- About Ramapo
- Academics
- Admissions & Aid
- Student Life
- Alumni
- Arts & Community
- Quick Links
- Apply
- Visit
- Give
img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; }
All graphics, photographs, and text on the 缅北禁地 home page and connected pages displaying the 缅北禁地 logo, unless otherwise stated, are copyrighted by 缅北禁地 of New Jersey. Redistribution or commercial use is prohibited without express written permission.
缅北禁地 is committed to protecting your privacy. Any information you voluntarily provide to us through a 缅北禁地 website, such as an email address, name, or phone number, will never be sold to other colleges, universities, non-profit organizations, or businesses.
Information gathered automatically
Unless you take steps to browse the Internet anonymously, or , 缅北禁地, like most institutions and organizations on the Internet, tracks web browsing patterns to inform understanding of how our sites are being used. Generic information is collected through the use of “cookies,” which are text files placed on your computer, to evaluate usage patterns so that we can improve both content and distribution. You may refuse the use of cookies by selecting the appropriate settings on your browser; however, doing so may prevent you from using the full functionality of all of our websites.
缅北禁地 websites use Google Analytics, a web analytics service provided by Google, Inc. Google Analytics uses cookies to help us analyze how users use our sites. The information generated by the cookie about your use of the website includes your IP address. This information will be transmitted to and stored by Google on its servers. Google will use this information for the purpose of evaluating your use of the website, compiling reports on website activity, and providing other services relating to Internet usage. Google may also transfer this information to third parties where required to do so by law, or where such third parties process the information on Google鈥檚 behalf. Google will not associate your IP address with any other data held by Google. By using this website, you consent to the processing of data about you by Google in the manner and for the purposes set out above.
Please visit the following pages for more information on Google Analytics and Google鈥檚 .
External links
Some 缅北禁地 websites may contain links to external websites not owned by, or officially affiliated with, 缅北禁地 in any way. 缅北禁地 is not responsible for the privacy practices or the content of such websites.
Electronic messages sent to the identified email Website contacts will be answered by the recipient or forwarded to another individual at Ramapo to be answered. Email messages and copies of replies may be kept and reviewed to help ensure the relevance of information presented in the Ramapo Website and the usefulness of the replies.
The use of copyrighted material on the Ramapo public Website must be consistent with the policy described in the preceding paragraphs and consistent with existing federal laws and statutes.
According to the U.S. Copyright Office, “copyright protects original works of authorship that are fixed in a tangible form of expression.” Copyrighted works include the following categories:
Pursuant to title 17 United States Code, Section 512 (c)(2), (Digital Millennium Copyright Act) notification of claimed copyright infringement must be reported to the designated agent listed below:
Robert Doster
Chief Information Officer
缅北禁地 of New Jersey
505 Ramapo Valley Road
Mahwah, NJ 07430
Phone Number: (201) 684 –听7402
Email Address: rdoster@缅北禁地.edu
The act requires the complaint to include the following:
See Also Statement of Confidentiality
Computing resources are provided to support the academic research, instructional and administrative objectives of 缅北禁地. These resources are available for the use of college faculty, staff, students, and other authorized users to accomplish tasks consistent with the college’s mission. College systems offer powerful tools for communication among members of the Ramapo community and communities outside of the college. When used appropriately, these tools can enhance dialogue and communications. Unlawful or inappropriate use of these tools, however, can infringe on the rights of others, and is unacceptable in an academic institution.
缅北禁地 expects all members of its community to use electronic communications in a responsible manner. The college reserves the right to limit access to its networks through college-owned or other computers, and to remove or limit access to material posted on college-owned electronic media. Recognizing that the college is creating a limited public forum, the college retains the right to limit access and postings to college systems.
As a means to foster intellectual pursuits, the college will make every effort to respect the privacy of all users. However, for technical reasons related to system architecture and maintenance needs, privacy cannot be guaranteed at all times and users must take this into account when composing email or surfing the Web. An expectation of privacy is further limited by the needs of the college to comply with State and Federal laws, protect the rights of students, faculty, staff, board members, and invitees, and/or to meet administrative objectives.
缅北禁地 faculty and staff are provided with e-mail accounts for the purpose of conducting official college business related to instructional, academic and/or administrative activities to accomplish tasks consistent with the college’s mission. Because email is an effective way to disseminate information of importance, relevance and interest, and because it is an important tool to meet the academic and administrative needs of the college community, it shall be the college’s policy that electronic mail (email) be an official communication mechanism with faculty, staff, and students and that all faculty, staff, and students are required to maintain an “@缅北禁地.edu” address. This is the only email address that will be used for official communication with faculty, staff, and students regarding all academic and administrative matters. Retired tenured faculty and retired staff with at least ten years of service may be permitted to retain their e-mail accounts upon request.
