ARTICLE IV FACILITIES PLANNING AND MANAGEMENT

Policy 4.01 Computer Resources Use

THE CITY UNIVERSITY OF NEW YORK
POLICY ON ACCEPTABLE USE OF DIGITAL ASSETS AND RESOURCES

I. INTRODUCTION
The City University of New York’s (“CUNY” or the “University”) Digital Assets and Resources, as defined below in section VI, are dedicated to the achievement of the University’s mission of education, research, and public service. This policy, which guides the University’s use of its digital assets and resources, is intended to maintain the continuity of CUNY’s IT and business operations, and protect the University, and its students, faculty, and staff.
II. SCOPE
This University-wide Policy (“Policy”) applies to all Users of CUNY Digital Assets and Resources. This Policy supersedes the CUNY Policy on Acceptable Use of Computer Resources, which the Board of Trustees approved on January 29, 2007, and last amended on June 29, 2015, and any College policies that are inconsistent with this Policy.
III. RULES FOR USE OF CUNY DIGITAL ASSETS AND RESOURCES
1. Legitimate Use.
a. Use of CUNY Digital Assets and Resources is limited to Users’ authorized activities in connection with their roles and responsibilities in relation to CUNY at any location, whether on or off CUNY property.
b. Users are permitted limited and reasonable personal use of CUNY Digital Assets and Resources so long as such use does not interfere with CUNY operations, compromise CUNY Digital Assets and Resources, affect the User’s employment or other obligations to CUNY, and is otherwise in compliance with this policy.
c. Users should be aware that personal messages, data, and other information sent or received through a User’s CUNY account or otherwise residing in a CUNY Digital Assets or Resources are subject to CUNY review and may also be subject to public disclosure pursuant to the New York State Freedom of Information Law (“FOIL”).
2. Cybersecurity and Protecting the Security of Digital Assets and Resources. CUNY employs various measures to protect the security of its Digital Assets and Resources and User accounts. However, CUNY cannot fully guarantee such security, as effective cybersecurity requires the participation of everyone. When accessing University digital assets and resources, Users are responsible for engaging in safe computing practices that include the following:
a. Taking all reasonable actions to keep software up to date, including by engaging with University or College staff when necessary. Avoiding phishing scams and fraud. Always verifying unsolicited inquiries and offers and being careful not to click on links from unknown sources;
b. Practicing good password management by choosing strong and unique passwords for every account or application. Accounts and passwords may not be shared except as permitted by this policy;
c. Using enhanced authentication features such as multi-factor authentication where available.
d. Locking the computer screen electronically when the User leaves a computer unattended, and logging out of applications and systems at the end of each workday;
e. Backing up important data. It may be the only way to recover data lost in a security incident;
f. Maintaining up-to-date security software that includes anti-malware protection, including by engaging with University or College staff when necessary.
User responsibilities also include:
a. Protecting Non-Public University Information from inappropriate disclosure and access;
b. Following CUNY’s IT Security Policies and Procedures;
c. Completing technology training, including, but not limited to, cybersecurity awareness, as directed by the University;
d. Using CUNY provided accounts to issue and receive CUNY-related communications and to perform work on behalf of CUNY. Use of personal accounts may subject those accounts to FOIL;
e. Reporting IT Security concerns or incidents to the Chief Information Officer (“CIO”) at the affected User’s College or in the case of the Central Office, as determined by CUNY’s CIO.
3. Authorization to Use Digital Assets and Resources.
a. Users may not access a CUNY Digital Asset or Resource without appropriate authorization or use it for purposes beyond the scope of such authorization. This includes attempting to circumvent CUNY Digital Assets and Resources system protection facilities by hacking, cracking, or similar activities, accessing or using another User’s account, and allowing another person to access or use the User’s account.
b. Users may temporarily authorize another CUNY employee to access information on the User’s account when the User is on leave or is otherwise unable to access the account on the User’s own behalf. Such delegated access must be in effect only for the minimum duration and extent of access required to facilitate continuity of operation and does not absolve the User from responsibility for their account activity.
c. CUNY Digital Assets and Resources may not be used to gain unauthorized access to another computer system within or outside of CUNY. Users are responsible for all actions performed from their computer account that they permitted or failed to prevent by following reasonable security precautions and/or security advisories issued by CUNY. CUNY advisories and resources are available at security.cuny.edu.
4. Compliance with Law. CUNY Digital Assets and Resources may not be used for any purpose or in any manner that violates CUNY rules or policies, or federal, state, or local law. Users who engage in electronic communications with persons in other localities, states, or countries or on other systems or networks may also be subject to the laws of those other localities, states and countries, and the rules and policies of those other systems and networks. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to the use of CUNY Digital Assets and Resources.

