Data Classification / en Data Classification and Protection Policy /policy/data-classification-and-protection-policy <span class="field field--name-title field--type-string field--label-hidden">Data Classification and Protection Policy</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>hoverholt</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2024-09-13T15:52:39-04:00" title="Friday, September 13, 2024 - 15:52" class="datetime">Fri, 09/13/2024 - 15:52</time> </span> <div class="field field--name-field-policy-image-media field--type-entity-reference field--label-hidden field__item"><div class="media media--type-image media--view-mode-policy-image"> <div class="field field--name-field-media-image field--type-image field--label-visually_hidden"> <div class="field__label visually-hidden">Image</div> <div class="field__item"> <img loading="lazy" src="/sites/default/files/styles/policy_page_logo/public/images/geneseo-and-suny-logo_0.png?itok=JceXUryZ" width="300" height="100" alt class="img-fluid image-style-policy-page-logo"> </div> </div> </div> </div> <div class="field field--name-field-policy-number field--type-string field--label-hidden field__item">1-005</div> <div class="field field--name-field-policy-approved-by field--type-string field--label-hidden field__item">Cabinet</div> <div class="field field--name-field-policy-effective-date field--type-datetime field--label-hidden field__item">01-05-2009</div> <div class="field field--name-field-policy-date-last-revised field--type-datetime field--label-hidden field__item">10-21-2025</div> <div> <div>Category</div> <div>General College</div> </div> <div class="field field--name-field-policy-responsible-office field--type-string field--label-hidden field__item">Chief Information Officer</div> <div class="field field--name-field-responsible-office-number field--type-telephone field--label-hidden field__item"><a href="tel:585-245-5577">585-245-5577</a></div> <div class="clearfix text-formatted field field--name-field-policy-scope field--type-text-long field--label-hidden field__item"><p>This policy applies to all SUNY Geneseo employees, contractors, and systems that create, access, store, or transmit institutional data.</p> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>This policy establishes a framework for classifying and protecting institutional data at SUNY Geneseo. It supports compliance with applicable laws and regulations, including the New York SHIELD Act, FERPA, HIPAA, and NY Labor Law §203-d, and promotes responsible data stewardship across the college.</p> </div> <div class="field field--name-field-policy-definitions field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/taxonomy/term/3455" hreflang="en">Data Classification</a></div> <div class="field__item"><a href="/taxonomy/term/3456" hreflang="en">Data Steward</a></div> <div class="field__item"><a href="/taxonomy/term/3457" hreflang="en">New York SHIELD Act</a></div> <div class="field__item"><a href="/taxonomy/term/3458" hreflang="en">Private Information (per NY SHIELD Act)</a></div> <div class="field__item"><a href="/taxonomy/term/3459" hreflang="en">New York Labor Law §203-d</a></div> </div> <div class="clearfix text-formatted field field--name-field-policy field--type-text-long field--label-hidden field__item"><p><meta charset="utf-8"></p> <h3>Data Classification Levels</h3> <table style="border-collapse:collapse;border-style:none;" border="1" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="border-color:windowtext;border-width:1.0pt;padding:0in 5.4pt;vertical-align:top;width:121.25pt;" width="162"> <p style="line-height:normal;margin-bottom:0in;"><strong>Classification Level</strong></p> </td> <td style="border-bottom-style:solid;border-color:windowtext;border-left-style:none;border-right-style:solid;border-top-style:solid;border-width:1.0pt;padding:0in 5.4pt;vertical-align:top;width:166.45pt;" width="222"> <p style="line-height:normal;margin-bottom:0in;"><strong>Definition</strong></p> </td> <td style="border-bottom-style:solid;border-color:windowtext;border-left-style:none;border-right-style:solid;border-top-style:solid;border-width:1.0pt;padding:0in 5.4pt;vertical-align:top;width:143.8pt;" width="192"> <p style="line-height:normal;margin-bottom:0in;"><strong>Examples</strong></p> </td> </tr> <tr> <td style="border-bottom-style:solid;border-color:windowtext;border-left-style:solid;border-right-style:solid;border-top-style:none;border-width:1.0pt;padding:0in 5.4pt;vertical-align:top;width:121.25pt;" width="162"> <p style="line-height:normal;margin-bottom:0in;">Confidential</p> </td> <td style="border-bottom:1.0pt solid windowtext;border-left-style:none;border-right:1.0pt solid windowtext;border-top-style:none;padding:0in 5.4pt;vertical-align:top;width:166.45pt;" width="222"> <p style="line-height:normal;margin-bottom:0in;">Regulated data requiring strict controls. Unauthorized disclosure could result in legal or financial penalties.</p> </td> <td style="border-bottom:1.0pt solid windowtext;border-left-style:none;border-right:1.0pt solid windowtext;border-top-style:none;padding:0in 5.4pt;vertical-align:top;width:143.8pt;" width="192"> <p style="line-height:normal;margin-bottom:0in;">Private information such as SSNs, bank account numbers, health records, driver’s license numbers, disciplinary records</p> </td> </tr> <tr> <td style="border-bottom-style:solid;border-color:windowtext;border-left-style:solid;border-right-style:solid;border-top-style:none;border-width:1.0pt;padding:0in 5.4pt;vertical-align:top;width:121.25pt;" width="162"> <p style="line-height:normal;margin-bottom:0in;">Sensitive</p> </td> <td style="border-bottom:1.0pt solid windowtext;border-left-style:none;border-right:1.0pt solid windowtext;border-top-style:none;padding:0in 5.4pt;vertical-align:top;width:166.45pt;" width="222"> <p style="line-height:normal;margin-bottom:0in;">Internal data with reputational or operational risk.