SIPA Building

Computing Guidelines at SIPA

SIPA computing guidelines complement the University guidelines. SIPA IT endeavors to create an atmosphere that balances respect for individual computer users and SIPA resources in order to maximize the greatest benefit for all users while maintaining ethical and community standards of SIPA and Columbia University. This policy pertains to information technology systems, computing resources, and technologies made available to support activities at SIPA.

It applies to any device(s) and/or computer(s) owned by as well as those owned by individuals who have been authorized to install or connect personal equipment either on the premises or to the network (e.g., PDAs or remote-connections via home equipment). It includes: students, employees, temporary employees, consultants, contractors (and their employees), volunteers, and such visitors as are granted temporary user status by SIPA IT.

Computing Resources

Computing Resources

SIPA computing resources are defined to include (but are not limited to) such devices as personal desktop computers, laptop computers, monitors, hard drives, printers, scanners, network devices, personal digital assistant devices (PDAs), networking equipment, servers, software developed by SIPA, and software acquired by SIPA. All relevant data and information acquired by, managed, stored, transmitted, or maintained for administrative purposes is considered a computing resource. This also extends to include any computer system that is owned or managed by SIPA IT, regardless of its location.

Support

SIPA IT is available to assist, advise and consult with users on the proper use of computer resources and the interpretation of this policy. If users have any questions or uncertainty about this policy, they are encouraged to contact the Executive Director of Information Technology for clarification.

SIPA IT and its team members are charged with maintaining SIPA’s computing resources. In addition to being bound by the policies of this document, they have been given additional privileges and responsibilities in order to accomplish their tasks.

    • Computing and network resources are provided primarily to support and further SIPA’s mission. 
    • All members of SIPA’s computing community who share in the benefits of its computing environment are partners in maintaining and protecting this environment, its resources, and the interests of other members. 
    • Individuals using SIPA-owned computer technology resources are expected to comply with all applicable SIPA IT, University, local, state, and federal guidelines, policies, regulations, statutes, and procedures pertaining to confidentiality and privacy, including, but not limited to, the Family Educational Rights and Privacy Act of 1974 (FERPA), and the University’s computing & security policies. 
    • Some of the material used at the School is copyrighted, protected by intellectual property law and/or license agreements. Community members should undertake reasonable efforts to ensure that they do not violate the various laws, policies, procedures and license agreements. Computing Guidelines are to ensure that they do not violate the various laws, policies, procedures and license agreements. All members are responsible and accountable for their actions and statements in the electronic working and learning environment, according to the University’s Rules of Conduct.
    • Community members are expected to use reasonable restraint in consumption of these valuable shared resources, and to use them in ways that do not interfere with the study, work or working environment of other users. 
    • Community members entrusted with computing resources are responsible for the safety and security of SIPA’s property and information. This includes physical security (e.g., the locking of equipment when unattended), locking one’s workstation when unattended, using appropriate password security, and performing best practices (see University guidelines at www.columbia.edu/acis/security/users/index.html).
    • SIPA’s computing resources should primarily be used for educational and administrative purposes. Any data stored by or transmitted to members on the SIPA network is confidential and will not be accessed by SIPA IT without just cause and due process. In circumstances of alleged impropriety, formal procedures permit persons responsible for computers or networks to request specific institutional authorization to examine directories, files, email or other electronic records that are relevant to the investigation of the allegation. 
    • All users must follow prescribed procedures for accessing systems, maintaining account security, storing information, and transmitting information. 
    • SIPA network users accessing and using non-SIPA computing resources are bound by the policies of the external resource, and more restrictive applicable policy applies.
    • Anyone who observes actual or apparent use which appears to violate SIPA IT Guidelines or another applicable policy is encouraged to bring the matter to the attention of SIPA IT.
  • Below are presented illustrative, but not exhaustive, examples of unacceptable uses of SIPA computing resources. Some of these unacceptable uses also constitute criminal offenses.

    • Unauthorized access (hacking): This may include using unauthorized user names, passwords, computer addresses, or identities; modifying assigned settings to gain access to computer resources and/or data; using unauthorized interfaces or procedures; or otherwise attempting to evade, disable or “crack” security provisions of SIPA or external systems. 
    • Unauthorized Distribution and Disclosure of Information: Every effort must be made to prevent the unauthorized disclosure and distribution of information that is the property of SIPA.
    • Installation or alteration of systems, peripherals, or software: SIPA’s computing resources have been designed to provide a stable, highly available, and secure computing environment in keeping with the school’s mission in a cost-effective, secure, and supportable information technology delivery structure. The introduction or reconfiguration of computing resources can be unintentionally detrimental and is not permitted. As computing technologies and capabilities change over time – users are encouraged to work with SIPA IT in identifying, researching and selecting new computing resources, extending the existing computing environment, or improving the existing computing environment.   
    • Vandalism of data: One may not deliberately alter or destroy computer data. Under no circumstance may a user inspect, alter, delete, publish or otherwise tamper with files or file structures that the individual is not authorized to access.
    • Storing music, copyright materials or personal pictures on the SIPA network: SIPA network is solely for office related work. Any personal music or pictures stored will be removed by the system automatically without any notification on a regular basis. Each user will be held responsible for any copyright information stored on the SIPA network and subject to University, state and federal laws.
    • Misuse of e-mail may include but are not limited to:
    • Soliciting for political, religious or business ventures not directly affiliated with official SIPA activities
    • Transmitting information that is false, derogatory, profane or sexually explicit
    • Sending harassing materials (e.g., threats or offensive remarks about race, ethnicity or sexual orientation)
    • Attempting to disguise the identification or origin of the e-mail
    • Sending unwanted, uninvited spam e-mail to others.
  • All reports and incidents of inappropriate use of SIPA's computing resources will be properly investigated to ensure compliance with SIPA and University policies, as well as state and federal laws. Violators of computing policies will be subject to the normal disciplinary procedures at SIPA and the University. The loss of computing privileges may also result.
    Ethical and legal violations of computing policies will be dealt with in a serious and appropriate manner. Illegal acts involving computing resources may also be subject to prosecution by local, state, or federal authorities.

  • SIPA’s computing policies are designed to be complementary and supportive of University policies and policies which the University must uphold.

    Further, as many computing resources used by the SIPA Community are provided by other University functions, it is important to understand that your computing usage is also subject to other policies. You are encouraged to read and understand other applicable policies of the University. Below are links to applicable computing policies and rules of conduct.

  • Should changes be made to this policy, all reasonable attempts will be made to communicate the changes to SIPA’s computing community.