5. False Identity and Harassment. Users may not employ a false identity, mask the identity of an account or computer, or use CUNY Digital Assets and Resources to engage in abuse of others, such as sending harassing, obscene, threatening, abusive, deceptive, defamatory, or anonymous messages within or outside CUNY.
6. Protecting Confidentiality and Privacy.
a. The University is committed to the creation and free exchange of information, knowledge, and ideas among members of CUNY and other academic communities. As a public university and protector of public resources against misuse, CUNY also has a responsibility to fulfill that commitment in responsible and secure ways. To uphold this responsibility, the University abides by the parameters outlined in this Policy and others that inform and govern the use of Digital Assets and Resources. This Policy permits CUNY to undertake certain monitoring of its Digital Assets and Resources, as described in Article IV below. Consequently, Users should have no expectation that use of CUNY Digital Assets and Resources will be private, except for any privilege or confidentiality recognized by law, including the confidentiality of library records cited in section V (4).
b. Users may not invade the privacy of others by, among other things, viewing, copying, distributing, publishing, modifying, or destroying data or programs belonging to or containing personal or confidential information about others, without explicit permission to do so from the subject of such information.
c. Users must follow all CUNY IT Security Policies and Procedures to protect the confidentiality of non-public information encountered in the performance of their duties or otherwise.
7. Protecting the Integrity of Digital Assets and Resources Against Unacceptable Use and Disruptive Activities. CUNY Digital Assets and Resources must not be used in a manner that could reasonably be expected to result in undue stress or harm or to interfere, directly or indirectly, with other Users of CUNY Digital Assets and Resources, including, but not limited to:
a. Use of scripted or programmed actions that attempt to repetitively register for a course or that repetitively determine whether grades have been posted or changed.

b. Use of malware, ransomware, and similar malicious code.

c. Theft of confidential data.

d. Streaming or downloading large videos, films, or similar media files for personal use.

e. Chain letters, hoaxes or other online communications that potentially disrupt normal service.

f. Sending unsolicited communication that is not related to CUNY business without a reasonable expectation that the recipient would welcome receiving it.

g. The inclusion of individuals on mailing lists or the equivalent who have not requested membership on the lists, other than the inclusion of members of the CUNY community on lists related to CUNY business.

