Policy for the Use of Network Services and Electronic Information Resources Approved by: __________________ Vice-President « 04 » July, 2010 г. Content: 1. General Statement and Purposes 2. Audience 3. Access Order 4. Internet Use 5. Intranet and AUCA Folder System 6. E-Course System 7. E-mail Use 8. AUCA Web-Site Administration 9. Database usage 10. Privacy 11. Prohibited Activities 12. Personal Use 13. Responsibility and Policy Update Glossary 1. General Statements and Purposes .1. The objective of this policy is to define the provision of the University network services and electronic information resources; this policy communicates what is classified as acceptable and unacceptable with regards to services and resources and informs the users about their rights and responsibilities. .2. This Policy applies to all user categories. .3. American University of Central Asia (AUCA) through its technology support departments aims to provide safe, legal information and electronic environment to the entire University community. .4. The University network and technological infrastructure brings multiple benefits to all the AUCA community; it supports learning, teaching, research, mission of the University, and also provides technological support to university administration. .5. Detailed descriptions of the principles of forming, operating and using of different network resources and information services, as well as the responsibilities of the IRT staff who maintain operations, ensure reliability of information and secure both access to it and confidentiality of personal information, are reflected in current AUCA policies and internal IRT rules Policy for the Use of Network Services and Electronic Information Resources Page 1 of 12 .6. The policy assumes that the use of all University network services and electronic information resources are only for academic purposes, to enhance academic quality of the university educational, research and administrative work. .7. However, limited use of the university facilities for personal purposes is acceptable in so far as it does not impede the academic work of other users. In general, it is strongly recommended not to use the AUCA IT-system for personal purposes. .8. The Policy is based on the University’s regulations, current legislation of the Kyrgyz Republic, international legislation on copyright, as well as laws governing the content of Internet materials. .9. Violation of this policy invokes disciplinary action in accordance with the University Disciplinary Procedures. .10. This Policy is updated and revised regularly and can be expanded: in connection with newly available information resources and services, both in the University information space and beyond it; when introducing amendments in the AUCA normative documents directly related to this Policy; in case of changes in the legislation on copyright, use of the internet and other laws on secure use of the global information resources. 2. Audience 2.1. This policy applies to all users of the AUCA information resources and services, who have regular or temporary access, irrespective of the access mode, including: All categories of AUCA community: administrative staff, faculty, non-academic staff; students; alumni; AUCA visitors and guests, who arrive for a fixed term and who are granted an authorized access to the university information resources and services for the period in question; trainees and faculty of the Continuing Education Center for the period of studies; members of open events (conferences, workshops, forums, etc) and other categories of users who for a given period. are granted common access to the information resources and services via university IT, irrespective of the types of equipment and mode of access 3. Access Order 3.1. Authorized access to the AUCA information resources and services for a user is granted on the basis of documentation of the contract of an employee or proof of enrollment of a student, when backed by the University for a specified period. Common access to the AUCA information resources and services for other user categories is opened on the basis of an order / prescription / request for holding an event. 3.2. Access to the AUCA information resources and services is provided through the systems, coordinated and administered by the technical services of the IRT Department on the basis of existing University rules and regulations, as well as technological instructions of IRT. 3.3. To authenticate a user in the University computer system, an account is created with a unique name, and a password is assigned, which provides a user access to the information resources and services of the University Policy for the Use of Network Services and Electronic Information Resources Page 2 of 12 3.4. The following types of information resources and services are available for users: electronic resources of the AUCA library (including in a remote access mode); the system of e-courses and electronic reservation of courses, limited personal information space, the system of course folders with authorized access (comprising electronic information resources and services that support academic and social activities), resources and services of the Internet, the possibility of using e-mail with a fixed mailbox size, as well as other services and resources presented on the IRT website. 