&nbsp;</p> </td> <td style="border-bottom:1.0pt solid windowtext;border-left-style:none;border-right:1.0pt solid windowtext;border-top-style:none;padding:0in 5.4pt;vertical-align:top;width:143.8pt;" width="192"> <p style="line-height:normal;margin-bottom:0in;">Grades, G-numbers, performance reviews</p> </td> </tr> <tr> <td style="border-bottom-style:solid;border-color:windowtext;border-left-style:solid;border-right-style:solid;border-top-style:none;border-width:1.0pt;padding:0in 5.4pt;vertical-align:top;width:121.25pt;" width="162"> <p style="line-height:normal;margin-bottom:0in;">General</p> </td> <td style="border-bottom:1.0pt solid windowtext;border-left-style:none;border-right:1.0pt solid windowtext;border-top-style:none;padding:0in 5.4pt;vertical-align:top;width:166.45pt;" width="222"> <p style="line-height:normal;margin-bottom:0in;">Information not intended for public release but not subject to regulatory or contractual confidentiality. May be shared with Geneseo accounts and select external collaborators with a legitimate need.</p> </td> <td style="border-bottom:1.0pt solid windowtext;border-left-style:none;border-right:1.0pt solid windowtext;border-top-style:none;padding:0in 5.4pt;vertical-align:top;width:143.8pt;" width="192"> <p style="line-height:normal;margin-bottom:0in;">Syllabi, meeting agendas, internal procedures</p> </td> </tr> <tr> <td style="border-bottom-style:solid;border-color:windowtext;border-left-style:solid;border-right-style:solid;border-top-style:none;border-width:1.0pt;padding:0in 5.4pt;vertical-align:top;width:121.25pt;" width="162"> <p style="line-height:normal;margin-bottom:0in;">Public</p> </td> <td style="border-bottom:1.0pt solid windowtext;border-left-style:none;border-right:1.0pt solid windowtext;border-top-style:none;padding:0in 5.4pt;vertical-align:top;width:166.45pt;" width="222"> <p style="line-height:normal;margin-bottom:0in;">Information intended for external audiences and unrestricted sharing.</p> </td> <td style="border-bottom:1.0pt solid windowtext;border-left-style:none;border-right:1.0pt solid windowtext;border-top-style:none;padding:0in 5.4pt;vertical-align:top;width:143.8pt;" width="192"> <p style="line-height:normal;margin-bottom:0in;">Press releases, recruitment materials, published research</p> </td> </tr> </tbody> </table> <h3>Safeguards</h3> <p>Safeguards for institutional data are applied based on its classification level and include administrative, technical, and physical controls. These controls are designed to ensure appropriate protection of data across its lifecycle: from creation and access to storage and disposal. Specific requirements for each classification level (Confidential, Sensitive, General, and Public) are detailed in the&nbsp;<a href="https://go.geneseo.edu/DataClassStandard">Data Protection Standard</a>.&nbsp;</p> <h3>Incident Response</h3> <p>Any suspected data breach must be <a href="https://go.geneseo.edu/securityincidentform">reported immediately</a> to CIT. Breaches involving private information as defined by the SHIELD Act will trigger notification procedures in accordance with state law and the College’s cybersecurity incident response plan.</p> <h3>Roles and Responsibilities</h3> <ul style="list-style-type:disc;"> <li><strong>Data Stewards:</strong> Ensure proper classification, access controls, and compliance within their data domain. In most cases the data steward of a department is the director or department head.</li> <li><strong>CIT:</strong> Implement technical safeguards, monitor systems, and respond to incidents.</li> <li><strong>Compliance Office</strong>: Ensure alignment with legal and regulatory requirements.</li> <li><strong>End Users:</strong> Apply appropriate sensitivity labels and follow data handling procedures.</li> </ul> <h3>Compliance</h3> <p>This policy supports compliance with the New York SHIELD Act, FERPA, HIPAA, NY Labor Law §203-d, and other applicable regulations.&nbsp;</p> <p>Inappropriate disclosure of information pertaining to students, faculty, staff and other college constituents may violate applicable law and regulations and is considered a violation of ethics and a breach of trust placed in employees by the College.&nbsp; Upon finding of a violation of this policy by an employee in a collective bargaining unit, the College may initiate disciplinary action pursuant to the applicable collective bargaining agreement, up to and including termination of employment.</p> <p style="margin-bottom:6.0pt;margin-left:0in;margin-right:0in;margin-top:0in;">For employees not covered by a collective bargaining agreement, sanctions may include actions up to and including termination of employment.</p> <p style="margin-bottom:6.0pt;margin-left:0in;margin-right:0in;margin-top:0in;">Student employees who have violated these provisions may be referred to the student disciplinary process.</p> <p style="margin-bottom:6.0pt;margin-left:0in;margin-right:0in;margin-top:0in;">Volunteers who have violated these provisions may have their voluntary appointments terminated.</p> <p>Employees who deal with confidential material on a regular basis will be required to sign a <a href="https://go.geneseo.edu/confidentialityagreement">confidentiality agreement</a>.</p> </div> <div class="clearfix text-formatted field field--name-field-frequency-review-update field--type-text-long field--label-hidden field__item"><p>Every 3 years.