h. Accessing disruptive and/or not-suitable-for-work content. Examples of such content include, but are not limited to: pornography; gambling; personal commercial enterprise; not-for-profit non-CUNY business purposes; personal advertising of products or services; any activity meant solely to foster personal gain; or partisan political activity. The foregoing is prohibited except in the course of official business or legitimate academic or research purposes or in support of faculty or University-endorsed purposes. When accessing such otherwise prohibited content, appropriate care must be taken to avoid offending or disrupting other Users.
8. Confidential Research Information.
a. Principal investigators and others who use CUNY Digital Assets and Resources to collect, receive, examine, analyze, transmit and/or store research information that is required by law or regulation to be held confidential or for which an agreement of confidentiality has been given are responsible to take steps to protect such confidential research information from unauthorized access or modification. In general, this means storing the information in a cloud solution or on a computer or auxiliary hard drive with strong access controls (passwords) and encrypting files, documents, and messages for protection against inadvertent or unauthorized disclosure while in storage or in transit over data networks. However, additional protections may be required by law or an associated agreement.
b. Robust encryption and passwords must be used to protect Non-Public University Information, and is strongly recommended for information stored electronically on all desktop and laptop computers, mobile devices that allow or are capable of storing and transmitting information (e.g., cell phones, tablets), computer systems, in a cloud solution, servers, software, network facilities, databases, memory, memory sticks, portable hard drives and associated peripherals and software that are vulnerable to theft or loss, as well as for information transmitted over public networks.
c. Software and protocols used should be reviewed and approved by the campus CIO in consultation with the Chief Information Security Officer and CUNY’s Office of Computing and Information Services (“CIS”). In addition, the steps taken to protect such confidential research information should be included in submissions to the CUNY Human Research Protection Program (“HRPP”) reviewing the research protocol.
9. Licenses and Intellectual Property.
a. Users may use only legally obtained data, software, or cloud solutions. Users must also comply with applicable licenses or other contracts, as well as copyright, trademark, and other intellectual property laws. Prior to acquisition, all software must be approved by
the campus CIO or their designee. b. Much of what appears on the Internet and/or is distributed via electronic communication is protected by copyright law, regardless of whether the copyright is expressly noted. Users should generally assume that material is copyrighted unless they know otherwise, and not copy, download, or distribute copyrighted material without permission unless the use does not exceed fair use as defined by the federal Copyright Act of 1976, as amended. Protected material may include, among other things, text, photographs, audio, video, graphic illustrations, and computer software. Additional information regarding copyright materials and file sharing is available on the CUNY Office of the Senior Vice Chancellor for Legal Affairs and General Counsel (“OGC”)
website.
10. CUNY Names, Trademarks and Brand.
a. CUNY names, trademarks, brand, and logos belong to the University and are protected by law. Users of CUNY Digital Assets and Resources may not state or imply that they speak on behalf of CUNY or use a CUNY name, trademark, brand, or logo without first receiving permission to do so from the appropriate CUNY authority. Affiliation with CUNY does not, by itself, imply authorization to speak on behalf of CUNY.
b. CUNY employees and students may indicate their CUNY affiliation on email, other correspondence, and in academic or professionally-related research, publications, or professional appearances, so long as they do not state or imply that they are speaking on behalf of the University.
IV. CUNY’S RIGHTS AND RESPONSIBILITIES
1. Filtering. CUNY reserves the right to install spam, anti-malware, spyware filters, and similar devices, if necessary, in the judgment of CIS or a College CIO to protect the security and integrity of CUNY Digital Assets and Resources. CUNY will not install filters that restrict access to email, instant messaging, chat rooms or websites based solely on content, unless such content is illegal, such as child pornography.
2. Review of the Use and Access to CUNY’s Digital Assets and Resources. CUNY has a unique responsibility to facilitate the creation and exchange of information, knowledge, and ideas while also preserving and safeguarding CUNY Digital Assets and Resources from potential security issues and/or misuse. CUNY will follow the practices below when accessing Digital Assets and Resources, except in exigent circumstances where it is not feasible to delay such access.
a. Preservation. To preserve University information, evidence, and/or resources, CUNY may obtain and/or copy any information associated with, or residing on, a CUNY Digital Asset and Resource, without inspection of the contents and without notice to the User.
i. Users have an obligation to preserve Electronically Stored Information (“ESI”) if requested to do so by CUNY.
b. Routine Audits and Monitoring. Respecting the privacy of Users and serving as responsible stewards of University Digital Assets and Resources are both priorities for CUNY. However, as part of routine system operations and maintenance, CUNY regularly audits and monitors general usage patterns. In connection with these activities, the contents of websites, email and other digital content may be viewed. CUNY will not, however, monitor, inspect, or disclose an individual’s usage of CUNY Digital Assets and Resources, except as provided for in this or other CUNY policy, or by law. c. Inspection without Notice
i. Categories. CUNY may inspect without notice the activity and accounts of individual Users, including, but not limited to, individual login sessions, email, and other communications. Such inspections without notice will be conducted in the following circumstances:
A. when the User has voluntarily made them accessible to the public;
B. when it is necessary to do so to protect the integrity, security, and/or functionality of CUNY or its Digital Assets and Resources, as determined by the College CIO and/or CUNY’s CIO;
C. when it is necessary to diagnose and resolve technical problems involving system hardware, software, or communications, as determined by the College CIO, after consultation with CUNY’s CIO, or in the case of the Central Office, as determined by CUNY’s CIO;
D. when it is necessary to determine whether CUNY may be vulnerable to liability, and/or when failure to act might result in: harm to an individual, property loss, and/or damage, financial loss, impact to business continuity, and/or loss of evidence, as determined by OGC, once notified in writing by the College President, or the Chancellor. If any of the matters mentioned in this sub-section concern a current CUNY faculty member’s account or activity, CUNY will consult and notify the Chair of the University Faculty Senate (or Vice Chair if the Chair is unavailable) in a timely manner regarding said inspection without notice before said monitoring has occurred (unless extraordinary circumstances warrant otherwise);