3.5. Current students can access via the computers installed in the library, computer labs, corridors and educational multimedia classrooms, as well as in various departments, where students carry out their activities (Business Clinic Office, Office of Student Affairs, Law Clinic Office, SRC Office, and etc.) 3.6. Full-time and part-time faculty and staff can access via the workstations installed at their workplace, in a computer lab for instructors, classrooms equipped with computer and projection equipment, including portable projection kits. 3.7. Any person with an account in the AUCA computer system can use his/her own PC to connect in the University Wi-Fi zones. 3.8. Remote access to the AUCA open information resources and services is possible through the Web-portal www.auca.kg 3.8 The University reserves all rights for its owned and operated computer and electronic information resources and services, as well as for the termination of access to them in cases specified in this Policy. 3.9. The university management (Top Administration), administrators of databases, professional packages, Web-sites and Web-pages, IRT officers under their official powers, have privileged access to information resources and services. The order of access to relevant information resources and services, as well as the responsibility for the security and confidentiality of information for this category of users is stipulated in the policies of respective resources or services. For technical questions of access to the University information space contact IRT. 4. Internet Use 4.1. The Internet facilities at AUCA are provided to support the mission and primary aims of the University including teaching, research, administration and community service. 4.2. Internet access is available to registered users of the AUCA computer network both from workstations of the AUCA computer network and from communication equipment connected through the Wi-Fi zone, on condition of the user login authorization. 4.3. Any personal use shall not interfere with normal University activities, shall not involve solicitation, shall not be associated with any outside for-profit activity, and shall not potentially damage the University’s reputation. 4.4. All students, faculty and staff are responsible for ensuring ethical and lawful Internet usage, in line with the AUCA regulations. 4.5. All software used to access the Internet on AUCA-owned computers, shall be legally purchased as part of the AUCA standard software suite. This software must incorporate all the vendor provided security patches. Users of personal computers (or other communication equipment) connecting through the Wi-Fi zones, are personally responsible for the software installed on that equipment. 4.6. All files downloaded from the Internet via AUCA computers, by default, are automatically scanned for viruses using the AUCA approved virus detection software Policy for the Use of Network Services and Electronic Information Resources Page 3 of 12 suite. Users of the AUCA Internet and e-mail services who make the connection via the Wi-Fi zone are responsible for using up-to-date virus detection software and its updates on their own equipment. 4.7. Any images, materials, software or files downloaded via the Internet into the University network may only be used with appropriate licenses or copyrights. 4.8. All AUCA students and staff who use the Internet shall understand the importance of keeping confidential the University information, user data and any other material covered by existing AUCA policies and procedures. 9.4. The Internet resources are distributed in line with the adopted regulations, based on the University domestic priorities established in the IRT internal instructions, applicable to all users. 5. Intranet and File’s Folder System 5.1. The AUCA Intranet system combines internal computer and information resources of the university. The Intranet provides access to up-to-date and relevant information and services, sharing views, possibility for team work, improvement of services to users. 5.2. Access to intranet resources is differentiated and is granted through appropriate permits, approved by head of the unit which the user belongs to, as well as by the director of IRT. 5.3. Each faculty member can open an electronic course folder in the files and folders system, and shall address the IRT Director with an appropriate application. Application forms for opening a folder can be found on the IRT site. 5.4. A folder can be opened for the organization of collective work, for which purpose an application shall be also submitted to the IRT Director. 5.5. AUCA Intranet resources, if not stipulated otherwise, are not accessible from the Internet. The list of exclusions is given in Appendix A and can be adjusted following the changes of technical, external, or other conditions. Materials that are placed in the University servers, in a File’s Folder System, are subject for assignment of quotas and reserve copying. An access to these resources is differentiated. Detailed description of the restrictions is under the internal instruction of IRT. 5.6. All materials placed at the File’s Folder System are likely to be protected by copyright, for example, written materials and artwork. 