In support of its mission and goals of teaching and public service, Bellarmine University provides access to computing and information technology for students, faculty, and staff. The Technology Policy provides guidelines for responsible use of information technology, and applies to all members of the Bellarmine community. These following items provide a summary of some key points of the policies for which all users of campus technology are responsible. All members of the Bellarmine community are expected to abide by all related policies and guidelines.
1. Public computers and electronic devices are the property of Bellarmine University and are to be used for the primary purpose of benefiting, enhancing and furthering the mission of the University.
2. By using University-supplied technology, individuals and other entities agree to abide by all applicable policies and procedures adopted by the University, and/or with current state and federal laws, including, but not limited to, those relating to trademarks, service marks and copyright, defamation and discrimination.
3. University policies that address academic dishonesty, including theft, plagiarism, disruptive conduct and misuse of materials and property, must guide your computing activities, just as they guide your activities in the classroom, residence hall, or elsewhere on campus.
4. Access to computing resources is a privilege, not a right. The University reserves the right to limit, restrict, or extend computing privileges and access to its information resources.
5. All policies apply to all users of Bellarmine computing resources regardless of how those services are provided, i.e. locally or cloud-based.
6. Email usage:
a. Email transmissions are considered non-confidential communications and may be subject to disclosure through legal proceedings or otherwise through various laws that may be held to apply to such transmissions.
b. Email should only be used to communicate to individuals and/or small groups.
c. Sending electronic system-wide messages (mass mailings) is prohibited.
d. Sending or forwarding chain mail (which most often asks the recipient to copy and send the message to others) is prohibited.
e. Email storage will be limited for each user and everyone is expected to ensure there is adequate space in their inbox to receive new email from faculty and staff.
f. Users must never “REPLY ALL” when working with distribution lists.
7. Email and Account Termination:
a. For Faculty and Staff - Email and network accounts will be deactivated immediately upon separation from the University; exceptions may be granted for legitimate reasons and in those cases the email account will remain active.
b. For Students and Alumni - Email accounts exist on Microsoft Office 365 and will remain active indefinitely, provided the account is not abused and the student/alum remains in good standing with the University. If a student is suspended, their email account will also be suspended and unless readmitted to the University, the account will be disabled. Email accounts may be disabled and/or terminated for students who withdraw from Bellarmine prior to graduation. Exceptions may be granted for legitimate reasons, such as approved absences, and in those cases the email account will remain active.
8. Intentionally receiving, viewing, or transmitting pornographic information or images is prohibited. Materials are deemed pornographic at the sole discretion and judgment of the University.
9. Distribution of unsolicited advertising in any electronic format is prohibited.
10. Transmission of slanderous and/or harassing materials in any electronic format is prohibited.
11. Creation and/or propagation of computer viruses or worms is prohibited.
12. Campus technology is not to be used for illegal or criminal activities or for personal financial or commercial gain.
13. The University respects individual privacy and freedom, but will take necessary measures to protect systems and individuals; therefore, under certain circumstances a System Administrator may be authorized to access your computer files.
14. All software on Bellarmine University systems is licensed by Bellarmine University, and as such, may not be copied for personal use, transferred to non-Bellarmine University equipment or modified in any manner.
15. Use only those computers and computer accounts for which you have authorization.
16. Be responsible for all use of accounts and for protecting each account’s password. Do not share computer accounts and passwords.
17. Report unauthorized use of your accounts or violations of this policy to your supervisor, the Information Technology department or other appropriate University authority.
Alleged violations of the technology policy shall be handled in conjunction with the University's policies for employees. In some cases, an employee's computing privileges may be suspended immediately to protect the computing resources and to assure reliable service to the rest of the community. Employees who violate this policy will be subject to disciplinary action, up to and including termination of employment.
Workplace Monitoring Policy
Workplace monitoring may be conducted by Bellarmine to ensure quality control, employee safety, security, and customer satisfaction.
Employees who regularly communicate with customers may have their telephone conversations monitored or recorded. Telephone monitoring is used to identify and correct performance problems through targeted training. Improved job performance enhances our customers' image of Bellarmine, as well as their satisfaction with our service.
Computers furnished to employees are the property of Bellarmine. As such, computer usage and files may be monitored or accessed.
Bellarmine may conduct video surveillance of non-private workplace areas. Video monitoring is used to identify safety concerns, maintain quality control, detect theft and misconduct, and discourage or prevent acts of harassment and workplace violence.
Employees can request access to information gathered through workplace monitoring that may impact employment decisions. Access will be granted unless there is a legitimate business reason to protect confidentiality or an ongoing investigation.
Because Bellarmine is sensitive to the legitimate privacy rights of employees, every effort will be made to guarantee that workplace monitoring is done in an ethical and respectful manner.