&nbsp;</p> </div> <div class="field field--name-field-policy-signed-by field--type-string field--label-hidden field__item">Paul Jackson</div> <div class="field field--name-field-name-title field--type-string field--label-hidden field__item">Chief Information Officer &amp; Director of CIT</div> <div class="field field--name-field-policy-date-signed field--type-datetime field--label-hidden field__item">10-21-2025</div> Fri, 13 Sep 2024 19:52:39 +0000 hoverholt 150652 at Information Technology Acceptable Use Policy /policy/information-technology-acceptable-use-policy <span class="field field--name-title field--type-string field--label-hidden">Information Technology Acceptable Use Policy</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>reedc</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2023-03-13T15:33:01-04:00" title="Monday, March 13, 2023 - 15:33" class="datetime">Mon, 03/13/2023 - 15:33</time> </span> <div class="field field--name-field-policy-image-media field--type-entity-reference field--label-hidden field__item"><div class="media media--type-image media--view-mode-policy-image"> <div class="field field--name-field-media-image field--type-image field--label-visually_hidden"> <div class="field__label visually-hidden">Image</div> <div class="field__item"> <img loading="lazy" src="/sites/default/files/styles/policy_page_logo/public/images/geneseo-and-suny-logo_0.png?itok=JceXUryZ" width="300" height="100" alt class="img-fluid image-style-policy-page-logo"> </div> </div> </div> </div> <div class="field field--name-field-policy-number field--type-string field--label-hidden field__item">1-021</div> <div class="field field--name-field-policy-approved-by field--type-string field--label-hidden field__item">Cabinet</div> <div class="field field--name-field-policy-effective-date field--type-datetime field--label-hidden field__item">08-01-1989</div> <div class="field field--name-field-policy-date-last-revised field--type-datetime field--label-hidden field__item">10-21-2025</div> <div> <div>Category</div> <div>General College</div> </div> <div class="field field--name-field-policy-responsible-office field--type-string field--label-hidden field__item">Computing and Information Technology </div> <div class="field field--name-field-responsible-office-number field--type-telephone field--label-hidden field__item"><a href="tel:585-245-5577">585-245-5577</a></div> <div class="clearfix text-formatted field field--name-field-policy-scope field--type-text-long field--label-hidden field__item"><p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy applies to all individuals who access, use, or manage SUNY Geneseo’s information technology (IT) resources, regardless of location, device ownership, or employment status. This includes, but is not limited to:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Faculty, staff, and students.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Retirees with extended access.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Contractors, consultants, and vendors.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Volunteers, affiliates, and visitors.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Third-party service providers with access to Geneseo systems.</span></li> </ul> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Covered IT resources include all college-owned or managed:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Computing devices (e.g., desktops, laptops, tablets, mobile phones).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Network infrastructure (e.g., wired and wireless networks, VPN).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Software and applications (e.g., licensed software, cloud services, AI tools).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Cloud storage platforms (e.g., Google Drive, Microsoft OneDrive, SharePoint).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Learning Management Systems (e.g., Brightspace).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Data and storage systems (e.g., institutional data, backups, shared drives).</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Communication platforms (e.g., email, messaging systems, listservs).</span></li> </ul> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy applies to all use of Geneseo IT resources, whether on campus or remotely. All users are expected to comply with this policy and related institutional policies, procedures, and applicable laws.</span></p> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">SUNY Geneseo provides information technology resources to support its academic, research, administrative, and outreach missions. These resources include computing systems, networks, software, data, and communication platforms that are essential to the daily operations of the college.</span></p> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy establishes expectations for the responsible and ethical use of IT resources by all members of the campus community. It is designed to protect the integrity, security, and availability of institutional systems and data, ensure compliance with applicable laws and regulations, and promote a respectful and inclusive digital environment.</span></p> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users of Geneseo’s IT resources are expected to:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Use resources in a manner consistent with the college’s mission and values.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Respect the rights and privacy of others.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Protect institutional data and systems from unauthorized access or misuse.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Handle institutional data in accordance with Geneseo’s </span><a href="/policy/data-classification-and-protection-policy"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Data Classification and Protection policy</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">, which define levels of sensitivity and appropriate safeguards.