E. when there is a reasonable basis to believe that CUNY policy and/or federal, state, and/or local law has been or is being violated, as determined by OGC, once notified in writing by the College President, or the Chancellor. If any of the matters mentioned in this sub-section concern a current CUNY faculty member’s account or activity, CUNY will consult and notify the Chair of the University Faculty Senate (or Vice Chair if the Chair is unavailable) in a timely manner regarding said inspection without notice before said monitoring has occurred (unless extraordinary circumstances warrant otherwise);
F. when an account appears to be engaged in unusual or unusually excessive activity, as determined by the College President, or the Chancellor, after approval by OGC. If any of the matters mentioned in this sub-section concern a current CUNY faculty member’s account or activity, CUNY will consult and notify the Chair of the University Faculty Senate (or Vice Chair if the Chair is unavailable) in a timely manner regarding said inspection without notice before said monitoring has occurred (unless extraordinary circumstances warrant otherwise);
G. where the activity and/or account content of individual Users are required to be produced pursuant to a subpoena and if a law enforcement agency issuing the subpoena has requested in writing that the subpoena not be disclosed to the User or any third party. Such production will not be made without approval by OGC;
H. as otherwise required by law.
ii. Procedure when a CIO or College President is the Subject of Monitoring
A. If monitoring without notice is contingent on a determination by the College CIO or their designee, and the CIO is the subject of the monitoring, the College shall seek a determination from CUNY’s CIO. In this example, if the CIO’s designee is the subject of the monitoring, the CIO may conduct the determination.
B. If monitoring without notice is contingent on a determination by CUNY’s CIO or their designee, and CUNY’s CIO is the subject of the monitoring, such determination shall be made to the University’s Executive Vice Chancellor and Chief Operating Officer. In this example, if the CIO’s designee is the subject of the monitoring the CIO may conduct the determination.
C. If the subject of the monitoring without notice is a College President, all monitoring without notice determinations assigned to the College President shall be made by the Chancellor.
D. If the monitoring or inspection of an account or activity requires physical entry into a faculty member’s office, CUNY reserves the right to enter the faculty member’s office without notice to inspect an account and/or to remove applicable CUNY Digital Assets and Resources. The University recognizes the importance of a faculty member’s presence under this section D. If exigent circumstances exist requiring the University to enter the faculty member’s office without the faculty member’s presence, CUNY will consult and notify the Chair of the University Faculty Senate (or Vice Chair if the Chair is unavailable) in a timely manner before the entry and specify the CUNY Digital Assets and Resources to be accessed and/or removed from the faculty member’s office.
iii. Other Disclosure.
A. CUNY, in its discretion, may disclose the results of any general or individual monitoring or inspection to appropriate CUNY personnel or agents, or law enforcement or other agencies. The results may be used in college disciplinary proceedings, discovery proceedings in legal actions, or otherwise as is necessary to protect the interests of the University.
B. In addition, Users should be aware that under FOIL, CUNY may be required to disclose to the public communications made by means of CUNY Digital Assets and Resources whether in conjunction with university business or as personal use.
C. Any disclosures of activity of accounts of individual Users to persons or entities
outside of CUNY, except when required by law, shall be approved by the Senior Vice Chancellor for Legal Affairs and General Counsel, be conducted in accordance with any applicable law, and the CUNY employees subject to such disclosures shall be informed promptly after the disclosure of the actions taken and the reasons for them.
iv. Approval by OGC. In addition to any other approvals required by subsection IV.3.c., any disclosures of activity of accounts of individual Users to persons or entities outside of CUNY, whether discretionary or required by law, is subject to approval by OGC, and shall be conducted in accordance with any applicable law.
v. Annual Statement. OGC shall maintain an annual statement of the instances of account monitoring or inspection that fall within categories D through G above. The statement shall indicate the name of the campus, the reason/cause for each search and the number of such instances. No personally identifiable data shall be included in this statement.
vi. CUNY’s Website Privacy Policy. See CUNY’s Website Privacy Policy for additional information regarding data collected by CUNY from visitors to the CUNY website at www.cuny.edu.
3. Enforcement.
a. CUNY has the right to temporarily suspend computer use privileges and to remove from CUNY Digital Assets and Resources material it believes violates this policy, pending the outcome of an investigation of misuse or finding of violation. This power may be exercised only by the President of each college or the Chancellor after consultation with OGC.
b. Violation of this policy may result in suspension or termination of an individual’s right of access to CUNY Digital Assets and Resources, disciplinary action by appropriate CUNY authorities, referral to law enforcement authorities for criminal prosecution, and/or other legal action, including action to recover civil damages and penalties.
c. Violations will normally be handled through the University disciplinary procedures applicable to the relevant User. For example, alleged violations by students will normally be investigated, and any penalties or other discipline will normally be imposed by the College Office of Student Affairs.
d. Allegations of corruption, fraud, criminal activity, conflicts of interest or abuse that involve CUNY Digital Assets and Resources will be investigated by OGC and any other entity that it deems appropriate, and may result in the notification of external City, State and Federal entities, including the Offices of the New York State Inspector General.
4. Additional Rules. CUNY may adopt additional rules, guidelines and/or restrictions for specific Digital Assets and Resources including computers, systems, networks, or data, or at specific computer facilities at the discretion of the directors of those facilities, provided that these additional rules, policies, guidelines, and/or restrictions comply with this policy.
V. MISCELLANEOUS
1. Waiver of Policy.
a. A CUNY employee or student may apply to the Senior Vice Chancellor for Legal Affairs and General Counsel for an exception or waiver from one or more of the provisions of this policy. Such an application may be for a single use or for periodic or continuous uses, such as in connection with a course or program. Any application for a waiver should be made prior to using the particular CUNY Digital Resource and Assets for the purposes described in the application.
