It is the policy of Walsh to maintain access for its community to local, national, and international sources of information and to provide an atmosphere that encourages access to knowledge and sharing of information. Walsh’s goal with respect to information technology is to provide the following:
Student access to information anywhere on location through Walsh’s network or off location through the Internet;
Faculty resources necessary to enhance teaching, learning, and research; and
Staff tools necessary for a responsive service environment.
This and all policies and procedures of Walsh are not intended to abridge academic freedom, constitutional guarantees of free speech, or freedom of expression. While the rights of academic freedom and intellectual creativity are recognized, the interests of Walsh, students, faculty, and staff must be protected. In addition to consideration of legal liability issues, the institutional image and reputation of Walsh are valuable assets requiring protection.
In accordance with these policies, Walsh works to create an intellectual environment in which students, staff, and faculty may feel free to create and collaborate with colleagues at Walsh and at other institutions without fear that the products of their intellectual efforts will be violated by misrepresentation, tampering, destruction, or theft.
Walsh advises users that while it follows generally accepted information security practices and deploys effective safeguards, it cannot guarantee that its information technology resources are completely protected from cybersecurity risks and threats from individuals who possess the skill and desire to breach those security measures and commit malicious acts. In addition, the information transmitted to third parties is not under the control of Walsh and may be intercepted.
Walsh advises all users of personally-owned computers to protect themselves from cybersecurity risks by:
Links to additional information about cybersecurity are available on the Walsh website: www.oit.walshcollege.edu.
In the final analysis, the availability of Walsh information resources, technology, and networks is the responsibility of its users. Each user must guard against abuses that disrupt and threaten the long-term viability of the systems at Walsh and those beyond Walsh. Walsh requires members of its community to act in accordance with these responsibilities; this policy; relevant laws; and contractual obligations; and to maintain the highest standard of ethics.
The following policies define the privileges of and restrictions on Walsh students and non-Walsh account holders who are provided with accounts to access the information resources and information technology of Walsh. The policies include examples of activities that are detrimental to the welfare of the overall community and are therefore prohibited.
This section also describes the process by which violators are identified, investigated, and disciplined. It should be noted that some activities that are legal are in violation of this policy and are prohibited with respect to Walsh information technology. Note that this policy does not apply to the employees, faculty and contractors who are governed by the policies of the Walsh Employee Handbook.
Walsh characterizes as unethical and unacceptable, and just cause for taking actions up to and including dismissal, and/or legal action, any activity prohibited by this policy statement.
Access to the information resources and information technology at Walsh is a privilege and must be treated as such by all users. The primary purpose of the information resources and information technology at Walsh is to fulfill the goals previously described. Use for other purposes, such as personal recreation, is secondary. A modest level of secondary use is permitted, but if secondary use activities interfere with fulfillment of the primary purposes of the technology, those activities may be terminated or restricted. Specific restrictions on use follow.
Walsh advises all users of its information resources and information technology that it has the right and the duty and will routinely monitor the use of its technology to prevent and detect any violations of these policies or applicable laws. Monitoring of use and investigation of suspected violations will be done routinely by the Office of Information Technology (OIT) and without prior notice. Investigations may also be initiated by faculty department chairs, officers and cost center directors of Walsh and will be carried out by the OIT department. Computer activity that may be monitored includes, but is not limited to:
All of these computer activities are visible and verifiable by Walsh’s network management facilities.
Unless otherwise indicated, the following are prohibited activities. This list may not be exhaustive. Additional prohibitions may be communicated to the community at any time:
Students should report any known or suspected violation of this policy or any computer security incident to the Director of the Office of Information Technology either directly or by email OIT_Director@walshcollege.edu.
If Walsh suspects an individual of violating its technology policies, it may conduct an investigation of any equipment, device, software, documents, or data that is involved. Walsh may access, search, or retrieve related equipment as part of its investigation. It may also employ surveillance activities to aid in an investigation. All parties involved are expected to cooperate fully with the investigation.
Any action(s) that Walsh deems inappropriate can lead to disciplinary action up to and including academic dismissal and/or termination of employment, removal and/or ban from the facilities and/or filing of criminal charges.