10.20 Acceptable Use of Information Technology Policy

Policy Statement

The College of Charleston aims to offer a safe and effective technological environment in compliance with all applicable laws, regulations, and institutional policies to aid its functions and the tasks of its employees, students, and other authorized users. This Acceptable Use Policy (AUP) sets the standards for appropriate and responsible use of the institution’s technology resources.

  • By using the organization’s technology resources, users agree to comply with this policy and all related standards, guidelines, and procedures.
  • The organization reserves the right to monitor and review user activity to ensure compliance with this policy.

Policy Manager and Responsible Department or Office

Office of the Chief Information Officer

Definition

  • "User(s)" or “Authorized User(s)” refers to any person(s) accessing College of Charleston information technology assets, including but not limited to students, faculty, staff, contractors, clients, consultants, College volunteers, retirees, emeriti, adjuncts, and others working at or for the College of Charleston.
  • "Authorization" determines whether a user is permitted access to specific College of Charleston information technology assets.
  • “Institutional Data” refers to any information, regardless of format, generated or collected for or by the College. College data are vital assets used in the College's operations to carry out its mission and execute its business function.
  • “Assets” refers to institutionally owned employee, classroom, and lab computers, licensed applications, all institutional data/information created using institutional or personal resources (i.e., computers and applications) for institutional purposes, classroom & conference room audio/visual (A/V) systems, data center servers (physical and virtual), and network infrastructure (wired and wireless).

Policy

Authorized users must use technology resources for educational, research, and administrative purposes and comply with all applicable laws, regulations, and institutional policies. Users are required to comply with this policy and all related institutional policies. Failure to do so may result in disciplinary action, including losing access to IT resources, academic sanctions, or termination of employment.

Acceptable Use

Users are expected to:

  • Respect the privacy and rights of others.
  • Protect the confidentiality, integrity, and availability of institutional data.
  • Report any security incidents or violations of this policy to the IT Division.

Unacceptable Use

Unauthorized or inappropriate use of these resources may result in disciplinary action, including termination of access, employment, or affiliation with the organization.

The following activities are prohibited:

  • Storing Institutional Data: Storing institutional, confidential, or restricted data on unauthorized/unsupported 3rd party storage solutions (also see Data Classifications Policy).
  • Illegal Activities: Engaging in any activity that violates local, state, or federal laws, including but not limited to unauthorized access, copyright infringement (e.g., peer-to-peer sharing), and the distribution of illegal content
  • User Credentials: Sharing College of Charleston user credentials with anyone, whether another employee, family member, executor, or other.
  • Unauthorized Access: Attempting to gain unauthorized access to systems, networks, or data, including using another user’s credentials.
  • Malicious Activities: Introducing or spreading malware, viruses, or other harmful software.
  • Inappropriate Content: Creating, accessing, or distributing content that is obscene, discriminatory, harassing, or violates other institutional policies.
  • Excessive Personal Use: Using college technology resources for non-institutional activities that disrupt institutional operations or impact work performance.
  • Misuse of Institutional Data: Unauthorized sharing, alteration, or destruction of institutional data.
  • Unauthorized use of institutional resources: Using college technology resources in any manner, which violates applicable College of Charleston policies or procedures, including, but not limited to:
    • Introducing any software, hardware, data, or anything else that may damage, detrimentally interfere with, surreptitiously intercept, or expropriate any system, data, or personal information, communicating with elected officials and unauthorized communications with the media.
    • Communicating personal opinions or positions to elected officials.
    • Purporting to speak on behalf of the College when expressing personal or professional opinions or positions on any issue.

Security and Privacy

  • Users must protect their login credentials and not share them with others.
  • IT resources may be monitored to ensure compliance with this policy, and users should have no expectation of privacy when using these resources.
  • Encryption and secure communication channels must be used when transmitting confidential or restricted information.

Reporting Violations

Users should report any violations of this policy to IT-Information Security at 
IT-InformationSecurity@cofc.edu

Acknowledgment

By using the technology resources of the College of Charleston, users agree to abide by the terms of this Acceptable Use Policy

Departments/Offices Affected by the Policy

College of Charleston Authorized Users, on-site and remote.

Related Policies, Documents or Forms

Privacy Policy

Data Classification Policy

Data Management Standard

Data Principles

Social Media Policy

Electronic Display Policy

Data Retention and Destruction Policy

Media Relations Policy

10.20 Acceptable Use of Information Technology Policy PDF

Revision Log

Issue Date: 6/18/2025

Last Review Date: 1/24/19

Next Review Date: 6/18/2028

Web Publication Date: 2/2/2026