Responsible Unit:听Academic Affairs
Date Adopted: February 14, 2001
Date Revised: February 2006, October 2008, December听 8, 2008
The following definitions apply to the terms used in this policy.
Covered Persons: All current members of the college community including staff, faculty, students, adjunct faculty, eligible retirees and college volunteers such as board of trustee members, 缅北禁地 Foundation Board members, who have been granted access to college systems.
College Systems: Computers, network systems, servers, facsimile machines, telephony, video and other similar devices and systems that are administered by the college and for which the college is responsible.
Chief Information Officer (CIO):听 The chief information officer is responsible for academic and administrative computing, the college network, email systems, help desk, computer labs, telecommunications, Resident Life Network, the Instructional Design Center, the integrity and security of the College technology infrastructure and for confidentiality of electronic communications.
Education Records: Records specifically related to students and maintained by an educational institution or a party acting on its behalf. These records are protected by the Family Educational Rights and Privacy Act of 1974 (FERPA) as amended.
Electronic Communications: The use of college systems in the communicating or posting of information or material by way of electronic mail, bulletin boards, or other such electronic tools.
ITS: 缅北禁地鈥檚 Information Technology Services.
Network Systems: Includes voice, video and data networks, switches, routers and storage devices.
Systems or Network Personnel: Those tasked by the CIO with maintaining college systems.
Policy officer: A person with responsibility for issues having broad-based policy implications.
For incidents involving students, the policy officer is the vice president for student affairs;
For incidents involving faculty, the policy officer is the provost / vice president for academic affairs; and
For incidents involving staff, the policy officer is the chief planning officer.
Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to the work of all authors and publishers in all media. It encompasses respect for the right to acknowledgment, right to privacy, and right to determine the form, manner, and terms of publication and distribution. Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Users are responsible to comply with the following:
It shall be the user’s responsibility to comply with all the stipulated requirements set forth in the above section. Failure to comply with the provisions for “User Responsibility” may subject the user to specific sanctions as set forth in the “Violations” and “Sanctions” sections below.
Backing up Data: It shall be the users鈥 responsibility for backing-up their own electronically stored data. While the college has a policy of backing up data on its general access systems at regular intervals as preparation for a catastrophic loss of resources, or as required for legal proceedings or processes, users should not rely on these actions. A user’s decision whether or not the college’s back-up is an adequate substitute is the individual’s decision but alleviates any responsibility of the college to maintain such back-up.
Authorized Designees
The Administration has authorized primary and secondary designees to send broadcast e-mail and voice mail announcements through the Luminis 听and phone system.听 When primary designees are not available, secondary designees may be contacted.
OFFICE OF THE PRESIDENT
Has the authority to access the Luminis announcement Website or other vehicles to broadcast official messages from the president, including messages from the trustees and some bereavement messages.
Primary Contacts: Executive Assistant to the President, Special Assistant to the President
Secondary Contacts: Assistant VP of Marketing and Communications, Associate Director of Web & Digital Marketing
COMMUNICATIONS AND PUBLIC AFFAIRS (Institutional Advancement)
Has the authority to access the Luminus announcement Website or other vehicles to broadcast official messages from the vice president for institutional advancement; additionally, serves as secondary authority for messages from the Office of the President. In its official 鈥渃ollege spokesperson鈥 role, the Office of Marketing and Communications has authority to broadcast official messages about campus safety and emergencies.
Primary Contacts: Executive Secretarial Assistant, Assistant VP of Marketing and Communications
Secondary Contacts:听Associate Director of Web & Digital Marketing
HUMAN RESOURCES
Has the authority to access the Luminus announcement Website to send targeted messages and broadcast messages about: critical alerts related to human resources, key internal processes, procedures and deadlines, bereavement, benefits information, and other information as appropriate.
Primary Contacts: Secretarial Assistant, Director of Human Resources
Secondary Contact: Associate Director of Human Resources or Assistant Director of Human Resources.
DEANS
Have the authority to access the Luminus announcement Website to send a targeted message to conveners, faculty and students within the School.
Primary Contacts: Unit Secretary, Dean of each of the Schools
Secondary Contacts: To be determined by the Dean.
CONVENER/PROGRAM COORDINATORS
Have the authority to access the Luminus announcement Website to send a targeted message to faculty and students within the major or program.
Primary Contacts: Unit Secretary
Secondary Contacts: Convener of each major or program
FACULTY MEMBER
Has the authority to access the Luminus announcement Website to send a targeted message to students within a class.
