Administrative Policy Regarding Computer User Responsibilities

The computer resources* of The City University of New York (CUNY) and Queensborough Community College (QCC) must be used in a manner that is consistent with the College's and University's education purposes and environment. All users of computer resources are expected to act in a spirit of mutual respect and cooperation, and to adhere to the regulations for their use set forth in this document.

The rules of conduct for computer use include, but are not limited to, the list below. Interpretation of the rules of conduct will be addressed by QCC's Executive Director of Information Technology (IT), and the Senior Vice President for Finance and Administration, as appropriate. As a user of CUNY/QCC computer resources:

CUNY and QCC reserve the right to monitor, under appropriate conditions, all data contained in the system to protect the integrity of the system and to ensure compliance with regulations. The College is capable of accessing, reviewing, and recording:

  1. Access to the system, including successful and failed login attempts and logouts;
  2. Inbound and outbound file transfers;
  3. Terminal connections to and from external systems;
  4. Sent and received e-mail messages;
  5. Web sites visited, including uniform resource locator (URL) of pages retrieved;
  6. Date, time, and user associated with each event.

Any user who is found to be in violation of these rules shall be subject to the following:

  1. Suspension and/or termination of computer privileges;
  2. Disciplinary action by appropriate College and/or University officials;
  3. Referral to law enforcement authorities for criminal prosecution;
  4. Other legal action, including action to recover civil damages and penalties.

* Computer Resources is an inclusive term referring to any and all computing/information technology, hardware, software and access. Hardware includes, but is not limited to, terminals, personal computers, workstations, printers, mice, monitors, cabling, peripheral devices. Software includes, but is not limited to, mainframe shared software, networked software and stand-alone software residing on personal computers. Access includes, but is not limited to, accounts on timesharing systems as well as access to stand-alone personal computer systems and other relevant technology such as e-mail and the Internet.