b. The General Counsel & Senior Vice Chancellor for Legal Affairs shall consult with CUNY’s CIO and the President of the applicant’s College (or, if the applicant is a Central Office employee, the Chancellor), prior to making a determination regarding the application.
c. Users should be aware that CUNY cannot waive federal, state, and/or local law; for example, the contents of CUNY Digital Assets and Resources (including confidential research information) may be subject to a valid subpoena regardless of the terms of any waiver.
2. Disclaimer
a. CUNY shall not be responsible for any damages, costs, or other liabilities of any nature whatsoever regarding the use of CUNY Digital Assets and Resources, except to the extent required by law. This includes, but is not limited to, damages caused by unauthorized access to CUNY Digital Assets and Resources, data loss, or other damages resulting from delays, non-deliveries, or service interruptions, whether or not resulting from circumstances under the CUNY’s control.
b. CUNY makes no warranties (expressed or implied) with respect to the use of CUNY Digital Assets and Resources. CUNY accepts no responsibility for the content of web pages or graphics from sources external to CUNY that are linked from CUNY web pages, for any advice or information received by a User through use of CUNY Digital Assets and Resources, or for any costs or charges incurred by a User as a result of seeking or accepting such advice or information.
3. Review of Policy. CUNY reserves the right to change this policy and other related policies at any time. CUNY reserves any rights and remedies that it may have under any applicable law, rule, or regulation. Nothing contained in this policy will in any way act as a waiver of such rights and remedies. The OGC, Office of Academic Affairs, and CIS will conduct periodic reviews of this Policy as necessitated by events or changes in laws and enforcement practices. The foregoing offices in this paragraph will endeavor to conduct a full review of this policy every five (5) years.
4. Examples of Laws and Procedures.
a. Examples of federal and state laws that may apply to the use of CUNY Digital Assets and Resources include those addressing defamation, invasion of privacy, obscenity, child pornography, online gambling, as well as, but not limited to, the following:
Computer Fraud and Abuse Act
Copyright Act of 1976
Electronic Communications Privacy Act
Export control regulations issued by the U.S. Departments of Commerce, State and Treasury
Family Educational Rights and Privacy Act
Federal Trade Commission Safeguards Rule
Freedom of Information Law (“FOIL”)
New York State Law with respect to the confidentiality of library records, Civil Practice Law & Rules § 4509
New York State and City technology laws
Health Insurance Portability and Accountability Act of 1996 (“HIPPA”)
b. Examples of CUNY rules and policies that may apply to the use of CUNY Digital Assets and Resources include, but are not limited to, those listed below. Other rules and policies may be found in the Manual of General Policy and on the CUNY website:
Gramm- Leach-Bliley Information Security Program
IT Security Policies & Procedures
Policy on Maintenance of Public Order (the “Henderson Rules”)
Policy on Sexual Misconduct
CUNY Policy on Academic Integrity
Web Site Privacy Policy
CUNY Policy on Drugs and Alcohol
VI. DEFINITIONS
1. “Business Continuity” refers to CUNY’s strategy to ensure that its business operations remain functional and to prevent any risks to the continuation of its business operations when a User is not available or has separated from CUNY.
2. “College” means the University offices (Central Office), each college, school, and other constituent units of the University.
3. “CUNY Digital Assets and Resources” refers to all CUNY owned, licensed, or managed hardware, software, cloud solutions and the tools and processes that integrate with those systems, the data that is created by or resides in these systems and the applications they support. This includes, but is not limited to, desktop and laptop computers, mobile devices that allow or are capable of storing and transmitting information (e.g., cell phones, tablets), computer systems, unified communications and telephony solutions, servers, software, network facilities, databases, memory, memory sticks, portable hard drives and associated peripherals and software. This definition includes the use of these resources on the network via a virtual, physical, or wired or wireless, connection regardless of the ownership of the device connected to the network.
4. “FOIL” is the New York State Freedom of Information Law.
5. “Law” means that all applicable laws, regulations, rules, orders, requirements, and the like, including common law of federal, state, and local governments, courts, governmental authorities, legislative bodies, boards, agencies, commissions, and the like.
6. “Non-Public University Information” (“NPUI”) is University Confidential or Sensitive Data as detailed in the Data Classification Standard set forth in CUNY’s IT Security Policies and Procedures found at security.cuny.edu. Broadly, NPUI comprises any University Data whose unauthorized disclosure is protected by law or that could result in risk to the University or its users. Some examples of NPUI include, but are not limited to,
the following: • Personally identifiable information (e.g., Social Security number, driver’s license number)
• Financial account, payment card information and credit or debit card number
• Personally identifiable education record
• Protected health information
• Citizenship status
• Personnel record
• Restricted and personally identifiable research data.
• Any other information available in university files and systems that by its nature should be treated confidentially.
7. “OGC” When the term OGC is used concerning authority, approvals, consultations, determinations, or other duties or responsibilities, such reference shall be to the General Counsel or the Deputy General Counsel.
8. “President” means the chief executive officer of any constituent CUNY college or school, including a president or a dean as well as any acting or interim president or dean approved by the Board of Trustees.
9. “Student” is defined as a person who is matriculated and enrolled in courses creditable toward a degree or a certificate approved and registered with the New York State Education Department. This definition applies to undergraduate and graduate students and includes degree and certificate programs that are offered in an on-campus, hybrid, and online format.
10. “User” means anyone who uses CUNY Digital Assets and Resources, including but not limited to, all full-time and part-time CUNY employees and students, CUNY alumni (whether the individual received a degree or completed a program), other individuals working at CUNY such as contractors and RF employees, and visitors to CUNY campuses and facilities. To the extent that the University’s collective bargaining agreements grant specific categories of retirees the right to access CUNY Digital Assets and Resources, those retirees will be included in the definition of user.
(Board of Trustees Minutes, 2012, 06-25, 5-B; Amended: Board of Trustees Minutes, 2015, 06-29, 5-A; Amended: Board of Trustees Minutes, 2024, 2-13, 4-B)

