{"id":23440,"date":"2023-07-28T21:01:17","date_gmt":"2023-07-29T01:01:17","guid":{"rendered":"https:\/\/www.montclair.edu\/information-technology\/?page_id=23440"},"modified":"2023-07-31T10:16:40","modified_gmt":"2023-07-31T14:16:40","slug":"notice","status":"publish","type":"page","link":"https:\/\/www.montclair.edu\/information-technology\/notice\/","title":{"rendered":"Notice"},"content":{"rendered":"<h2>Notice Regarding\u00a0Montclair State University\u2019s Responsible Use of Computing Policy<\/h2>\n<p>All University-issued devices, computer systems, and\/or networks are not private<br \/>\nand are intended to be used solely for University-related purposes. To be clear,<br \/>\nUniversity computing resources should not be used to access pornographic<br \/>\nwebsites or any other inappropriate content. We have been alerted by the endpoint<br \/>\nprotection software installed on all IT-managed secure Windows and macOS<br \/>\nmachines that members of the Montclair State University community are using their<br \/>\nUniversity-issued devices to access websites with adult content, such as<br \/>\npornography. Accessing these types of websites and content exposes University-<br \/>\nissued devices and the University\u2019s systems to malware and other viruses, and<br \/>\nposes a security risk to the University\u2019s computing infrastructure, resources and<br \/>\ndata.<br \/>\nWhile the University does not routinely monitor individual usage or restrict access to<br \/>\nweb content, the endpoint protection software, which protects against malware and<br \/>\nother viruses, logs and alerts the University to activities associated with known high-<br \/>\nrisk content categories, such as pornographic websites. Additionally, normal<br \/>\noperation and maintenance of University-issued devices require the backup and\/or<br \/>\ncaching of data and communications, the logging of activity, the monitoring of<br \/>\ngeneral usage patterns, and similar activities for the service. The University may<br \/>\nalso specifically monitor the activity and accounts of individual users, including<br \/>\nindividual login sessions and communications, without notice and at its discretion,<br \/>\nwhen:<\/p>\n<ul>\n<li>the user has voluntarily made communications accessible to the public, by<br \/>\nposting to a webpage;<\/li>\n<li>the University requires access to information regarding the individual\u2019s use<br \/>\nof the computing resource;<\/li>\n<li>it reasonably appears necessary to do so to protect the integrity, security<br \/>\nor functionality of the University or other computing resources or to protect the<br \/>\nUniversity from liability;<\/li>\n<li>there is reasonable cause to believe that the user has violated, or is<br \/>\nviolating University policies or local, federal or state law;<\/li>\n<li>an account appears to be engaged in unusual or excessive activity, as<br \/>\nindicated by the monitoring of general activity and usage patterns; or<\/li>\n<li>it is otherwise required or permitted by law.<\/li>\n<\/ul>\n<p>Please remember that all members of the Montclair State University community<br \/>\nmust:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>comply with all local, federal, and state laws;<\/li>\n<li>adhere to all University rules and policies;<\/li>\n<li>use the computing resources in the manner and to the extent authorized;<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>and<\/p>\n<ul>\n<li>refrain from using computing resources for personal purposes.<\/li>\n<\/ul>\n<p>To the extent that inappropriate and unlawful content is accessed on a University-<br \/>\nissued device, computer system and\/or network, the University will fulfill its legal<br \/>\nobligations to review, verify and report all violations of law to the appropriate<br \/>\nauthorities. Such reporting may result in notifications to enforcement agencies such<br \/>\nas the National Center for Missing and Exploited Children and may result in criminal<br \/>\ninvestigation by local, federal, state and University law enforcement.<br \/>\nOn an annual basis, each member of the Montclair State University community with<br \/>\naccess to the University\u2019s devices, computer systems and\/or networks have had an<br \/>\nopportunity to read and proactively affirm acceptance of the University\u2019s<br \/>\nResponsible Use of Computing Policy. Likewise, each member of the Montclair<br \/>\nState University community upon receipt of a University NetID had an opportunity to<br \/>\nread and proactively affirm acceptance of the Network Access and Usage Policy.<br \/>\nEach person is responsible for complying with these policies. University employees<br \/>\nfound to be in violation of the prescribed policies may be subject to disciplinary<br \/>\naction up to and including dismissal.<\/p>\n<p>If you have any questions or concerns about the aforementioned policies, please<br \/>\ncontact the University\u2019s IT Security at sec-official@montclair.edu. To report incidents<br \/>\nof inappropriate use of computing resources, please contact the Division of Human<br \/>\nResources at hr@montclair.edu or (973) 655-5293. To report incidents of unlawful<br \/>\nactivity involving computing resources, please contact the University Police<br \/>\nDepartment at msupolice@montclair.edu or (973) 655-5222.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Notice Regarding\u00a0Montclair State University\u2019s Responsible Use of Computing Policy All University-issued devices, computer systems, and\/or networks are not private and are intended to be used solely for University-related purposes. To be clear, University computing resources should not be used to access pornographic websites or any other inappropriate content. We have been alerted by the endpoint [&hellip;]<\/p>\n","protected":false},"author":119,"featured_media":23045,"parent":0,"menu_order":48,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-23440","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/pages\/23440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=23440"}],"version-history":[{"count":10,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/pages\/23440\/revisions"}],"predecessor-version":[{"id":23450,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/pages\/23440\/revisions\/23450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media\/23045"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=23440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}