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Comply with all relevant policies, including those related to data classification, listserv management, and copyright.</span></li> </ul> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy applies regardless of device ownership or location of access, including use of personal devices and remote connections.</span></p> </div> <div class="field field--name-field-policy-definitions field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/taxonomy/term/2438" hreflang="en">Computing Resources</a></div> <div class="field__item"><a href="/taxonomy/term/425" hreflang="en">FERPA</a></div> <div class="field__item"><a href="/taxonomy/term/2439" hreflang="en">Mass Digital Communications</a></div> <div class="field__item"><a href="/taxonomy/term/2440" hreflang="en">Multi-Factor Authentication (MFA)</a></div> <div class="field__item"><a href="/taxonomy/term/3455" hreflang="en">Data Classification</a></div> </div> <div class="clearfix text-formatted field field--name-field-policy field--type-text-long field--label-hidden field__item"><h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Acceptable Use</span></h3> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">Computing resources at SUNY Geneseo are provided for educational and business purposes. As a convenience to the Geneseo user community, limited incidental personal use of computing resources is permitted. Examples of acceptable incidental personal use include checking personal email, reading news, or briefly browsing non-work-related websites. Such use must not be illegal, interfere with job responsibilities, or compromise the integrity or availability of Geneseo IT systems. Faculty and staff are responsible for exercising good judgment about personal use in accordance with Geneseo and SUNY policies and ethical standards for state officers and employees. State officers and employees are expected to pursue a course of conduct that maintains public trust.</span></p> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">Use of AI tools (e.g., Copilot, Gemini) is permitted when aligned with institutional goals and data protection standards. These tools may be used for productivity, learning, or research, but must not be used to circumvent academic integrity or handle sensitive data.</span></p> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users may utilize cloud services such as Google Workspace and Microsoft 365 OneDrive and SharePoint provided their use complies with institutional guidelines and data protection policies.</span></p> <p><span style="font-family:&quot;Aptos&quot;,sans-serif;">All digital communications conducted through Geneseo IT resources must be respectful, professional, and consistent with SUNY Geneseo’s mission and values.</span></p> <h3 style="line-height:21.0pt;margin-bottom:2.25pt;margin-left:0in;margin-right:0in;margin-top:9.75pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Unacceptable Use</span></h3> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">The following activities are prohibited when using SUNY Geneseo’s computing resources. These examples represent violations of institutional policy, compromise security, or conflict with the college’s mission and values.</span></p> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Unauthorized Access and Sharing</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Accessing systems, accounts, or data without proper authorization.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Sharing college-provided devices (e.g., laptops, desktops, tablets) with others, including family members or roommates.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using another person’s Geneseo credentials or allowing others to use your own.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using former system privileges after your association with Geneseo has ended.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Confidential Data on Personal Devices</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Accessing or storing confidential institutional data on personally owned devices.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using personal cloud accounts or email services to transmit or store confidential college data.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Malicious or Illegal Activity</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Uploading, downloading, or distributing illegal content, including pirated software or media.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Engaging in phishing, malware distribution, or other forms of cyberattack.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Attempting to circumvent security controls or exploit system vulnerabilities.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using packet sniffers, keystroke loggers, or similar tools without authorization.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Harassment and Abuse</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using IT resources to harass, threaten, impersonate, or deceive others.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Sending messages or posting content that is discriminatory, abusive, or violates campus conduct policies.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Disruption of Services</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Running bots, scripts, or programs that interfere with normal system operations or monopolize shared resources.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Intentionally or recklessly interfering with Geneseo’s network infrastructure (e.g., wired, wireless, VPN) or transmitting unauthorized signals.