Primary Contacts: Unit Secretary
Secondary Contacts: Faculty member
FACULTY ASSEMBLY
Has the authority to access the Luminus announcement Website to send a targeted message to faculty.
Primary Contacts: President of the Faculty Assembly
Secondary Contacts: To be determined by the President of the Faculty Assembly
STUDENT AFFAIRS
Has the authority to access the Luminus announcement Website to send a targeted message to students.
Primary Contact: Executive Assistant to Associate Vice Presidents for Student Affairs, Unit Secretary
Secondary Contact: Associate Vice Presidents for Student Affairs
PROVOST
Has the authority to access the Luminus announcement Website to send a message to faculty or students.
Primary Contact: Assistant Director for Academic Affairs
Secondary Contact: Provost
If you believe that a violation of this policy has occurred, contact the appropriate officer who will report the incident to the appropriate director or the CIO. There may be situations when the following additional offices should be contacted: Public Safety, if an individual’s health or safety appears to be in jeopardy; Human Resources, if violations occur in the course of employment.
It shall be a violation to intentionally seek information about, browse, copy, or modify files or passwords belonging to other people, whether at Ramapo or elsewhere. Explicitly and intentionally established public servers, or clearly designated files for shared public use may be assumed authorized for use. However, if it is unclear whether some files are intended to be available for public use, it shall be a violation to assume that they are intended for public access and it shall be assumed that they are private.
It shall be a violation to attempt to or to decrypt or translate encrypted material, with the intention of obtaining system privileges to which you are not entitled. It shall be a violation to take any action which interferes with the supervisory or accounting functions of college systems or that is likely to have such effects.
It shall be a violation to display on screens, in public or shared facilities, images, sounds, or messages that could reasonably be expected to create an atmosphere of discomfort or harassment for others. Restrictions on time, place, and manner for such access may be determined by the college. It shall be a violation to transmit to others in any location inappropriate images, sounds or messages which might reasonably be considered harassing. The college’s policies on harassment apply equally to electronic displays and communications as they do to more traditional means of display and communication.
It shall be a violation for any user of official @缅北禁地.edu email addresses to forge an electronic mail signature or to make it appear as though email originated from a different person, impersonate a college office, faculty/staff member, or student, to illegally access proprietary information, and/or attempt to gain access to another person’s mail files.
It shall be a violation to waste computing resources. Examples of violating the responsible use policy are:
The above are only examples and not an exhaustive list.
Compliance with Federal and State Law: Users shall be responsible for being aware that there are federal, state and sometimes local laws that govern certain aspects of computer and telecommunications access and use. Members of the college community are expected to abide by these laws, as well as, to observe and respect college rules and regulations.
Actions to be Taken by Systems and Network Personnel when Violations are Reported
In exceptional cases, the priorities of protecting the college against seriously damaging consequences and/or safeguarding the integrity of computers, networks, and data either at the college or elsewhere, may make it imperative that you take temporary restrictive action on an immediate basis. In such instances, you may take temporary restrictive action, preferably with the prior approval of the appropriate policy officer and/or the CIO, pending final adjudication by the college. All restrictive actions taken must be documented and justified in accordance with this policy.
In some instances, documentation prescribed above will constitute education records (see the “Definitions” Section of this document) and therefore will be protected under the Family Educational Rights and Privacy Act of 1974 as amended.
Actions to be taken by the Policy Officer
Policy officers are authorized to apply this policy and other existing college policies when a general violation or other violation is identified. When a specific violation is identified, as listed below, policy officers should follow the 鈥action to take鈥 in the Specific Violations section below.
Action to take:
Provide the targeted individual (victim) with the following information:
Appropriate Action if Violation is Reported by Another Individual:
Thank the party for forwarding the information and add the following:
“Harassment is a violation of Ramapo’s policies and codes, and in some cases state or federal laws. Complaints must be filed by the targeted person. If appropriate, please encourage the targeted person to contact the (appropriate policy officer).”
Note: Ramapo can act upon a complaint only if the sender of the material is a member of the Ramapo community. If the sender is not a member of the Ramapo community, the appropriate policy officer will assist the targeted individual by referring him/her to appropriate sources of help outside the college.
a. Propagating electronic chain mail
Action to take:
Provide the reporting party with the following information and take steps outlined below:
“Although we understand that some of these letters can be offensive or unwanted, 缅北禁地 cannot prevent their circulation. Forwarding chain mail using college resources violates Ramapo’s codes and policies, and in some cases may be illegal. I will be working with campus authorities regarding this incident.”
b. Interfering with freedom of expression of others by “jamming” or “bombing” electronic mailboxes.
