
2 minute read
A. Ethical and Behavioral Standards
from Student Handbook
by gssm
X XV V.. A AP PP PR RO OP PR RIIA AT TE E U US SE E P PO OL LIIC CY Y ((A AU UP P)) F FO OR R G GS SS SM M T TE EC CH HN NO OL LO OG GY Y
The Appropriate Use Policy (AUP) pertains to all users of GSSM networks, contracted services, and any and all other technologies provided by and on behalf of the school. The term user includes, but is not limited to, employees, students, alumni, visitors, contractors, program applicants, job applicants, program participants, and volunteers.
Advertisement
GSSM’s technology and services support excellence in teaching, learning, operations, safety, and communications. Activities with the potential to interfere with these aims are prohibited. This includes using email lists in ways that can be perceived as disrespectful and disruptive to other community members.
By definition, a network is a shared resource. GSSM’s network is shared by its students, teachers, and administration. Those who use the network, and other shared technology resources provide by GSSM, accept the responsibility to use it appropriately. This Appropriate Use Policy describes those responsibilities and the rules that apply to users of the GSSM computer network.
A. Ethical and Behavioral Standards
Those who use the GSSM network are expected to follow the same high standards of conduct and communication that would be expected in face-to-face encounters. These standards are described in the GSSM Student Handbook. Some responsibilities are unique to the environment created by computer networks and are addressed here:
1. Online Safety
GSSM cares about the safety of students, faculty, and staff. Social networking services can be dangerous when personal information, particularly information that can lead to the identification or location of a person, is published openly. GSSM strongly encourages students to secure their profiles so that they are not visible to strangers.
2. Online Harassment
GSSM’s policies against harassment are in effect whenever and however students encounter each other. This includes online encounters even when participants are off campus. The use of Internet services within and beyond the control of the school to harass another student is a violation of GSSM rules and will result in disciplinary action. When harassment involving non-GSSM services is observed or reported, the school may engage law enforcement agencies and the courts to compel the service provider to disclose identifying information about the harassing party.
3. Protected Information
Education records, health information, confidential information, information which may be of a personal and private nature must be transmitted and stored in an approved encrypted format.
Such information may only be accessed using authorized equipment maintained and authorized by GSSM and by GSSM authorized GSSM personnel. For more information, refer to the GSSM Information Security Policy.
4. Online Identity/Login Credentials
GSSM provides network users with credentials (usernames and passwords) for the purposes of accessing GSSM-owned and GSSM-contracted resources. These credentials are intended to be used only by the person to whom they are assigned. Credentials assigned by GSSM must be kept secret and may not be divulged to anyone else. The person to whom network credentials are assigned is responsible for all activities that occur when those credentials are used. Further, it is a violation of GSSM rules for a person to impersonate someone else by either using their credentials or any other means that might obfuscate identity. GSSM students and employees may be provided credentials to access online databases while using