5.7. Only copyright owners, or persons possessing the owner’s consent, have the authority to copy or distribute such materials, thus the materials shall not be used on the Intranet without appropriate prior consent. 5.8. All published content on the File’s Folder System must be approved by Head of Department of by persons with delegated responsibility. 6. Electronic Course System (e-Course System) 6.1. The AUCA ‘e-Course System’ of the Academic Programs and Departments is used as a tool to organize distant learning and to supplement and support traditional face-to-face courses. The system is designed on the basis of specialized open-source Moodle software for the purposes of learning management. 6.2. A user with an authorized access to the AUCA computer network can create an account in the e-Course system. Policy for the Use of Network Services and Electronic Information Resources Page 4 of 12 6.3. The e-Course System can be accessed from any computer connected to the Internet. Each faculty member has the right to open an e-course in the e-Course system, for which an appropriate application shall be submitted to the Director of IRT. The application form for the opening of the course is available on the IRT site. 6.4. The faculty member shall be responsible for the content of an e-learning course 6.5. The faculty member owns the copyright for the electronic course he posted in the eCourse System. It is possible to open a web page in the e-Course system for collective work, for which an application shall be submitted to the Director of IRT. 6.6. At the end of each academic semester, access to the electronic course is automatically blocked. Backup copies of e-learning courses are created in accordance with IRT rules established in the regulatory documents. 6.7. Electronic course reservation (e-reserve) is an integral part of the University e-learning courses, and provides information support to the courses taught at the University, in digital environment. This service is available through the web-site of the IRT Department and AUCA libraries. 7. E- Mail Use 7.1. Electronic media and services are used in AUCA primarily to support the University’s mission of learning, teaching, administration, and research. Limited, occasional or incidental use of e-mail (sending or receiving) for personal purposes is understandable and acceptable where such use does not contravene this policy. 7.2. A personal e-mail address on the AUCA mail server can be opened for AUCA students, faculty and staff, registered by the Human Resources or the Registrar Offices as an active employee or active student of AUCA. 7.3. AUCA visitors (including researchers) can acquire a personal e-mail address on the AUCA mail server, for the period of their official activity in the University, by submitting an appropriate request to the head of IRT department and head of the department he/she was invited to. 7.4. In case of graduation or expulsion, a student can use his/her personal e-mail account only for the next 2 months; after 2 months, the account will be automatically deleted. 7.5. Ex-employees with expired or interrupted contract, if not stipulated otherwise, can use their personal e-mail accounts only for the next 2 months. If a new contract has not been concluded during this period, their accounts will be automatically deleted. 7.6. All accounts that are inactive for 6 months may be disabled by the authorized IRT staff. 7.7. Users of the AUCA mail-system are responsible for all e-mail messages originating from the account they signed for. 7.8. Users with university email accounts are required due use and management of their accounts. Acceptable uses of electronic mail include subscriptions to List Servers, professional communications, notices of university activities and personal correspondence. 7.9. Users should ensure that unauthorized people do not have access to their e-mail accounts. Policy for the Use of Network Services and Electronic Information Resources Page 5 of 12 7.10. AUCA mail-system users should sign all e-mail messages with a name enabling the intended recipient to identify the sender. An e-mail address or username is not always sufficient. 7.11. The University System owns the e-mail system and information transmitted and stored within the system. Students and staff have no expectation of privacy or confidentially in any of their e-mails. Address information of E-mail may be monitored and is subject to inspection at any time by authorized IRT staff under the request of authorized administrative staff or officials (paragraphs 10.7.2. and 10.7.4), according to the statements proposed in item “10. Privacy” of current policy and the internal instruction of IRT. 7.12. Users shall avoid in their e-mail messages any form of racial or sexual harassment or wording which could cause offence and give rise to action under the University disciplinary policies. 7.13. Where attachments are in use, users should exercise caution when including material from other sources and bear in mind that copyright must be respected. 