 

ARTICLE IV FACILITIES PLANNING AND MANAGEMENT

Policy 4.02 Facilities Use

I. INTRODUCTION

The principal function of the facilities of The City University of New York is to provide a
setting to enable the University to carry out its primary mission of education and
research. These facilities should not be put to any use that may conflict with, or impede,
this mission. However, in recognition of its role as an urban public university, the
University takes upon itself a special responsibility to permit responsible individuals and
groups not affiliated with the University the use of its facilities, at such times as they are
not in use for the University’s primary education and research mission, within the
parameters of this policy. In making available its space to non-affiliated users, the
University in no way takes responsibility for the contents of any program or any
controversy engendered by any program presented at its facilities by such users.

II. SCOPE OF THIS POLICY

A. This policy applies to short-term1
use of college facilities. (“College” is defined
here as a constituent unit of the University, including without limitation senior
and community colleges, graduate and professional schools, Macaulay Honors
College and the central office.) Agreements between a college and its Related
Entities2 regarding a Related Entity’s presence on campus and use of college
facilities, and agreements between a Related Entity and a subcontractor regarding
the provision of services to the college community on campus are not covered by
this policy. Such agreements are covered by the applicable CUNY guidelines for
particular Related Entities and the associated Memoranda of Understanding
(“MOUs”). This policy does cover short-term licensing of college facilities by
those auxiliary enterprise corporations that have been granted authority, through
an MOU with their supported college, to administer a college’s short-term facility
licensing program.
B. This policy does not apply to licensing of facilities that a college or the University
leases or licenses from a third party. Any such proposed licensing agreement
must be approved by the University Offices of Facilities Planning, Construction
and Management and General Counsel.

III. RESPONSIBILITIES AND PRIORITIES

A. The use and scheduling of college facilities shall be under the control and
supervision of the vice president of administration, or their designee(s), of each
college.

1 A short-term use includes, e.g., a time-limited event, a conference, or a weekly series of programs during a
semester.
2 “Related Entities” means separately-incorporated auxiliary enterprise corporations, college associations, child care
centers, arts centers, college foundations and alumni associations of a host college.
B. Priority of use of a college’s facilities shall be in the order set forth below.
1. Host college departments, divisions, programs and offices for curricular,
administrative and other college purposes.
2. Users affiliated with the host college, including:
a. recognized student organizations;
b. Related Entities of the host college; and
c. University-wide organizations such as the University Faculty
Senate (“UFS”) and University Student Senate (“USS”).
3. Other CUNY colleges, including the central office (“other CUNY
colleges”), and users affiliated with such other CUNY colleges.
4. Government agencies and non-profit organizations of an educational,
scientific, cultural, social, civic, religious, or similar nature.
5. Union organizations affiliated with the host college.
6. All other users, including:
a. commercial users
b. partisan political users
c. users not specifically included in another category
Colleges shall permit use under categories 1 through 5 and may permit use under
category 6. Use by union organizations affiliated with the host college shall be
governed by the applicable collective bargaining agreement with the University.
Users within each category or sub-category shall be treated on a uniform basis.
C. The University shall deny or terminate use of college facilities to:
1. Users that refuse to employ at their event the security personnel required
by the host college.
2. Users that previously submitted a false application or that have previously
violated the terms of a use agreement.
3. Users whose use or planned use of college facilities has been determined
by the college to likely obstruct or disrupt college operations, interfere
with freedom of movement on campus, or expose persons or property to
safety hazards or risk of injury.
D. Use of college facilities may be subject to reasonable time, place and manner
restrictions.
E. Fees for the use of college facilities shall be determined as follows:
1. Each college shall establish and make available a fee schedule, setting
forth the college’s standard rates for (a) use of the space (“Use Fee”) and
(b) direct costs such as labor, security, equipment and catering. The fee
schedule shall be approved by the vice president for administration of the
college.
2. Colleges may vary the Use Fee for a particular facility based on the
category of user, e.g., affiliated users, non-affiliated non-profit users,
commercial users, partisan political users.
a. A host college shall not charge a Use Fee to its affiliated users
(including without limitation recognized student organizations,
University Faculty Senate and University Student Senate).
b. Notwithstanding a. above, if the affiliated user is co-sponsoring an
event with one or more outside organizations, the host college may
charge a Use Fee in an amount limited to that which may be
apportioned to the outside organizations(s) and which the host
college would charge if it were the co-sponsoring college.
c. A host college may charge other CUNY colleges a Use Fee that is
discounted from that charged to non-affiliated users, or no Use Fee
at all, in the discretion of the host college.
d. A host college may charge its affiliated users its direct costs, at the
standard or discounted rates.
e. All other users shall be charged direct costs at the host college’s
standard rates.
3. Fair market value must be charged for partisan political use.

F. All fees collected for facilities use are subject to applicable CUNY spending
policies, including without limitation CUNY Fiscal Handbook for Control and
Accountability of Student Activity Fees, CUNY Foundation Guidelines, CUNY
Auxiliary Enterprise Guidelines, Guidelines on the Use and Reporting of NonTax Levy Funds, Cash Accountability Policy, CUNY Bank Account Control Policy and Petty Cash Policies and Procedures.

