Skip to main content

Acceptable Uses of IT Infrastructure and Resources

Implementation Information and Revision History

Implementation Information and Revision History

Implementation Information:

Review Frequency:

Annual

Responsible Person:

Director, IT Risk and Data Integrity

Approved By:

CISO and Office of Legal Counsel

Approval Date:

February 14, 2018

 

Revision History:

Version:

Date:

Description:

1.0

12/04/2004

Initial Acceptable Use Policy, which includes Applicability, User Responsibilities, and Statement of Prohibited Uses, Enforcement, and Sanctions for Non-Compliance, Privacy, and Emergencies Sections. Additionally, added as addendums policies for Anti-Spam, Email, Peer-to-Peer, Web Hosting, and Wireless Policies.

2.0

08/15/2008

The policy was extensively reviewed and modified by the Office of Legal Counsel. The following changes were made:

  1. General addition of terms, modification of language, and reorganization of sections and sub-sections to the entire IT Policy;
  2. Addition of “User Names” and “Passwords” sub-sections to “User Responsibilities and Statement of Prohibited Uses” section;
  3. Addition of “Intellectual Property” section;
  4. Addition of sub-sections and reorganization of former “Enforcement and Sanctions for Non-Compliance” and “Emergencies” sections, now, collectively, the “Monitoring, Reporting, Violations, and Sanctions” section;
  5. Addition of the “Amendments and Revisions” section in its prior format; and
  6. Addition of the “Internet Usage Policy” as an addendum.

2.1

11/11/2008

This revision includes:

  1. Changes in the password section because of the deployment of AccessIT ID,
  2. A change in Section 5, sub-section B, “Reporting,” which moved the reporting of an incident that involves a student in the Graduate School of Arts and Sciences to the Academic Dean of the school instead of the Dean of Students,
  3. Grammatical corrections throughout multiple sections of this document.

2.2

09/28/2010

This revision includes:

  1. Modifications to the Peer to Peer Policy to meet the requirements of the Higher Education Opportunity Act of 2008.

2.3

09/26/2013

This revision includes:

  1. Addition of the password change policy of 180 days.

2.4

08/19/2016

This revision includes:

  1. Addition of Section XIII Core Google Apps Policy
  2. Addition of Section XIV Non-core Google Apps Policy
  3. Minor grammatical changes

2.5

12/14/2016

This revision includes:

  1. Modifications to the Peer-to-Peer Policy that reflect new restrictions on peer-to-peer file sharing that are effective as of January 4, 2017.

3.0

12/20/2017

The policy has been renamed from IT Acceptable Use to Acceptable Uses of IT Infrastructure and Resources. In a joint effort between the Office of Legal Counsel and Fordham IT, major revisions have occurred. These revisions include:

  • The reformatting of the policy into the Fordham IT template for policies so that all policies are consistent.
  • The removal of sections from this policy. These sections will now be contained in their own standalone policies. The sections removed are as follows:
    • Anti-Spam
    • Email
    • Peer-to-Peer
    • Hosting
    • Wireless
    • Internet Usage
    • Core Google Services
    • Non-Core Google Services
  • Placement of the IT Policy Statement, Applicability, and Related Policies sections of the old policies into the appropriate areas of the IT Policy Template.
  • Elimination of the Current Revision section as that is incorporated in this table.
  • Streamlining of the Password section
  • Modernization of the Intellectual Property section
  • Rewrite of the Privacy section to reflect changes in privacy regulations that the University is required to adhere to.
  • Updates to the Reporting section.

 

3.1 02/14/2018 Intellectual Property (Section 2) now includes a pointer to the University’s Intellectual Property Policy on the Fordham Web Site.