7.14. Users should avoid sending large documents as attachments, the maximum size of attachments is determined by the IRT. 7.15. E-mail should not be used for contractual matters and users should be careful not to send a message which accidentally sets up a contract. 7.16. Mass mailing (mailings to large groups of faculty, staff, and/or students) to a target audience through the AUCA Mlist mailing system can be done only from a limited number of computers in the University. A complete list is specified in the IRT internal instructions. Access to this system is registered by a separate user account. To obtain access, an application shall be submitted to the Director of IRT. Application forms are available on the IRT web-site. 7.17. Mass mailing messages in the AUCA E-mail system can only be distributed by approved responsible persons (departments), and the mailing shall only comprise information related to the departmental activity. These lists include, but are not limited to: 7.17.1. Announcements of university organized and sponsored events 7.17.2. Announcements of official policies or changes in policy 7.17.3. Announcements of disruptions or changes in services (i.e., upgrades to campus network, etc.) 7.17.4. Announcements from the governance groups or departments (President’s office, Academic Senate, Student Senate, SRC) 7.18. Mass mailing of messages is only possible if the information applies to all members of the target audience. 7.19. All approved mass email messages will contain the following: 7.19.1. Subject line with clearly-stated subject 7.19.2. Recognizable prefix in subject that identifies it as University mass email 7.19.3. From: a line that contains email address of sender 7.19.4. To: a line that includes the University group to which the mass email is sent 7.19.5. Signature information that gives sender’s name and department 7.20. In the event of a system disaster, email will be restored to the state of user email accounts on that server at the time of the last back-up. IRT cannot guarantee that all messages can be restored. 7.21. IRT is not able to restore individual messages on email servers if deleted by the users themselves. Policy for the Use of Network Services and Electronic Information Resources Page 6 of 12 8. Database Usage 8.1. Administration of the University database is provided by the IRT Software Development and Database Management. The department staff is responsible for maintaining the information integrity of databases, as well as for configuring servers for user access, in accordance with their rights. 8.2. Access to the system services using the database, is in an automatic mode for a certain category of users. Administration of system services is performed by IRT staff. 8.3. Authorized staff of AUCA offices and departments has access to the databases which are needed to perform their duties and to the extent of their official duties. Access is open only by responsible persons on the basis of applications submitted by heads of offices and departments to the Director of IRT, with an indication of the level of access. 8.4. IRT provides regular backups of the databases listed in a separate internal IRT instruction. 8.5. Access to databases of electronic publications and to the library electronic resources and databases is granted automatically to all authorized users, unless stipulated otherwise. 9. AUCA Web-Site Administration 9.1.The Public Relations Office and Webmaster supervise administration of the University website. They are responsible for maintaining information on the site, ensuring under the guidance of the President’s Office, that posted materials are valid, and that the University reputation is not compromised through publishing of copyright material. 9.2. The names and status of employees, as well as any official contact information are published in the section of the Web-site related to the department. 9.3. Personal information about an employee shall not be published on the AUCA Web-site without the employee’s consent and shall not contravene the AUCA rules and laws of KR. If necessary, this information can be published elsewhere on the Internet to enhance normal functioning of the University, with obligatory notification of the employee, whose details are transferred to a third party. 10. Privacy 10.1. AUCA supports a climate of trust and respect and does not ordinarily monitor student or employee use of the Internet, but in some cases considered necessary and legally appropriate, all information may be accessed. 10.2. Users of the University information space shall be aware that there is no legitimate expectation of privacy in their use of any information transfer system provided or facilitated by the University. 10.3. Information resources may be accessed as needed with administration permission, for the purposes of information system administration and maintenance, resolution of technical problems, security monitoring, administrative review, and other AUCA policies. 