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Performing Denial of Service (DoS) attacks or similar actions intended to render services inaccessible to other authorized users.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Circumvention and Misrepresentation</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Falsifying identity or using aliases to avoid accountability.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Attempting to bypass monitoring, logging, or usage restrictions.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Sending messages or printing files that do not show the correct username of the user performing the operation.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Abuse of Incidental Personal Use</span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using Geneseo IT resources for personal financial gain or commercial ventures not affiliated with the college.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using IT resources for personal activities that are illegal, interfere with work responsibilities, result in measurable cost to the college, or conflict with Geneseo’s nonprofit status.</span></li> </ul> <h4 style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;"><strong>Wasteful Use of Resources</strong></span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span class="citation-58" style="font-family:&quot;Aptos&quot;,sans-serif;">Excessive or non-essential&nbsp;</span><a href="https://www.suny.edu/sunypp/documents.cfm?doc_id=890"><span style="font-family:&quot;Aptos&quot;,sans-serif;">printing</span></a><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;">&nbsp;</span><span class="citation-58" style="font-family:&quot;Aptos&quot;,sans-serif;">of documents without a legitimate academic or business purpose.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Excessive consumption of computing capacity for non-institutional purposes, such as cryptocurrency mining or running endless/repetitive computations.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Excessive consumption of storage capacity for non-institutional purposes, such as bulk personal data or photo storage.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Monopolizing shared resources, such as holding public computers or shared devices for extended periods when others are waiting.</span></li> </ul> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Mass Digital Communications</span></h3> <p style="line-height:115%;margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Mass digital communications at Geneseo&nbsp;—such as email listservs, bulk messaging platforms, or shared distribution lists— are intended solely to communicate important information regarding academic, college, and student business to students, faculty, and staff.&nbsp;These communications should be relevant to the intended audience, respectful in tone, and consistent with SUNY Geneseo’s mission and values.</span></p> <p style="line-height:115%;margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Unsolicited mass communications are not permitted. This policy must not be circumvented by sending multiple messages to smaller populations. Opt-in mailing lists for projects, student organizations, or external groups can use&nbsp;</span><a href="https://geneseo.atlassian.net/wiki/spaces/HELP/pages/76778708/Google+Workspace+at+Geneseo"><span style="color:#345290;font-family:&quot;Aptos&quot;,sans-serif;">Google Workspace @ Geneseo</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">. Centrally managed&nbsp;</span><a href="https://geneseo.atlassian.net/wiki/spaces/HELP/pages/76779945/Mailing+List+General+Information"><span style="color:#345290;font-family:&quot;Aptos&quot;,sans-serif;">Geneseo mailing lists</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">&nbsp;are restricted to messages that meet their purpose.</span></p> <p style="line-height:115%;margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">All use of listservs must follow the&nbsp;</span><a href="/policy/listserv-management"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Listserv Management Policy</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">, which outlines approval processes, audience targeting, and appropriate content standards.</span></p> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Use of AI and Emerging Technologies</span></h3> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">SUNY Geneseo recognizes the growing role of artificial intelligence (AI) and emerging technologies in education, research, and administrative work.&nbsp;</span></p> <h4><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;"><strong>Permitted Use</strong></span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">AI tools (e.g., Copilot, Gemini, ChatGPT) may be used for tasks such as drafting content, summarizing information, generating ideas, or automating routine processes.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Use must align with institutional goals and comply with applicable laws, policies, and ethical standards.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users must be aware of potential bias in AI-generated content and exercise critical judgment when using these tools for decision-making or communication.</span></li> </ul> <h4><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;"><strong>Prohibited or Restricted Use</strong></span></h4> <ul style="list-style-type:disc;"> <li style="color:#424242;tab-stops:list .5in;"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">AI tools must not be used to process, store, or transmit institutional data classified as Sensitive or Confidential unless explicitly approved and protected under enterprise agreements.