Privacy Policy
1.0 Purpose
51ĀŅĀ× provides numerous information technology resources for the benefit of all members of the university community. These resources include frequently accessed programs such as web sites, email, course management systems, and online payment systems as well as computer systems such as myGate which may be more specialized in their use and application. Members of the public, too, may visit and search 51ĀŅĀ× web pages and utilize tools which appear there. The University also provides network and internet access thru the Campus and ResNet networks to members of the campus community. Of course, 51ĀŅĀ× also provides numerous computers for use with work and study as well as the basic infrastructure and architecture which enables the system to operate.
All of these resources enable users to communicate with each other, the University, and others off campus; to transact various matters of business; and to gain access to a vast amount of data with greatly increased ease and efficiency.
51ĀŅĀ× has established this policy so that users are aware of the privacy which surrounds their use of technology resources and the information and communications they send and which are received by, and which are stored in, such means.
If you have any questions or concerns about this policy or your information, please contact Information Systems at 270.809.2155.
2.0 Scope
This policy applies to all users of university information technology resources, which is defined as all information technology/network equipment, facilities, and services made available to users by 51ĀŅĀ×, and the data stored thereon. The term information technology resources encompasses all university owned and operated computers, software, hardware, and infrastructure. It further includes all university services and programs such as email, online payment, and 51ĀŅĀ× web pages. It also includes:
-
Data and other files, including electronic mail, stored in or located or residing on (temporarily or otherwise) university-owned centrally-maintained systems, departmentally-maintained systems, and university-owned systems or computers.
-
University data and other files stored off campus in systems owned or operated by other entities. These systems may be subject to their own terms and conditions related to privacy and other matters.
-
Data communicated over Campus and ResNet networks.
-
Telecommunications (voice or data) traffic from, to, or between any devices described above including voicemail.
As used in this Information Technology Privacy Policy, āyouā and āuserā both refer to any individual -- whether student, faculty, staff, or individual external to 51ĀŅĀ×āwho uses 51ĀŅĀ× information technology resources.
3.0 Policy
3.1 What Information is Available from 51ĀŅĀ×ās Technology Resources
3.1.1 Information You Knowingly Provide
You may communicate via 51ĀŅĀ× Stateās information technology resources for many reasons. You may send an email to the Bursarās Office, Human Resources, a work colleague, or a friend; forward a draft document to a co-worker; submit a class assignment to a professor electronically; or apply for admission to the University via an online form. Thus, depending upon the nature of any communication the information transmitted and available through information technology resources could include personally identifiable information such as name, telephone numbers, date of birth, permanent addresses, social security number, employment or class information, etc. Information requested by 51ĀŅĀ× in forms or applications is needed so 51ĀŅĀ× can provide the service you need or request.
3.1.2 Information You May Not Realize You Provide
In addition to the kinds of information referenced above, information may be transmitted and recorded (whether you realize it or not) anytime you use 51ĀŅĀ× Stateās technology resources including simply visiting a 51ĀŅĀ× web site. This information includes but is not limited to:
- Internet address of the computer being used
- The web pages requested or viewed
- The network software accessed
- The web page which referred the user to any 51ĀŅĀ× web page
- The internet browser used
- The date, time, and duration of the activity
- The accounts accessed
- The volume of data stored and transferred
3.1.3 Documents and files
You may use 51ĀŅĀ×ās information technology resources to create files, documents, or other compilations of data or information. These items may not be sent to anyone, but may simply be created on a 51ĀŅĀ× computer at a work station or in a computer laboratory and could remain there without you intentionally saving them on the computer.
51ĀŅĀ×ās information resources are used to create, store, and manage files or documents about employees, students, alumni, contractors, and others. These documents can contain personally identifiable information including name, address, date of birth, social security number, gender, race, grades, and other personal information, as well as financial information such as salary, banking information, and payroll deductions. Such information and the compilation of such information are necessary in order to carry on the regular operations of an institution of higher education.