IV. PROCEDURES

A. Applicants for use of a college’s facilities shall provide the college with the
following information: the name, address and telephone number of the individual
or group making the request; whether it is a non-profit or commercial entity; the
facilities (and any attendant college services) requested; a detailed description of
the proposed use; the number of persons expected to use the facility and whether
the event is open to the general public; the time(s) and date(s) for the requested
use; and the amount of any admission fee to be charged and its intended use, and
any other information reasonably requested by the college.
B. Individuals and groups that have received approval to use a college facility are
required to:
1. Comply with all applicable University and college rules and policies, and
applicable local, state and federal laws and regulations, including fire,
health and safety regulations.
2. Assume full responsibility for any loss, damage or claims arising out of
their use of the facility.
3. Pay the appropriate Use Fee and other charges for the use of the facility
and related services, subject to Section III.E.2 above.
4. Unless the user is affiliated with the college or is another CUNY college,
or is the City of New York, the State of New York or the U.S.
Government, indemnify, defend and hold harmless the University, the
college, the Dormitory Authority of the State of New York, the State of
New York, the City of New York and the appropriate University related
entity (where applicable), as well as their officers and employees, from
any liability arising out of the actions of the user, its agents, employees
and invitees, incidental to the use of the facility by the user.
5. Unless the user is another CUNY college, UFS or USS, or is the City of
New York, the State of New York or the U.S. Government, provide
evidence of appropriate and adequate insurance protection (including
liquor liability if alcohol will be served) covering property damage,
personal injury, or death arising out of the use of the facility. The chief
administrative officer of the college may waive this requirement for
affiliated users, other government agencies and not-for-profit users upon a
determination that there is minimal risk exposure to the college from the
event.
6. Execute a written agreement with the University setting forth these
requirements as well as any additional requirements pertaining to the use
of the facility.
C. In all cases, the University and the colleges reserve the right to require and
provide, at the user’s expense, such security personnel and technical experts as
may be needed to insure order and safety on its premises.

V. RELATED CUNY POLICIES AND INFORMATION

Policy re Private Security
http://policy.cuny.edu/manual_of_general_policy/article_iv/policy_4.051/pdf/#Navigation_Location
Policy re Tobacco Use
http://policy.cuny.edu/manual_of_general_policy/article_iv/policy_4.06/pdf/#Navigation_Location
Advisory re Use of Campus Facilities by Candidates for Public Office
http://www2.cuny.edu/wp-content/uploads/sites/4/page-assets/about/administration/offices/legalaffairs/advisories/college-facilities-candidates.pdf
Regulations for Graduations on CUNY Campuses (attached)
Best Practices for Use of Campus Facilities by Student Clubs, College Associations and Other
Sponsoring Organizations
http://www2.cuny.edu/about/administration/offices/legal-affairs/advisories/
(BTM,1962,12-17,013,__. Amended:BTM,2005,02-28,006,_F; BTM,2017,12-04,003._B)

ARTICLE IV FACILITIES PLANNING AND MANAGEMENT

Policy 4.03 Geographical Limitations for Certain Types of Contracts

Policy 4.03 Geographical Limitations for Certain Types of Contracts
Business managers, purchasing agents, and other City University of New York officers responsible for the drafting of specifications for University contracts are directed to include in such specifications a requirement that bidders reside within fifty miles of New York City in those instances where circumstances, including but not limited to necessity of consultations, presence at site, or fragility or perishability of goods, require the proximity of the contractor. (BTM,1975,03-24,004,_D)

ARTICLE IV FACILITIES PLANNING AND MANAGEMENT

Policy 4.04 Parking Facilities

Policy 4.04 Parking Facilities
The Board of Trustees of The City University of New York authorizes the Vice Chancellor for Budget and Finance to promulgate guidelines in accordance with this policy. (BTM,2002,06-24,004,_A)
1 Governance
All college parking facilities that levy fees shall be managed and operated by the colleges’ Auxiliary Enterprise Corporations in accordance with this policy. (BTM,2002,06-24,004,_A)
College vice presidents for finance and administration shall be responsible for overseeing the implementation of this policy on parking facilities. (BTM,2002,06-24,004,_A)
2 Fees, Reporting, and Accountability
Parking operations shall be maintained through fees charged to the users. The use of tax-levy dollars in support of parking facilities must be requested and justified in writing to the University’s Vice Chancellor for Budget and Finance. (BTM,2002,06-24,004,_A)
The revenues generated from the fees shall be managed by the Colleges’ Auxiliary Enterprise Boards, deposited in a College Auxiliary Enterprise Board-controlled bank account, and used to pay the direct and indirect costs incurred in operating the parking facilities. (BTM,2002,06-24,004,_A)
A restricted reserve fund may be established for planned capital improvements and related future obligations for the parking operations. (BTM,2002,06-24,004,_A)
Parking fees may range up to $300 per annum in fiscal year 2002–2003 and up to $500 thereafter. Different fee rates for students, faculty, full-time staff, and part-time staff, are permitted within the range. Different fees may also be charged for reserved spots and spots in different locations. Exceptions to this range may be permitted only under extraordinary circumstances and subject to the approval of the Chancellor and the Board of Trustees. (BTM,2002,06-24,004,_A)
A control process for charging, billing and collecting fees must be established so that funds are properly accounted for. Controls should include pre-numbered decals, reconciliation of fees collected to decals issued, safeguards for funds collected, the use of the Bursar’s Office for deposits, and parking decals. To the extent possible, segregation of duties should exist concerning these fees inasmuch as it is an important control function. Any other fees charged (i.e., fines, duplicate parking decals, etc.) must also have effective controls established. (BTM,2002,06-24,004,_A)
The parking operations will be reviewed yearly as part of the Board of Trustees mandated independent audit of the Auxiliary Enterprises Corporation. The audit report shall contain a separate schedule detailing the revenues and expenditures reported by the colleges’ parking operations. A copy of the certified audit report will be provided on a yearly basis to the University’s Office of Internal Audit. (BTM,2002,06-24,004,_A)