</span></li> <li style="color:#424242;tab-stops:list .5in;"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">Use of AI to circumvent academic integrity, impersonate individuals, or generate misleading or harmful content is strictly prohibited. Users should follow academic integrity guidelines as outlined by their instructors and the&nbsp;</span><a href="/tlc/resources-generative-ai-classroom"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">Teaching and Learning Center’s guidance on generative AI</span></a><span style="font-family:&quot;Aptos&quot;,sans-serif;">.</span></li> </ul> <h4><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;"><strong>User Responsibilities</strong></span></h4> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users must verify the accuracy of AI-generated content before relying on it for official or academic purposes.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users are responsible for ensuring that AI use complies with copyright, licensing, and data protection requirements.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">SUNY Geneseo provides access to enterprise AI tools such as Microsoft Copilot, which include enhanced data protection and integrations with other supported services. Users are encouraged to use institutionally provisioned tools when available and avoid using commercial platforms that may not meet institutional data protection standards. Questions about appropriate use of AI tools should be directed to the Office of the CIO.</span></li> </ul> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Security, Privacy, and Monitoring</span></h3> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">SUNY Geneseo retains ownership of all institutional computing resources and reserves the right to monitor, access, or inspect their use when necessary. While the College does not routinely monitor individual usage, users should not expect privacy when using Geneseo IT systems.</span></p> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Monitoring or inspection may occur under the following circumstances:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">To maintain system integrity, security, or performance.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">To investigate suspected policy violations or illegal activity.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">To comply with legal obligations, including subpoenas, FOIL requests, or litigation.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">When an account exhibits unusual, excessive, or malicious activity.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">When a user has voluntarily made content publicly accessible.</span></li> </ul> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">The College may also monitor or inspect the activity of individual users of college computing resources, including individual login sessions and the content of individual communications, or delete user content that is not required to be kept by retention policy without notice or permission. Retention requirements are governed by&nbsp;</span><a href="https://system.suny.edu/compliance/records/records-retention/records-retention-schedule/#stateop"><span style="font-family:&quot;Aptos&quot;,sans-serif;">SUNY’s Records Retention Schedule</span></a><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;">.</span></p> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Routine IT operations may involve:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Backups of data and communications.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Logging of activity and usage patterns.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">System diagnostics and performance monitoring.</span></li> </ul> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users must respect the privacy of others. Unauthorized access to another user’s files, email, or account is prohibited. Any attempt to circumvent security controls or exploit vulnerabilities to gain access to private information is a violation of this policy.</span></p> <p>&nbsp;</p> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Roles and Security Responsibilities</span></h3> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Effective implementation of this policy requires shared responsibility across the campus community. All users and designated roles must follow secure computing practices and comply with institutional policies and applicable laws.</span></p> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">End Users</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">All individuals who access Geneseo IT resources are responsible for:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Using resources in accordance with this policy and related institutional policies.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Protecting their credentials and devices.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Enabling Multi-Factor Authentication (MFA) and using strong passphrases.</span></li> <li style="color:#424242;tab-stops:list .5in;"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">Reporting suspected security incidents or policy violations using the&nbsp;</span><a href="https://go.geneseo.edu/securityincidentform"><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">Security Incident Report Form</span></a><span style="color:windowtext;font-family:&quot;Aptos&quot;,sans-serif;">.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Respecting the privacy and rights of others.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Complying with applicable local, state, and federal laws, including copyright,</span><ins cite="mailto:Amy%20Sheldon" datetime="2025-10-21T12:54"><span style="font-family:&quot;Aptos&quot;,sans-serif;">&nbsp;</span></ins><span style="font-family:&quot;Aptos&quot;,sans-serif;">data protection, FERPA, HIPAA, and Payment Card Industry regulations.