, Nov. 27. Please visit go.rowan.edu/change for more information.
ROWAN UNIVERSITY POLICY
Title: Acceptable Use Policy
Subject: Information Security
Policy No: ISO:2013:01
Issuing Authority: Senior Vice President for Information Resources and Chief Information Officer
Responsible Officer: Director of Information Security
Date Adopted: 07/01/2013
Last Revision: 02/28/2019
Last Review: 02/27/2019
This policy sets forth the acceptable uses regarding the access and use of Rowan University's electronic information and information systems.
Under the direction of the President, the Chief Information Officer and Director of Information Security shall ensure compliance with this policy. The Vice Presidents, Deans, and other members of management will implement this policy in their respective areas.
This policy applies to all members of the Rowan Community who access and use the University's electronic information and information systems.
Refer to the Rowan University Technology Terms and Definitions for terms and definitions that are used in this policy.
The University expects users will access and use the University's electronic information and information systems in a manner that:
Does not compromise the confidentiality, integrity, or availability of those assets; and
Reflects the University's standards as defined in the Code of Conduct/Statement of Principles and its body of policies, and in accordance with all applicable federal, state, and local laws governing the use of computers and the Internet.
These obligations apply regardless of where access and use originate: Rowan office, classroom, public space, lab, at home, or elsewhere outside the University.
The rules stated in this policy also govern the use of information assets provided by the State of New Jersey, other state and federal agencies, and other entities that have contracted with Rowan to provide services to their constituents and/or clients.
Schools, units, and departments may produce more restrictive policies. Therefore, users should consult with their department if there are any other restrictions in place that supplement this policy.
This policy and Rowan's Code of Conduct/Statement of Principles also govern access and use of the University's electronic information and information systems originating from non-Rowan computers, including personal computers and other electronic devices. The access and use of electronic information provided by research and funding partners to Rowan are also governed by this policy.
The use of information systems acquired or created through the use of University funds, including grant funds from contracts between the University and external funding sources (public and private), are covered by this policy. This includes University information systems that are leased or licensed for use by members of the Rowan Community. Users are given access to Rowan's electronic information and information systems specifically to assist them in the performance of their jobs and education. They are not provided for personal use. They are responsible for all activity conducted using their computer accounts. Access and use of the University's electronic information and information systems is a revocable privilege.
Rowan recognizes that all members of the Rowan Community have an expectation of privacy for information in which they have a substantial personal interest. However, this expectation is limited by Rowan's need to comply with applicable laws, protect the integrity of its resources, and protect the rights of all users and the property and operations of Rowan University. As such, Rowan reserves the right to access, quarantine, or hold for further review any files or computing devices on the Rowan's network or its information technology resources if there is just cause to believe that university policies or laws are being violated or if such access is necessary to comply with applicable law or conduct university business operations.
Information created, stored, or accessed using Rowan information systems may be accessed and reviewed by Rowan personnel for legitimate systems purposes, including but not limited to the following:
Emergency Problem Resolution
To measure, monitor, and address the use, performance, or health of the University's information systems, or to respond to information security issues. Internet usage may also be monitored when using the University's network, including when using Rowan's remote access services.
To create data backups of electronic information stored on Rowan's information systems.
To respond to User Requests approved by the Office of General Counsel.
Information may be accessed, reviewed, and provided to an external party at the University's discretion without prior notification with adequate cause and subject to review of the Office of General Counsel to comply with applicable law and to conduct normal university operations. Examples include, but are not limited to the following:
Compliance with the New Jersey Open Public Records Act ("OPRA") which requires disclosure of electronic records and other data on the Rowan system subject to exemptions under OPRA. Requests will be reviewed by the Records Custodian/OPRA officer in conjunction with the Office of General Counsel.
Compliance with a valid subpoena, court order, or discovery request. Requests will be reviewed by the Office of General Counsel.
Audits, investigations, or inquiries undertaken by governmental entities or appropriate internal investigators or units. Requests will be reviewed by the Office of General Counsel.
To conduct necessary business operations.
All electronic information created, stored, or transmitted by use of Rowan's information systems is the property of the University, unless otherwise explicitly noted.
Technicians and System Administrators have greater ability to access information stored on and transmitted through Rowan's information systems. As such, Technicians, Systems Administrators, and others with privileged access shall not access such information unless such access is necessary for the purposes outlined above for systems purposes or unless such access is supported by adequate cause and reviewed by the Office of General Counsel.
The list of prohibited actions is not intended to be comprehensive. The evolution of technology precludes the University from anticipating all potential means of capturing and transmitting information. Therefore, users must take care when handling sensitive information. Refer to Rowan's Information Classification and Data Governance policies for types of information that are considered sensitive and/or contact Rowan's Information Security Office for guidance.
Users, at minimum, will ensure that they do not:
Distribute information classified as Confidential or Private, or otherwise considered or treated as privileged or sensitive information, unless they are an authoritative University source for, and an authorized University distributor of that information and the recipient is authorized to receive that information.
Share their passwords with other individuals or institutions (regardless if they are affiliated with Rowan or not) or otherwise leave them unprotected.
Attempt to uninstall, bypass, or disable security settings or software protecting the University's electronic information, information systems, or computer hardware.
Engage in unauthorized attempts to gain access or use the University's electronic information, information systems, or another user's account. Users with privileged access, such as Technicians, Systems Administrators, shall not engage in unauthorized access, use, or review of information or data, without appropriate approvals.