10.4. The University has a legitimate right to capture and inspect any data stored or transmitted on the University’s IT and network facilities (regardless of data ownership), when investigating system problems or potential security violations, and to maintain system security and integrity in case of problems and in coordination with the University administration. 10.5. The University reserves the right to monitor activity to ensure that the systems are used for legitimate business purposes including the following: 10.5.1. To prevent or detect unauthorized disclosure of any information confidential to the University. Confidential information includes details of the University’s students, suppliers, employees, financial or trading results, and any details relating the University’s services. Policy for the Use of Network Services and Electronic Information Resources Page 7 of 12 10.5.2. To ensure that the University's Network is not carrying illegal material (such as child pornography); 10.5.3. To comply with the law; 10.5.4. To investigate allegations of abuse of the service; 10.5.5. To investigate alleged misconduct; 10.5.6. When diagnosing Network or e-mail server malfunction; or 10.5.7. To fulfill any other authorized need that may occasionally occur. 10.6. The University reserves the right to monitor patterns of computer use, websites accessed, connection lengths and times at which connections are made. These may be monitored for legitimate purposes including: 10.6.1. Cost analysis; 10.6.2. Resource allocation; 10.6.3. Optimum technical management of information resources; 10.6.4. Detecting patterns of use that indicate students, faculty or staff members are violating University policies (or the KR legislation) or engaging in unauthorized activities. 10.7. The University does not intend to release information, available from Internet access logs, namely, an identification of any individual with an access to a particular URL . Detailed URL information will not be released to persons within or outside of the University, except in response to: 10.7.1. Permission from the user; or 10.7.2. Request from the AUCA top administration, Deans and Directors, accepted by the Director of IRT or delegated persons, to investigate a potential breach of the policy; or 10.7.3. Cases deemed by the University as appropriate for ensuring the statutory rights of individuals in matters such as privacy, copyright, occupational health and safety, equal employment opportunity, harassment and discrimination; or 10.7.4. An official request from an appropriate law-enforcement officer investigating an apparently illegal act, including a court order; or relevant regulations. 11. Prohibited Activities 11.1.The use of electronic information and technology infrastructure of the University is illegal for the following activities (including but not limited to): 11.1.1. Junk and spam: create or distribute chain letters, "junk" or "spam" (mass, unsolicited) mail; 11.1.2. Commercial activities: whatever activity that is not related to University and not authorized by Administration for earning money; 11.1.3. Pornography: visit internet sites that contain pornographic, obscene or offensive content. The transmission, retrieval or display of any kind of pornographic image or document on any University system is a violation of the policy on sexual harassment. Pornographic material may not be archived, stored, distributed, edited or recorded using the network or computing resources. 11.1.4. Hacking: try to make the specific software or web-scripts to do the actions, that were not described by the author; 11.1.5. No person shall use the University Internet facilities to deliberately propagate any virus, worm, Trojan horse, or other malicious program code; 11.1.6. Unauthorized security testing: network scanning or open ports detection is a forbidden action that breaks the law of some countries; Policy for the Use of Network Services and Electronic Information Resources Page 8 of 12 11.1.7. Downloading entertainment software or games, or playing games against opponents over the Internet; 11.1.8. Sending anonymous e-mail messages; 11.1.9. Accessing chat rooms; 11.1.10. Sharing or extending username and password information to other people, even to relatives; 11.1.11. Deliberate use of University facilities to download or distribute pirated software or data, music or video; 11.1.12. Promotion of any form of political parties, conceptions or activity; 11.1.13. Placing data to be made available via University Web sites without ensuring that the material is available to only authorized individuals or groups; 11.1.14. Any activities that break any state law. 11.2.University has the list of Internet resources that are locked for users for various reasons. The list of resources and full description of reasons of closure are given in Appendix B. This list can be adjusted for changes in technical or environmental conditions, as well as in accordance with internal University policies. 