Boyce Thompson Institute for Plant Research, Inc. POLICIES AND PROCEDURES Electronic Communications Policy Issued: April 23, 2009 Responsible Office: Information Technology Manager Policy Statement This policy establishes the ways in which members of the Boyce Thompson Institute may access and use its electronic communication systems, including electronic mail, access to and use of the World Wide Web, telephones, and any other electronic communications. BTI reserves the right to change this policy at any time as may be required. Reason For Policy BTI maintains an internal electronic communications system and utilizes Cornell University systems. The Institute, through its the Electronic Communications Policy seeks to enforce policies regarding harassment and the safety of individuals, to protect the Institute and Cornell University against seriously damaging or legal consequences due to the misuse / abuse of its electronic communication systems, to prevent the posting of proprietary information in disregard of copying restrictions or contractual obligations, and to safeguard the integrity of computers, networks and data. Entities Affected By This Policy All Individuals / Labs / Units within BTI who utilize any electronic communication systems maintained by BTI. Who Should Read This Policy All Individuals / Labs / Units within BTI who utilize any electronic communication systems maintained by BTI. Website Address For This Policy http://bti.cornell.edu/PoliciesProcedures.php Related Documents BTI Documents Other Documents BTI Computer Security Policy BTI Authentication to BTI Information Technology Resources Policy Cornell University Policy: Responsible Use of Electronic Communications Contacts Subject Matter Policy Clarification Computers and Network Systems Office Name IT Manager IT Manager Telephone Number 607 254 4758 or 1250 607 254 4758 or 1250 1 Email/URL btihelp@cornell.edu btihelp@cornell.edu Policy Name: Electronic Communications Policy Date of most recent changes: April 23, 2009 Harassment Reporting Violations Human Resource Director IT Manager 607 254 1239 Jmc498@cornell.edu 607 254 4758 jcc25@cornell.edu VIII. Definitions Term Electronic Communications Network systems BTI Computers and network systems Definition. Electronic mail, use of the world wide web, telephones, or any other electronic communications Internet, electronic mail systems, Ethernet and wireless networks, servers Any computer or network device owned by BTI or located on the BTI network Responsibilities Party All Individuals / Labs / Units within BTI IT Manager Human Resource Director List of Responsibilities Adhere to policy provisions Ensure that Need to complete Verify with Lab Member that computer purchases meet policy guidelines. Notify IT Department staff when any new computer arrives. Policy Statement BTI maintains an internal electronic communications system and utilizes Cornell University’s systems. The purpose of all systems is to conduct business; personal use should be kept to an absolute minimum and done only during unpaid work hours. All messages, data and documents composed, sent, or received via the electronic communications systems are and remain the property of BTI. They are not the private property of any employee. BTI reserves and intends to exercise the right to review, audit, intercept, access and disclose all electronic communications and data created, received or sent over the electronic communications systems for any purpose. The confidentiality of any electronic data should not be assumed. Even when a message is erased, it is still possible to retrieve and read that message. Notwithstanding BTI’s right to retrieve and read any electronic communication, such communication should be treated as confidential by other employees and accessed only by the intended recipient. Employees are not authorized to retrieve or read any e-mail messages, documents or communications that are not sent to them. Any exception to this policy must receive prior approval by a member of BTI management. Employees shall not use any access code or password or access a file, or retrieve any stored information, unless authorized to do so. Employees should not attempt to gain access to another employee’s messages or data without the latter’s permission. When an employee separates from BTI, he/she should work with his/her supervisor to properly clean up or transfer ownership of electronic files. 2 Policy Name: Electronic Communications Policy Date of most recent changes: April 23, 2009 Any employee who violates this policy or uses the electronic communication system for improper purposes shall be subject to Institute, University and other appropriate disciplinary procedures. BTI reserves the right to limit access to its network when applicable polices or codes, contractual obligations or state or federal laws are violated. BTI reserves the right to remove or limit access to material posted on BTI-owned computers when BTI policies, contractual obligations or state or federal laws are violated.. Policy Violations Examples of violations of this policy include, but are not limited to, the following: To solicit or proselytize form commercial ventures, religious or political causes, outside organization or any other non-job related solicitations. BTI has established an optional subscription list for non-work related messages called BTIREC-L. To create, distribute or print any harassing, offensive or disruptive messages or images To access, create, distribute or print sexually explicit messages, content or images; To distribute or print communications that are sexual in nature or that are motivated by race, ethnicity, religion, gender or sexual orientation To send or receive copyrighted materials, trade secrets, proprietary financial information or similar materials without prior authorization To falsify or fabricate research data, to steal another individual’s work, to misrepresent one’s own work or to force academic or research achievement; To launch a computer virus or other rogue program To jam or bomb electronic mailboxes or any other electronic communications systems To prevent others from accessing communications systems To send forged email using someone else’s email address BTI receives the right to evaluate, on a case-by-case basis, the appropriate use of its electronic communications systems and is the final determiner of what is or is not appropriate electronic communications. Reporting Violations If you believe that a violation of this policy has occurred, contact the IT Manager who will report the incident to the Human Resources Manager. A determination will be made as to whether other offices need to be contacted (i.e., Cornell's Office of Information Technology, CU Police, etc.) The IT Manager and the HR Director will investigate the incident immediately and determine the nature and extent of the violation. A written document of the investigation will be prepared and presented to appropriate parties. If necessary, the individuals involved will be placed on a paid leave of absence pending the results of the investigation. Appropriate disciplinary measures will be taken, up to and including termination of employment. If necessary, the University, CU Police or other appropriate authorities will be notified. 3