Action to take:
Provide the party with the following information and take steps outlined below:
“Attempting to interfere with the freedom of expression of others violates Ramapo’s Code of Professional Responsibility Board of Trustees Policy # 458″ for faculty and staff violators and the Campus Code of Conduct” for student violators. I will be working with campus authorities regarding this incident.”
If the violator is a member of the Ramapo community, instruct him/her to cease the activity, referring to campus policy, and contact the appropriate policy officer for further guidance. If the violation is reported to the policy officer, he/she should contact the appropriate systems personnel. If the violation is reported to systems personnel, they should contact the appropriate policy officer. Systems personnel and policy officers should work together to resolve the violation. The appropriate policy officer should keep a record of all such violations. If the violator is not a member of the Ramapo community, contact the administrator of the originating system, if possible, as a matter of courtesy or follow-up.
c. Forging, fraudulently altering, or willfully falsifying electronic mail headers, electronic directory information, or other electronic information generated as, maintained as, or otherwise identified as college records in support of electronic communications
Action to take:
Provide the party with the following information and take steps outlined below:
“Forging, fraudulently altering or willfully falsifying college records violates Ramapo’s Code of Professional Responsibility for faculty and staff violators and the Student Code of Conduct for student violators. I will be working with campus authorities regarding this incident.”
If the violator is a member of the Ramapo community, instruct him/her to cease the activity, referring to campus policy. If the violator is not a member of the Ramapo community, contact the administrator of the originating system, if possible, as a matter of courtesy or follow-up.
d. Using electronic communications to forge an academic document.
Action to take:
Provide the party with the following information:
“This incident may violate campus policies or codes. I will be working with college authorities to review what actions may be appropriate.”
Contact the appropriate policy officer for further guidance. If the violation is reported to the policy officer, he/she should contact the appropriate systems personnel. If the violation is reported to systems personnel, they should contact the appropriate policy officer. Systems personnel and policy officers should work together to resolve the violation. The appropriate policy officer should keep a record of all such violations.
e. Using electronic communications to hoard, damage, or otherwise interfere with academic resources accessible electronically
Action to take: same as 2d
f. Using electronic communications to steal another individual’s works, or otherwise misrepresent one’s own work
Action to take: same as 2d
g. Using electronic communications to collude on examinations, papers or any other academic work
Action to take: same as 2d
h. Using electronic communications to fabricate research data.
Action to take: same as 2d
a. Electronically accessing, distributing or posting copyrighted material in violation of license restrictions or other contractual agreements or those that may be in violation of the Digital Millennium Copyright Act..
Responsible Use policy and procedures govern incidents involving the illegal distribution of copyrighted material – as transported through Ramapo’s networks or posted to Ramapo’s computers – by electronic means. The possession of misappropriated copyrighted material by a student violates the Campus Code of Conduct. The possession of misappropriated copyrighted material by faculty or staff violates the Code of Professional Responsibility.
b. Launching a computer worm, computer virus or other rogue program
c. Downloading or posting illegal, proprietary or material that may damage the college’s computer system.
d. Transporting illegal, proprietary or damaging material across Ramapo’s networks
Action to take:
Commensurate with the degree of urgency and potential damage to the institution, take pre-emptive steps – preferably with the approval of the appropriate policy officer – including ensuring the preservation of evidence.
a. accessing and/or downloading pornography and possibly child pornography
Action to take:
When the policy officer, or other college administrator, has knowledge that a covered person is using a college computer to access and/or download pornography, and possibly child pornography, the college will investigate and take prompt action to stop the unauthorized activity.听 If the violation is reported to the policy officer or systems personnel, he/she should contact the director of human resources who will conduct an investigation. The director of human resources and the policy officer(s) will work together to resolve the violation. The appropriate policy officer should keep a record of all such violations.
a. Posting threatening and/or harassing language that would constitute a group’s rights by any of the following modes of communication: network systems, college systems, or electronic communications.
Action to take:
Provide the party with the following information:
“Although this posting/communication may be offensive to members of the community, the college is respectful of expression in its own right. However, this posting/communication may constitute harassment, which is a violation of Ramapo’s policies and codes, and in some cases, state or federal laws. I will consult with campus authorities regarding this incident.”
Contact the appropriate policy officer for further guidance. If the violation is reported to the policy officer, he/she should contact the appropriate systems personnel. If the violation is reported to systems personnel, they should contact the appropriate policy officer. Systems personnel and policy officers should work together to resolve the violation. The appropriate policy officer should keep a record of all such violations.
Violations of appropriate use may result in one or more of the following actions:
Responsible Unit: Academic Affairs/CCIS
Date Adopted: February 14, 2001
Date Revised: February 16, 2006, June 5, 2007, October 6, 2008
Copyright ©2024 缅北禁地. Statements And Policies. Contact Webmaster.