In support of its mission, Tech Journey, Inc. (or “Tech Journey”) provides access and use of computer systems and information to program participants, donors, Board of Directors, staff, volunteers and other stakeholders. Tech Journey has a strong interest in protecting the privacy and confidential interests of all individuals involved in its mission through the security and integrity of its computer systems. The Computer Use Policy included herein has been developed to explain the expected use and care regarding Tech Journey computer systems.
All employees and volunteers should be familiar with these expectations and should be aware that misuse, destruction, theft, alteration or any other form of sabotage of Tech Journey’s computer systems is prohibited and may result in disciplinary action and/or legal action.
The Tech Journey Executive Director is responsible for carrying out the details of this policy. This policy is effective as of the most recent date listed in the Change Log section below.
The term computer systems refers to all equipment and data associated with or stored in Tech Journey’s domain and third-party service providers including, but not limited to, internal and external communications, transactional records, accounts, data files, websites, applications, software programs, Chromebooks and personal computers, servers, tablets and other hardware devices.
The term user refers to all employees, independent contractors, Board of Directors, volunteers, program participants or students and other persons or entities who have been granted access to Tech Journey computer systems.
The term system administrator refers to the personnel role which designs, procures, implements, configures, monitors and/or troubleshoots to ensure security, integrity and efficiency of Tech Journey’s computer systems.
Tech Journey’s computer systems are the property of Tech Journey whether they are located at a user’s residence, a third-party location or a temporary venue where Tech Journey’s mission is being carried out. All data, messages, files, and software created, sent, received or stored in the system as well as information and materials downloaded into Tech Journey computers are also the property of Tech Journey. Users are not allowed to share, remove, download or copy any data from the Tech Journey computer system other than for specific Tech Journey mission-related activities.
ACCESS AND USE
Tech Journey’s computer systems are to be accessed for legitimate purposes to carry out its mission. Such access is a privilege, and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations.
Users must not use Tech Journey’s computer systems in any way that is considered illegal under all applicable laws or that may reasonably be considered as insulting, disruptive or offensive by other individuals. Examples of prohibited transmitted or stored data include sexually explicit messages, cartoons or jokes, unwelcome propositions, ethnic or racial slurs, or any other messages or media that can be constructed to be harassment of other persons based on their sex, race, age, national origin, religious beliefs, or other personal characteristics or circumstances. Please refer to Tech Journey’s Safety Policy & Guidelines for additional details.
Users do not have a right to privacy regarding any data created, stored, sent or received through Tech Journey’s computer systems. However, users may have rights of access to information about themselves contained in Tech Journey’s computer systems, as specified by federal and state laws.
To protect the interests of Tech Journey, its program participants, volunteers, staff and Board of Directors, in its discretion and following organizational guidelines, may monitor, retrieve or store any files, messages or documents composed, sent, received or downloaded in the Tech Journey computer systems at any time without notice. For example, a system administrator may access emails and files during an employee’s absence or retrieve files created and stored by a program participant in response to a harassment complaint. Additionally, a system administrator may access user files as required to protect the integrity of computer systems. For example, a system administrator may access or examine files or accounts that are suspect of unauthorized use or misuse, or that have been corrupted or damaged.
Users requiring access to Tech Journey computer systems will be provided a named domain account for a length of time commensurate to his/her role or responsibilities. Specifically,
- Program participants may be provided a named domain account for use during his/her tenure in Tech Journey programs;
- Staff will be provided a named domain account while employed by Tech Journey;
- Board members may be provided a named domain account during his/her service term on the Board of Directors; and
- Volunteers or other stakeholders may be provided a named domain account for a term necessary to provide service for a specific activity or program. For example, a volunteer instructor may be provided a named domain account for one week while instructing at Tech Camp.
A system administrator, during regular and routine system maintenance, will revoke access to computer systems at the end of the terms described above. Users are also expected to return non-electronic artifacts containing privileged or confidential information at the time of program graduation, separation from employment or expiration of volunteer service.
Users of Tech Journey’s computer systems may not attempt to circumvent Tech Journey’s information security measures or uncover security loopholes or bugs. Users may not gain or attempt to gain unauthorized access to restricted areas, files or data on the computer systems. Users are prohibited from tampering with any software protections or restrictions placed on the computer operating systems, applications, files or directories. Users are not to make any additions, deletions or changes to Tech Journey’s computer systems without the appropriate authorization from the Board of Directors or Executive Director.
A user’s named account and password relates directly to his/her specific security level within Tech Journey’s computer systems and therefore should not be shared with other users. Users are responsible for safeguarding their security passwords for access to the computer system. Users are responsible for all activity and transactions made via their named accounts.
TRAINING AND EDUCATION
All users will receive an orientation that includes review and receipt of Tech Journey’s Computer Use Policy.
QUESTIONS AND CONTACT INFORMATION
For more information, please contact us.
Board of Directors resolution February 19, 2021