IT Policy

IT Policy

Objective:
The purpose of the IT Policy is to ensure that all technological resources at Horizon College are utilized in a responsible, efficient, and secure manner. The policy aims to protect the integrity, confidentiality, and availability of information systems and technology, while promoting a positive and productive learning environment for students, faculty, and staff.


1. Scope

This policy applies to all users of Horizon College’s IT resources, including:

  • Students
  • Faculty
  • Staff
  • Administrators
  • Visitors who have access to the college’s network or computing resources

2. Acceptable Use of IT Resources

Horizon College’s IT resources include computers, network infrastructure, software, internet access, and other technological tools provided for educational and research purposes.

  • Academic and Professional Use: IT resources must be used primarily for academic, research, and administrative purposes. Unauthorized use of college systems for personal or non-educational activities is prohibited.
  • Respectful Behavior: Users must adhere to a high standard of professionalism and respect for others when using IT resources. Harassment, offensive content, or inappropriate behavior is strictly prohibited.
  • Software Usage: Only licensed software should be installed on college devices. Piracy and unauthorized software installation will not be tolerated.

3. Network Security and Data Privacy

Network Security:

  • Passwords and Authentication: Users are required to create strong passwords for their accounts. Passwords should be kept confidential and not shared with others.
  • Firewalls and Antivirus Protection: All devices connected to the college network must be protected by firewalls and antivirus software to ensure the integrity of the system.
  • Regular Security Audits: Horizon College will conduct periodic security audits to detect and eliminate vulnerabilities in the system.

Data Privacy:

  • Personal Data Protection: Horizon College respects the privacy of its users. Any personal data collected will be protected and handled in accordance with relevant data protection laws and regulations.
  • Access to Data: Access to sensitive data will be granted only to authorized personnel, and all users are required to maintain confidentiality.
  • Data Retention: Data, including academic records and personal information, will be retained for a period determined by the institution’s data retention policy and relevant regulations.

4. Internet and Email Usage

  • Internet Access: Students, faculty, and staff are granted internet access to support their academic and administrative activities. Usage should be aligned with the goals of the institution.
  • Prohibited Content: Access to illegal or unethical content (e.g., pornography, hacking, and pirated software) is strictly prohibited. The use of college networks for illegal activities will result in disciplinary action.
  • Email Usage: College-provided email accounts should be used for academic and professional communication. Personal use should be minimal and not interfere with academic responsibilities.
  • Monitoring: The college reserves the right to monitor the internet and email usage to ensure compliance with the IT policy.

5. IT Equipment and Hardware Usage

  • College Equipment: All devices (laptops, desktops, printers, etc.) provided by the college must be used responsibly. Misuse or intentional damage to college equipment will be subject to disciplinary action.
  • Personal Devices: Students and faculty are permitted to use personal devices (laptops, tablets, etc.) on the college network. However, such devices must comply with the college’s security standards, including antivirus and firewall protection.
  • Peripheral Devices: The use of unauthorized peripherals, such as USB drives or external storage devices, on college computers is prohibited unless explicitly approved by the IT department.

6. Social Media and Online Conduct

  • Professional Conduct: When using social media, students and staff should represent Horizon College in a professional manner, reflecting the institution’s values of respect, integrity, and responsibility.
  • Cyberbullying and Harassment: Any form of cyberbullying, harassment, or abusive behavior on social media platforms related to Horizon College will be treated seriously and could lead to disciplinary action.
  • Institutional Social Media Accounts: Only authorized personnel may manage official Horizon College social media accounts. Unauthorized representation of the college on social media is prohibited.

7. Backup and Data Protection

  • Data Backup: Students and faculty are encouraged to back up their work regularly to prevent data loss due to system crashes or hardware failures. The college will back up critical institutional data but is not responsible for individual data loss.
  • Data Integrity: Users should ensure that their work is stored in a secure and organized manner. Files containing sensitive information should be encrypted or password-protected where necessary.

8. IT Support and Helpdesk

  • Technical Support: The IT Department provides technical support to all students, faculty, and staff. Issues related to network connectivity, system failures, or software malfunctions can be reported to the Helpdesk.
  • Service Hours: IT support is available during regular working hours (9 AM – 5 PM). Emergency support outside these hours will be provided as necessary, depending on the issue’s severity.
  • Helpdesk Contact: A dedicated email and phone number are available for submitting technical issues or requests for support.

9. IT Policy Violations and Consequences

  • Policy Violations: Any violation of the IT policy, including unauthorized access, misuse of resources, or data breaches, will result in disciplinary action, which may include suspension of IT privileges, fines, or expulsion from the institution, depending on the severity of the infraction.
  • Reporting Violations: Students, faculty, or staff members who observe violations of the IT policy should report them immediately to the IT Department or through the Grievance Redressal Mechanism.

10. Policy Review and Updates

The IT Policy will be reviewed annually to ensure that it remains in line with technological advancements, legal requirements, and institutional goals. Any updates or changes will be communicated to all stakeholders promptly.

Scroll to Top
© Copy right reserved by Horizon Allienz Pvt Ltd.