</span></li> </ul> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">Supervisors and Department Heads</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Responsible for:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Ensuring their teams understand and comply with this policy.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Supporting secure practices within their departments.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Coordinating with CIT on access needs and incident response.</span></li> </ul> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">Account Managers</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Designated individuals responsible for managing generic accounts (e.g., departmental, club, or initiative accounts) must:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Ensure accounts are used appropriately and securely.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Maintain accountability for all activity under the account.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Update access permissions as roles change.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Ensure compliance with institutional security standards.</span></li> </ul> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">Computing &amp; Information Technology (CIT)</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Responsible for:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Maintaining and securing Geneseo’s IT infrastructure and systems.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Monitoring performance, usage, and security across institutional platforms.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Investigating incidents, enforcing policy violations, and coordinating response efforts.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Developing and maintaining IT and security policies, standards, and procedures.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Advising on data protection, compliance, and risk mitigation strategies.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Supporting users with secure computing practices and technology guidance.</span></li> </ul> <h4><span style="font-family:&quot;Aptos&quot;,sans-serif;">Data Stewards</span></h4> <p style="margin-bottom:3.0pt;margin-left:0in;margin-right:0in;margin-top:6.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Individuals responsible for specific institutional data sets must:</span></p> <ul style="list-style-type:disc;"> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Classify and protect data in accordance with the Data Classification and Protection policy, ensuring appropriate safeguards based on sensitivity level.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Ensure appropriate access controls are in place.</span></li> <li style="tab-stops:list .5in;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Collaborate with CIT on data governance.</span></li> </ul> <h3><span style="font-family:&quot;Aptos&quot;,sans-serif;">Policy Violations and Enforcement</span></h3> <p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Violations of this policy include any activities outlined in the “Unacceptable Use” section, as well as other actions that compromise the integrity, security, or availability of Geneseo’s IT resources. Reports of suspected violations may be submitted through a supervisor, the Office of the CIO, the CIT Help Desk, or via the&nbsp;</span><a href="https://go.geneseo.edu/securityincidentform"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Security Incident Report Form</span></a><span style="color:#424242;font-family:&quot;Aptos&quot;,sans-serif;">.</span></p> <p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users who violate this policy may be denied access to college computing resources and may be subject to disciplinary action, including expulsion or dismissal. Alleged violations will be handled through applicable college disciplinary procedures.</span></p> <p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">CIT may suspend, block, or restrict access to accounts when necessary to protect system integrity or prevent further unauthorized activity. Suspected violations of law may be referred to law enforcement.</span></p> <p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">Users are expected to cooperate fully in investigations. CIT may coordinate with campus offices such as the Dean of Students, Human Resources, and University Police. During investigations, CIT may suspend access to computing facilities for involved users.</span></p> </div> <div class="clearfix text-formatted field field--name-field-frequency-review-update field--type-text-long field--label-hidden field__item"><p style="margin-bottom:12.0pt;"><span style="font-family:&quot;Aptos&quot;,sans-serif;">This policy will be reviewed every 3 years by CIT, in consultation with relevant campus stakeholders. Interim updates may be made as needed to reflect changes in technology, legal requirements, or institutional priorities.</span></p> </div> <div class="field field--name-field-periodic-review-completed field--type-datetime field--label-hidden field__item">10-21-2025</div> <div class="field field--name-field-policy-signed-by field--type-string field--label-hidden field__item">Paul Jackson</div> <div class="field field--name-field-name-title field--type-string field--label-hidden field__item">CIO and Director, CIT</div> <div class="field field--name-field-policy-date-signed field--type-datetime field--label-hidden field__item">10-21-2025</div> Mon, 13 Mar 2023 19:33:01 +0000 reedc 149672 at