diff --git a/content/i-policies-for-all/h-information-technology/h-3-privacy-and-security-policy.md b/content/i-policies-for-all/h-information-technology/h-3-privacy-and-security-policy.md index fa09a7f93..f8f533c2a 100644 --- a/content/i-policies-for-all/h-information-technology/h-3-privacy-and-security-policy.md +++ b/content/i-policies-for-all/h-information-technology/h-3-privacy-and-security-policy.md @@ -1,5 +1,139 @@ --- slug: /pages/i-policies-for-all/h-information-technology/h-3-privacy-and-security-policy title: H.3. Privacy and Security Policy -date: 2024-10-22 ---- \ No newline at end of file +date: 12/11/2024 +--- +# PURPOSE + +Handling confidential and private information appropriately is a core Middlebury value. The Information Technology Privacy and Security policy outlines how Middlebury balances legitimate expectations for personal privacy with compelling institutional interests to ensure the safety and security of our community, compliance with various legal and regulatory requirements, and the reliable delivery and security of essential technology services and associated data. + +# SCOPE + +This policy applies to all students, faculty, and staff, as well as retirees, emeriti, contractors, guests, and other parties authorized to interact with Middlebury’s technology services. + +# Definitions + +Please refer to H.1 Information Technology - Overview for explanations of phrases and terms used throughout the Information Technology policies. + +# Policy + +ITS is committed to responsible behavior in its management and maintenance of technology services and makes every reasonable effort to respect personal privacy within the constraints of supporting Middlebury’s academic mission and facilitating administrative operations. + +## Your Rights and Responsibilities + +### Consent + +By choosing to interact with Middlebury technology services, including with your personally-owned devices, you consent to Middlebury’s monitoring and management practices as described in this policy. + +### Protecting Privacy + +Per Middlebury’s Information Technology Responsible Use Policy, you are obligated to protect sensitive information that you have access to and you must not abuse your privileges to access sensitive information for reasons other than fulfilling your official responsibilities. See: Information Technology Responsible Use Policy and [Banner Security Procedures.](https://www.middlebury.edu/information-technology-services/policies/information-security-policies/banner-security-procedures) + +### Marketing Data + +Middlebury will not share your personal data to third-parties for marketing purposes. Data is collected for the purposes outlined below. For additional information on website analytics, including options to opt-out of website analytic tracking, please refer to the [ITS Website Privacy Policy](https://www.middlebury.edu/about/website-privacy-policy). + +### Preservation of Information + +Middlebury may be compelled, either to protect its own interests, or as part of legal proceedings, to perverse information for an indefinite period. + +If you receive a Notice of Data Preservation from the Office of General Counsel, you are required to comply. Do not destroy records that are subject to data preservation requests. + +## Middlebury’s Rights and Responsibilities + +### Data Collection + +Middlebury collects technology service usage data to ensure the reliability, performance, and security of Middlebury technology services, as well as to comply with various legal and regulatory requirements. Data collected can typically be associated with identifiable individual account holders. Types of data collected include, but are not limited to: + +* Internet traffic logs +* Network traffic logs +* Wireless network data +* Authentication and access records +* Technology service access log, activity logs, and audit logs +* Email communications and associated message logs +* Telephone, instant messaging, and online conferencing usage logs +* Printing logs +* File access logs +* Geographic location data, inferred from the sources above and others + +### Log Retention + +Logs are retained as long as legally required or for legitimate business reasons including usage trending, performance monitoring, and cybersecurity. Logs may be preserved indefinitely if they were collected as part of a legal or conduct investigation. + +### Confidentiality + +As a general matter, Middlebury does not guarantee the confidentiality of any content housed within or transmitted through its systems or networks. In certain circumstances Middlebury may need to access information for legitimate institutional purposes, an illustrative but not exhaustive list of which are described below. + +#### Health and Safety Matters + +In situations where the safety of any human being is seriously threatened, Middlebury reserves the right to access information to reduce the health and safety risk. + +#### As Required By Law + +Middlebury must comply with legal process, including lawful demands for information in government investigations, law enforcement proceedings, etc. and it has obligations to preserve and produce information that is required in connection with threatened or pending litigation. Subpoenas, court orders, or other demands for information should be directed to the Office of the General Counsel. + +#### Investigations of Illegal Activity or Misconduct + +Under its policies, Middlebury may and often is required to gather information to investigate a possible violation of law or a breach of Middlebury policy. Access under such circumstances is restricted under the associated Procedure for Authorization, which ensures that appropriate senior leadership, such as the Vice-President for Human Resources, or the Dean of the Faculty, is informed in order to authorize access. Senior leaders may consult with the General Counsel, as needed. + +#### Operational Continuity + +Middlebury may access information necessary to carry out essential business functions, which may include circumstances of unexpected absence, death or other unavailability. + +### Authorization to Access Information + +#### Authorization for Access + +Under the circumstances outlined above, ITS is authorized to access information. + +#### Scope of Authorization + +All information and content created or logged while using a Middlebury technology service, including location data, may be subject to discovery in these cases. + +#### Campus Safety and Emergency Authorization + +ITS is authorized to access information in support of campus safety investigations and in emergency situations. Examples of information relevant to campus safety investigations include location information derived from either network or authentication logs. + +Emergency access to information needed to reduce a serious threat to a person’s health or safety may be authorized by an appropriate member of the Senior Leadership Group, the AVP of Public Safety, and/or official delegates of the above. The authorizing party is responsible for notifying appropriate offices, after the emergency is resolved, of the actions taken. Notice will ordinarily be given to an identified user within a reasonable period of time, although Middlebury may exercise discretion in such notifications. + +#### Electronic Discovery Authorization + +Other than in an emergency, access to identifiable electronic information in connection with a legal or conduct investigation may be authorized by individual account holder(s) subject to investigation, or the following authorities and/or their official delegates: + +
Cohort | Authorizing Senior Leader(s) |
All community members | Dep. General Counsel General Counsel Chief Risk Officer President |
All staff | VP for Human Resources EVP for Finance and Administration |
College faculty | Dean of Faculty VP for Academic Affairs EVP for Academics and Provost |
College students | VP for Student Affairs Dean of College |
Middlebury Institute faculty | Dean of the Institute VP for Academic Affairs |
Alumni, Parents, and Friends | VP for Advancement |
Faculty and Students of the Schools | VP for Academic Affairs Dean of the Schools |