12. Personal Use 12.1. University e-mail and access to the Internet may be used for limited, incidental personal purposes provided such use will not: 12.1.1. directly or indirectly interfere with the University operation of information technology services or e-mail services; or 12.1.2. directly or indirectly interfere with the University's operation of the facilities; 12.1.3. interfere with the user's employment or other obligations to the University; or 12.1.4. cause or be likely to cause damage to the University's reputation; or 12.1.5. conflict with any University policies, regulations or Kyrgyzstan’s law: or 12.1.6. be used for commercial purposes without the formal authorization of the University, or 12.1.7. cause additional cost to the University. 12.2. Employees should avoid storing personal data on departmental devices to avoid using up space. Storage space and the backup routines are significant to University resources. 13. Responsibility and Policy Update 13.1. Information Resources and Technology (IRT) is responsible for implementing this policy, in cooperation with: Vice President for Academic Affairs AUCA Technology Council Dean of Students Director of Human Resources 13.2. The Technology Council shall oversee and approve changes to the policy in consultation with the aforementioned groups and individuals and provide the changes to approve for the Academic Policy Committee (APC). 13.3. Upon consideration and approval by the Academic Policy Committee, this document, as well as all amendments and additions shall be authorized by the Vice-President. Policy for the Use of Network Services and Electronic Information Resources Page 9 of 12 GLOSSARY Information and technology infrastructure of the University - a system of organizational structures and subsystems for the operation and development of the university information space and its interface. This structure provides access to information resources, and includes hardware, software and technologies for gathering, storage, processing and transmission of information, information subsystem services, databases and databanks, communication systems, control units. Electronic information resources - electronic information sources, in the context of this policy, located on workstations and specialized servers or accessible through the Internet. Information services - in the context of this policy, services in the electronic information space of the university, such as: email, e-learning courses, services that provide access to information in internal University databases and subsystems, as well as access to electronic publications databases. Full information on all available electronic information resources and services, including specialized ones, is posted on the website of the Information Resources and Technology Department (IRT) www.irt.auca.kg . User of electronic information resources and information services - any member of the AUCA community with an authorized access to the information and technological infrastructure of the university obtained in an established way. Policy for the Use of Network Services and Electronic Information Resources Page 10 of 12 Appendix A The list of AUCA Intranet resources access to which is available from outside the University: auca.kg alumni.auca.kg business.auca.kg career.auca.kg cis.auca.kg faculty.auca.kg it.auca.kg lib.auca.kg leader.auca.kg mail.auca.kg quarterly.auca.kg magazine.auca.kg sife.auca.kg src.auca.kg uf.auca.kg viewbook.auca.kg dinamica.auca.kg bcd.auca.kg bc.auca.kg applyonline.auca.kg e-course.auca.kg lrt.auca.kg irt.auca.kg elibrary.auca.kg e-library.auca.kg library.auca.kg bp.library.auca.kg ev.auca.kg ev-report.auca.kg bimun.auca.kg silc.auca.kg Policy for the Use of Network Services and Electronic Information Resources Page 11 of 12 Appendix B Access to the Internet resources listed below is limited in as per the established timetable. Access restrictions apply from 10:00 to 18:00 Monday to Friday. During examination periods a twenty-four-hour limit applies in all the AUCA computer labs and Wi-Fi areas, except laboratories 209 and 210, which have standard limits. Index of resources with limited access: The sites unrelated to academic activity, entertainment-focused, such as: social networks, anonymous proxy servers, and multimedia sites shall be blocked. Social networks - sites whose purpose is to build information communities in the Internet, which comprise people with similar interests and / or activity. Communication is done through the internal mail service or instant messaging. Anonymous proxy server - a server, concealing or making difficult the definition and identification of IP addresses, which in turn can be a tool for hacking and concealing the traces of hacking. The server is used to bypass the local blocking regulations. Multimedia sites - sites that distribute video and audio entertainment files on a fee or free basis, without complying with copyright rules and / or license agreements. Authorized IRT staff on the basis of definitions indicated in this policy, as well as internal IRT instructions, refer the given site to a particular kind, and take all necessary measures to limit access to it. In exceptional cases, for academic purposes (for example: research, etc.) access to the above sites can be provided. To gain access, a user’s written request approved by head of department, program, office, and stating the reason and timing of access, shall be submitted to the director of IRT. Policy for the Use of Network Services and Electronic Information Resources Page 12 of 12