ARTICLE IV FACILITIES PLANNING AND MANAGEMENT

Policy 4.05 Physically Handicapped Students and Faculty Members

Policy 4.05 Physically Handicapped Students and Faculty Members
College and City University of New York buildings are to be so designed as to make them accessible to students and faculty members who are physically handicapped. Architects and University and college officers concerned with the design of such buildings are to implement this policy. (BTM,1966,09-26,034,__)

ARTICLE IV FACILITIES PLANNING AND MANAGEMENT

Policy 4.051 Private Security

CITY UNIVERSITY OF NEW YORK – PRIVATE SECURITY POLICY:
RESOLVED, That it is the policy of The City University of New York that all security and safety services provided on college-owned or leased facilities shall be the responsibility of the college president
College responsibility for security and public safety applies to any building or property owned or controlled by the college and used by the college in direct support of, or related to its educational purposes, and any building or property owned or controlled by student organizations recognized by the college. This includes student union buildings and other entities that bear the name of the college.
All security or security related functions at events in college facilities, such as performances, speeches, conferences, meetings, classes, and other special events shall be managed by the college. No private security personnel, such as bodyguards or escorts acting in a security capacity, with the exception of security guards contracted for by the college, shall perform any campus security or security related functions. The use of armed private security guards is prohibited.
After consultation with the campus faculty and student constituencies, as well as the appropriate University offices, the colleges are to establish security and safety guidelines for persons or organizations appearing at campus events or using campus facilities consistent with this policy. Contracts for speakers or space rentals should contain conditions whereby events may be canceled or payments or deposits may be forfeited for failure to comply with college security policies and procedures. Additionally, any person or organization violating such an agreement may be denied future access to any CUNY campus or related facility in addition to any other applicable college or lawful sanctions.
This policy does not apply to federal, state, county or municipal sworn law enforcement officers or to foreign or international law enforcement personnel who are officially charged with the responsibility of providing security for particular individuals, or who are involved in a law enforcement capacity (e.g. crowd control), in conjunction with the security officers of the college.
This general policy clarifies and subsumes security policies contained in the Henderson Rules and the CUNY Manual of General Policy (Groups that do not comply with college or University security shall be denied access to college facilities) and the University Fiscal Handbook (There shall be no frisking or searches, except by sworn law enforcement officers). This policy, which applies to all facilities and events whether fees are paid to speakers or funded through student fees, is not intended to limit or abridge individual access to or attendance at college events.
In the event that private security is necessary and requires an exemption to this policy, such exceptions must be approved by the college president and the Chancellor, and reported to the Board of Trustees’ Committee on Fiscal Affairs, Facilities, and Contract Review at the earliest practicable time.
(Board of Trustees Minutes,1994,03-21,4,K)

ARTICLE IV FACILITIES PLANNING AND MANAGEMENT

Policy 4.06 Tobacco

Policy 4.06 Tobacco
The largest urban university in the country, The City University of New York is committed to promoting the health and well being of its faculty, students and staff. (BTM,2011,01-24,003,_A)
The harmful effects of tobacco use are well known, and have been confirmed increasingly by scientific research in the 16 years since the Board last considered the subject. Tobacco is the leading cause of preventable death in the world today—and in New York City. Smoking-related deaths from cancer, heart and lung diseases, and other conditions account for more than 440,000 premature deaths each year, about one in five deaths in the United States. The U.S. Surgeon General has determined that exposure to secondhand smoke is dangerous to health and that reducing exposure will save lives and reduce health expenditures. Research further shows that any exposure to secondhand smoke—even outdoors—has harmful biological consequences. Further, removing all smoking opportunity facilitates quitting, and research demonstrates that 70 percent of smokers wish to quit. Expanding the University’s policy would therefore achieve a dual effect: motivating current smokers to cease smoking, and safeguarding CUNY students, faculty, and staff—more than 85 percent of whom are nonsmokers—from the toxic effects of secondhand smoke. (BTM,2011,01-24,003,_A)
Therefore, effective no later than September 4, 2012, the following shall be prohibited at The City University of New York: (i) the use of tobacco on all grounds and facilities under CUNY jurisdiction, including indoor locations and outdoor locations such as playing fields; entrances and exits to buildings; and parking lots; (ii) tobacco industry promotions, advertising, marketing, and distribution of marketing materials on campus properties; and (iii) tobacco industry sponsorship of athletic events and athletes. (BTM,2011,01-24,003,_A)
This policy promotes basic values of 21st-century American higher education: cultivating respect for others, emphasizing the importance of health and wellness, supporting environmental sustainability, and preparing students for professional success in increasingly tobacco-free workplaces. (BTM,2011,01-24,003,_A)