Technology Usage Policy

It is the policy of Walsh College to maintain access for its community to local, national, and international sources of information and to provide an atmosphere that encourages access to knowledge and sharing of information. Walsh’s goal with respect to information technology is to provide the following:

  • Student access to information anywhere on location through Walsh’s network or off location through the Internet;
  • Faculty resources necessary to enhance teaching, learning, and research; and
  • Staff tools necessary for a responsive service environment.

This and all policies and procedures of Walsh College are not intended to abridge academic freedom, constitutional guarantees of free speech, or freedom of expression. While the rights of academic freedom and intellectual creativity are recognized, the interests of Walsh, students, faculty, and staff must be protected. In addition to consideration of legal liability issues, the institutional image and reputation of Walsh are valuable assets requiring protection.

In accordance with these policies, Walsh College works to create an intellectual environment in which students, staff, and faculty may feel free to create and collaborate with colleagues at Walsh and at other institutions without fear that the products of their intellectual efforts will be violated by misrepresentation, tampering, destruction, or theft.

Walsh College advises users that while it follows generally accepted information security practices and deploys effective safeguards, it cannot guarantee that its information technology resources are completely protected from cybersecurity risks and threats from individuals who possess the skill and desire to breach those security measures and commit malicious acts. In addition, the information transmitted to third parties is not under the control of Walsh and may be intercepted.

Walsh College advises all users of personally owned computers to protect themselves from cybersecurity risks by:

  • Promptly installing security patches for the operating system and other software installed on the computer
  • Using antivirus antimalware software and keeping the software updated
  • Using a firewall
  • Using strong unique passwords on all accounts
  • Securing sensitive information such as accounts, passwords, financial and medical records by methods such as encryption and secure erasure
  • Staying alert to common ploys of cyber criminals, such as PHISHING

Links to additional information about cybersecurity are available on the Walsh College website: oit.walshcollege.edu.

In the final analysis, the availability of Walsh College information resources, technology, and networks is the responsibility of its users. Each user must guard against abuses that disrupt and threaten the long-term viability of the systems at Walsh College and those beyond Walsh College. Walsh College requires members of its community to act in accordance with these responsibilities; this policy; relevant laws; and contractual obligations; and to maintain the highest standard of ethics.