3.1.4 Cookies
Cookies are a technology which can be used to provide you with tailored information from a web site. A cookie is an element of data that a web site can send to your browser, which may then store it on your system. It can then be read back later by the web site when required. The use of cookies is a convenient way of allowing a computer to remember specific information relating to a web site. You can set your browser to notify you when you receive a cookie, giving you the chance to decide whether to accept it.
51ĀŅĀ×ās systems make use of cookies for the following purposes:
- Site administration
- Completing the user's current activity
- User Targeting
- Site improvements via to analyze behavioral metrics, heatmaps, and session replay
- Site optimization
3.1.5 Information from On-Line Payments
It is possible to make on-line payments at 51ĀŅĀ× with debit and credit cards and e-checks. In some instances, the user making the payment is directed to a third party website in order to make payment. The third party sites may have their own privacy policies. In other instances, on-line payments result in the storage of information on 51ĀŅĀ× servers.
3.1.6 E-Mail
Emails sent or received using 51ĀŅĀ×ās information technology resources or sent from or to any email address provided by 51ĀŅĀ× (e.g. astudent1@murraystate.edu or astudent1@coe.murraystate.edu) are subject to monitoring and access by 51ĀŅĀ×.
51ĀŅĀ× may utilize an outside e-mail/service provider. In the event 51ĀŅĀ× utilizes an outside e-mail/service provider, 51ĀŅĀ× will maintain on its own servers copies of all e-mail sent or received through that e-mail/service provider; this email will be subject to this Information Technology Privacy Policy. The e-mail/service provider will also monitor and have access to the accounts which it provides. 51ĀŅĀ× will also have access to emails and other documents/transmissions in those accounts maintained by the provider. The provider will have its own privacy policies.
3.2 Who Has Access to Information Available From 51ĀŅĀ×ās Information Technology Resources?
3.2.1 51ĀŅĀ× Employees
-
To provide services
-
As noted above, information technology resources are used to communicate with the University and its staff and faculty for many different reasons. Requests for services and information from and submissions to the University are reviewed by the appropriate 51ĀŅĀ× employee. Depending upon the nature of the userās transmittal, the communication may be reviewed by more than one employee in order to provide the needed service. These employees will only use this data for work related purposes, which may include sharing it with appropriate individuals outside 51ĀŅĀ×, and as otherwise allowed here.
-
In the course of their normal job duties and the operation of the University, authorized employees will have access to data, including stored data, about you. This data may not have been communicated directly to those employees by you, but appropriate employees will have access as a regular part of their employment. They will only use this data for work related purposes, which may include sharing it with appropriate individuals outside 51ĀŅĀ×, and as otherwise allowed here.
-
-
Monitoring and Access
-
51ĀŅĀ×, as a regular part of its business, monitors its information technology resources in an effort to ensure they are used in accordance with law and university policy, that they are operating efficiently, that there are no threats to them, and that they are regularly maintained and up-dated. This regular monitoring may result in 51ĀŅĀ×ās accessing information technology resources you use including email and communications you send or receive, viewing or scanning files or software you have placed on 51ĀŅĀ×ās information technology resources, and retrieving, copying, and distributing information found. Appropriate action will be taken if this regular monitoring reveals violations of law or any university policy.
-
51ĀŅĀ× may as a regular part of its business also monitor and access the information technology resources you use. This includes email and communications you send or receive or files or software you have placed on 51ĀŅĀ×ās information technology resources. 51ĀŅĀ× may retrieve, copy, and distribute information found if such actions are taken by an employee as a regular and necessary part of his/her job duties, or if such actions are determined to be in the best interests of 51ĀŅĀ× by the Chief Information Officer or higher level of university management. This may occur, for example, in the event there are reasonable grounds to believe:
-
There is a threat to the Universityās information technology resources, or if such access is needed to ensure the efficient operations of any 51ĀŅĀ× information technology resources
-
That a violation of university policy or an illegal act has occurred or may occur
-
There is a threat to university property or the rights of the University
-
There is an emergency affecting the safety of persons or property
-
Access is needed in order for 51ĀŅĀ× to conduct its regular business affairs efficiently
-
Litigation involving the University or its agents or employees is possible or on-going.
