University Policies

Internet and WWW Security Policy

Information Technology Services
Information Technology Services

Internet and WWW services access is provided as a business tool and an information conduit to assist in the accomplishment of the College’s educational and business goals.

Access to the Internet and World Wide Web (WWW) using Worcester State network or computing resources must be implemented in a secure manner to protect critical business assets and information.

  • Users must authenticate their identities before being permitted access to the Internet.
  • The Internet or WWW must never be used to communicate Worcester State proprietary or confidential information, unless the confidentiality and integrity of the information is assured, the data is encrypted and the identity of the recipient(s) is authenticated. All policies governing remote access and the use of messaging resources must be adhered to when using the Internet for remote access to Worcester State.
  • Users are required to comply with local and international laws governing the use of protection software when selecting appropriate safeguards for Internet use. The Information Security Officer must approve all protection mechanisms used. Users must ensure that precautions are taken to protect Worcester State’s networking and computing resources when obtaining software, files, and data from the Internet.
  • Users have the responsibility of ensuring that all software, files, and data entering Worcester State’s computing environment are properly scanned for all potential contaminants, including, but not limited to, viruses, malicious programs, malicious applets, and “Trojan Horse” functionality.
  • Users must not intentionally develop, download, or otherwise install programs or other software that will infiltrate a network or computer resource and damage or alter the software, hardware, or information contained on the network or computer resource.
  • Employee use of the Internet may be monitored for inappropriate use and impact to productivity. Users are required to respect and comply with local and international legal protection provided by trade secrets, patents, copyrights, and trademarks to any information viewed or obtained via the Internet. No copyrighted software may be downloaded for the purpose of use and/or further distribution to Worcester State’s networking and computing resources without the proper license to use and/or distribute such software.