Turkish Art Exhibit Opens at NYIT Gallery 61
Turkish Art Exhibit Opens at NYIT Gallery 61
TEDx Explores Harmonic Tectonics
NYIT Students Surpass the $1 Million Mark in Combined Earnings from Internships
TEDxNYIT: Creating Harmony in a World Experiencing Tectonic Shifts
Dynamic, Radical Solutions Needed: 2014 Cybersecurity Conference Highlights
New York Institute of Technology (hereinafter referred to as "The College") provides resources for the academic research and instructional and business purposes of its faculty, staff, students and university affiliates. These resources include telephone and computer equipment, software, networks and accounts. Any and all information or communication transmitted by, received from or stored in these systems are property of the College and are provided for the use of NYIT students, faculty and staff as approved, in support of programs of the College.
Generally, computing systems and equipment are used carefully and appropriately. However, abuse of equipment or systems that causes disruption of users' productivity, and the integrity of their data and programs, may be subject to discipline or prosecution under College policies, and local, state, or federal laws.
The purpose of this Code is to define responsible technology usage, particularly for new users who may not be aware of the potential impact of their actions.
Computers, telecommunications, and information in electronic form create a need for ethical models. Information owners, both individual and institutional, must make a conscious and explicit effort to state and enforce their expectations of ethical behavior. Information users have an obligation to recognize the information owner's rights in order to protect and preserve their own rights to use that information.
Computer based information, recognized as a primary educational and research asset, should be protected from unauthorized modification, destruction, disruption, or disclosure - whether accidental or intentional. The use of these systems is a privilege, not a right, and may be revoked at any time.
The College assumes the responsibility to ensure the integrity of its computing systems, workstations, and facilities. Since no system is absolutely secure, however, usage will be monitored to ensure that irresponsible users cannot affect the performance and integrity of other accounts and other users' information or the systems themselves.
Each user is solely responsible for the usage incurred through his/her account/workstation. Individuals, who intentionally abuse accounts and privileges, degrade system performance, misappropriate resources, or interfere in any way with the operation of the technology, are subject to penalties. If you ever discover what may be a security lapse in our systems, please report your concerns to the Office of Information Technology at once.
Each user is assigned one or more confidential passwords intended to restrict access to files and systems, including e-mail. However, students and employees should have no expectation of privacy of documents stored on computer systems or in messages sent across the network. The College has the absolute and unconditional right to investigate, review and monitor these materials including, but not limited to: eradication of computer viruses; data access, backup and restoration; hardware and software inventory procedures, including scans for unlicensed software installations; installations, maintenance, updates and repair; investigations relating to compliance with College policies, including the College’s technology policies, and investigation of criminal, unlawful, or unauthorized activities as directed by local, state or federal authorities, or by the senior management of the College.
Access and use of College computing systems and services is defined below. It applies equally to all users of College owned and operated information systems and equipment.
Violators who are members of the College community will be subject to disciplinary action under College regulations applying to their respective status within the College. All violators will be subject to prosecution under any local, state, or federal laws that apply.
The following are examples of computer abuse (this list is illustrative and not meant to be all-inclusive):
Access to computer facilities by any individual may be restricted or denied for, but not limited to, the following reasons:
Violations of this code, including the above lists, may lead to any of the following disciplinary measures: