18 • Disguise or attempt to disguise their identity of their account or the machine that they are using. Users may not attempt to impersonate another person or identity. • Attempt to gain unauthorized access to any account or system. • Copy, report or distribute any personally identifiable, sensitive or confidential data or files to which you as a user of College resources are not authorized or gain inadvertent access. Users must report any occurrences to the data owner. The foregoing is not an all-inclusive list; the College reserves the right to determine what uses of its equipment and facilities fall within the bounds of the business and mission of the College. Report abuse of information or computing resources to Information Technology. Email and Voicemail Guidelines. All students, faculty and staff must check their Wagner email on a regular basis. Email is the official method of communication for Wagner College and all official communication will be sent to the individual’s Wagner email address. The only exception to this rule is when a communication contains confidential information or sensitive data. Neither email nor voicemail should be used for confidential communication or the transmission of sensitive data. All Wagner College email addresses are owned by Wagner College. Email and voicemail will be kept as private as possible, but Wagner College may access email and voicemail records when it has a legitimate business reason to do so. The President, or their designee, will determine what constitutes a legitimate business reason. In the normal course of managing the servers and the network, Information Technology staff may see user content. Administrators and Information Technology professionals will not read email that is not addressed to them nor listen to someone else’s voicemail messages unless necessary in the course of their duties. Be aware that email that is improperly addressed may be delivered to an unintended recipient. Email that cannot be delivered may be directed to system administrators. The contents of an email message can easily be copied or redistributed by the recipient. Information Technology cannot guarantee that all email and voicemail will remain private. Email and voicemail messages are records that could be subject to review with just cause. All information in electronic form on central computers can be subpoenaed. Messages that the user has deleted may still exist on system’s backup media for weeks or months. Certain types of email and voicemail and their uses are prohibited. These include, but are not limited to, chain letters, obscene messages, harassing messages, and unsolicited political messages. Email or voicemail that violates any College policy or is otherwise used for an illegal purpose is prohibited. All email sent through the College’s systems and network must accurately show from whom the email originated. The College employs automated systems to reduce the amount of unwanted “junk” mail or spam. It is known that this may on occasion reject a valid email. Protecting Intellectual Property and Copyright. Copyright is a form of protection of intellectual property provided by the laws of the United States to the authors of original works. Copyright is an issue of particular seriousness because technology now allows the easy copying and transmission of some protected works. It is the responsibility of all students, faculty, and staff at Wagner College to understand and comply with the College’s copyright policy. The College’s designated agent for notices under the Digital Millennium Copyright Act is the Director of the Library. Federal copyright laws also protect the software available for use on computers at Wagner College. The software provided through the College for use by faculty, staff, and students may be used only on computing equipment as specified in the various software licenses. Faculty, staff, or students must not copy or reproduce any licensed software or intellectual property found on College computing equipment, except as expressly permitted by the software license, author, or granting authority. Faculty, staff, and students may not use unauthorized copies of licensed software on College-owned computers. Problem Resolution and Policy Violations. In cases where a member of the College community has allegedly committed a policy violation, broken a law, or causes harm to the information infrastructure, Information Technology may immediately revoke access privileges pending the outcome of a full review of the problem. In such cases, the individual will be notified as quickly as possible, by phone, electronic, campus or U.S. mail of the alleged violation. A representative of the Information Technology staff will contact the person to propose a meeting to discuss the alleged violation. Depending on the nature of the alleged offense, Information Technology may contact the appropriate senior college official (unit Vice President, Provost, Dean of Campus Life or designee) or law enforcement agency alerting them of the alleged violation and conferring with them on the appropriate next