-
A work document, to which a department needs access, is on an employeeās computer but the employee is absent.
-
-
51ĀŅĀ×ās monitoring and access may occur without notice to you. The fact that any information technology resource is password protected will not prevent monitoring and access by 51ĀŅĀ×. Monitoring and access may include physically accessing information resources wherever located.
-
3.2.2 Disclosure of information to individuals outside of 51ĀŅĀ×
-
51ĀŅĀ× may initiate disclosure of information from its information technology resources to persons or entities inside or outside the University if needed in order for 51ĀŅĀ× to carry on its activities as an institution of higher education or if otherwise consistent with law. 51ĀŅĀ× employees may need to share information with other agencies in order to implement programs provided at 51ĀŅĀ× or to assist with a particular request. 51ĀŅĀ× will advise law enforcement officials, including the Universityās Department of Public Safety and Emergency Management, if the regular monitoring of its information technology resources uncovers activity which may be criminal in nature such as downloading child pornography or communications of an illegal nature.
-
Requests for information from persons or entities outside the University. The following considerations are relevant in the event 51ĀŅĀ× receives a request from a person or entity outside the University for information, including personally identifiable information, available from its information technology resources.
-
FERPA. In general, personally identifiable information in records maintained by or for 51ĀŅĀ× which directly relates to a student may be disclosed only as allowed by the provisions of the Family Educational Rights and Privacy Act (FERPA). The Universityās current FERPA policy, including the provision by which students can prevent disclosure of certain ādirectory information,ā can be found on the Registrar's Office forms and policies page.
In addition to what is stated in the policy, FERPA recognizes that information in student records can under certain circumstances be shared with individuals outside 51ĀŅĀ× even if a student does not consent.
-
Kentucky Open Records Act
-
Because 51ĀŅĀ× is a public agency, it is subject to the provisions of the Kentucky Open Records Act. These statutes require the release of certain records the University maintains, including electronic records, if a proper request is made.
-
Not all records, however, are subject to release. The open records act exempts from disclosure, for example, information of a āpersonal natureā contained in a record maintained by the University. Thus, 51ĀŅĀ× does not provide an employeeās social security number or bank account information even if a proper open records request regarding the employee is made. Information otherwise protected from disclosure by FERPA will not be disclosed in response to a request under the Open Records Act.
-
Employee users of 51ĀŅĀ×ās email system are advised that their private and business email communications may be subject to the Open Records Act.
-
-
Other considerations
-
Release of information found within 51ĀŅĀ×ās information technology resources may be required if it is the subject of legal process, such as a subpoena, or is requested by an agency with proper jurisdiction.
-
51ĀŅĀ× may be required to produce information stored within its information technology resources in the event of litigation. In addition, 51ĀŅĀ× reserves the right to collect and release any information regarding or created by any user in the event 51ĀŅĀ× and the user are involved in litigation including any administrative or internal proceedings.
-
3.3 Security of information
51ĀŅĀ× State utilizes appropriate and reasonable measures to protect the security of its information technology resources. It cannot, however, guarantee absolute security for information.
51ĀŅĀ× has no control over the privacy of information you share on any pages or sites outside of the murraystate.edu domain even if they are accessed through or linked to 51ĀŅĀ× information technology resources. Similarly, 51ĀŅĀ× cannot guarantee security of data once it is released to a third party.
4.0 Review and Modification
-
Proposals for amendments to this policy will be forwarded to the Chief Information Officer. The proposals and comments will be brought before the ITAC Policy Review Subcommittee by the Chief Information Officer.
-
Any amendments to this policy will be approved by the President of the University. All new or amended policies will become effective as soon as Presidential approval is obtained and they have been published on the Policy website.
5.0 Penalty
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
6.0 Acceptance/Consent
Signature on an account application form, acceptance of a user ID, online registration, or use of any information technology resource denotes that the applicant/user has read and understands, accepts and consents to this Information Technology Privacy Policy.
Information Technology Privacy Policy (downloadable PDF)
Requires Adobe Acrobat Reader