Use third-party email services to conduct sensitive University business or to send or receive Rowan information classified as Confidential, Private or Internal or otherwise considered privileged or sensitive information.
Use email auto-forwarding to send University information (regardless of classification) to non-Rowan email accounts (see Restricted Services).
Distribute or collect copyrighted material without the expressed and written consent of the copyright owner or without lawful right to do so, such as in the case of fair use.
User understands the HIPAA Privacy Security rules, especially with regard to Sensitive Electronic Information (SEI), Private Health Information (PHI), and Personally Identifiable Information (PII) and will abide by these rules, including understanding that they will be held accountable for the use of personal devices for conducting University business. The Rowan Community shall not use personally-owned devices to access clinical data unless the device is running the Rowan operating system standard image or the use of the device is approved by Rowan's Information Security Office. (Refer to HIPAA policies located at www.rowan.edu/compliance).
This list of restricted services is not intended to be comprehensive. The evolution of technology precludes the University from anticipating all potential means of storing, capturing and transmitting information. Therefore, when using third-party technology services not explicitly restricted in this policy, users must exercise care to not compromise sensitive Rowan information, particularly when confirmation of receipt or the identity of the recipient is required for business or legal purposes. Refer to Rowan's Information Classification and Data Governance policies for types of information that are considered sensitive and/or contact Rowan's Information Security Office for guidance.
Restricted services include the following:
Social media tools or web content platforms cannot be used to communicate or store University information classified as Confidential or Private or otherwise considered privileged or sensitive by Rowan. Social media tools include, but are not limited to: Facebook, Twitter, LinkedIn, Instagram, Medium, Reddit, YouTube and Flickr.
For additional requirements on the use of social media, see the Social Media Policy.
Professional Social Media
Professional social media cannot be used to communicate or store University information classified as Confidential or Private or otherwise considered privileged or sensitive by Rowan.
The use of professional social media tools, such as Doximity and Sermo, cannot be used:
To discuss patient cases in a manner that compromises patient identity or privacy, or otherwise represents a violation of HIPAA's Privacy or Security rules, state or local privacy laws, or University policies.
To communicate or post information that could potentially reveal information classified as Confidential or Private or otherwise considered privileged or sensitive by Rowan, or which compromises the privacy of a member of the University community or its clients.
For additional requirements on the use of social media, see the Social Media Policy.
Cloud Services, Collaboration and Storage
Third-party cloud storage services cannot be used to store University information classified as Confidential.
Google Drive is approved for Private, Internal and Public data. For additional information on the use of Google Drive, seethe Google Apps: Appropriate Data Use.
The use of non-approved third-party cloud storage services cannot be used to store University information classified as Confidential or Private or otherwise considered privileged or sensitive by Rowan. Cloud storage tools include, but are not limited to: iCloud, Carbonite, OneDrive, Box, Dropbox, Evernote, OpenDrive and SugarSync.
Third Party Email Services
Third party email services cannot be used to communicate or store University information classified as Confidential or Private or otherwise considered privileged or sensitive.
Faculty, staff and medical students are not permitted to automatically forward or redirect messages from their primary email address to a non-Rowan email address.
Texting cannot be used to communicate or store University information classified as Confidential.
Video conferencing services are limited to Rowan business-use only and must be conducted using Rowan equipment. They are to be used strictly for business collaboration between members of the Rowan Community or outside entities, or for educational purposes. Users must ensure that video communications are done in a setting or configured to restrict the possibility of non-authorized individuals from viewing or listening to sensitive information.
The use of non-approved chat services cannot be used to communicate or store University information classified as Confidential or Private or otherwise considered privileged or sensitive by Rowan. Chat tools include, but are not limited to: Slack and HipChat.
Jabber is approved for Private, Internal and Public data.
BitTorrent software (or other file sharing software) used to download and share movies, music, and other copyrighted media is strictly forbidden unless it is used for Rowan business or academic purposes. The use of this software must be approved by the Dean or Department Head/Chair, and the Information Security Office.
VI. POLICY COMPLIANCE
Violations of this policy may subject the violator to disciplinary actions, up to or including termination of employment or dismissal from a school, subject to applicable collective bargaining agreements and may subject the violator to penalties stipulated in applicable state and federal statutes.
University sanctions, penalties, fines and discipline will be based on the severity of the incident per below:
Low – retraining and to be reviewed with the employee during annual appraisal. Also, any cost shall be borne by the Department. The Department Chair or VP will determine how these funds will be assigned.
Medium – retraining and to be reviewed with the employee during annual appraisal. Discipline will be considered up to and including dismissal from the University. Also, all costs will be borne by the Department. The Department Chair or VP will determine how these funds will be assigned.
High – retraining and to be reviewed with employee during annual appraisal. Discipline will be unpaid suspension for a minimum of three (3) days with a consideration of up to and including dismissal from the University. Civil and criminal penalties may apply. Also, all costs will be borne by the Department. The Department Chair or VP will determine how these funds will be assigned. The Deans of each College, Vice Presidents, and University President, with the assistance of the Department of Human Resources, will enforce the sanctions appropriately and consistently to all violators regardless of job titles or level within the University and in accordance with bargaining agreements for represented employees.
VII. ADDITIONAL INFORMATION
By Direction of the CIO:
SVP and Chief Information Officer