DATE OF ADOPTION: May 1997
DATE OF REVISION: March 11, 2011
POLICY REFERENCE: Acceptable Use of Information Technology Resources
These procedures are enacted pursuant to the Acceptable Use of Information Technology Resources Policy. They shall govern all use of Information Technology Resources and apply to all users.
1. Information technology resources shall include, but not be limited to:
2. Information technology resources are owned by and are the property of the college.
All users must be authorized by the college to access information technology resources. Such access shall be at the discretion of the college. Anything created at the direction of the college using information technology resources shall be the property of the college.
3. Any user of information technology resources shall:
4. The college has the right, at all times, to monitor its information technology resources.
Authorized Information Services personnel may inspect files and/or monitor a user's usage of resources, if the college suspects a violation of these procedures, other college policies or procedures, or the law. In response to the Higher Education Opportunity Act the college employs a commercial tool which identifies and blocks peer-to-peer applications running on the network.
5. Violations of these procedures shall be dealt with as follows:
5.1 All detected or reported violations shall be investigated by the Information Services staff.
They shall promptly collect all relevant documents and information relating to the alleged violation.
An incident report shall be prepared in all cases of detected or reported procedure violations. Upon collection and review of all relevant information and documentation, a determination shall be made as to whether a violation occurred. If it is determined that no violation occurred it shall be so stated in the incident report and the matter shall be closed. If a violation is found to have occurred, it shall be so stated in the incident report and reference shall be made to the supporting information and/or documentation.
5.2 Sanctions for violation of these procedures may include, but are not limited to revocation of user account privileges; confiscation of files, data and equipment; and removal of computers from the network. Based on the circumstances, at the discretion of the college, any or all of these sanctions may be imposed prior to the conclusion of the investigation.
In addition to the aforementioned sanctions, an incident report finding that faculty, staff or a student committed a violation of these procedures may result in a referral to the appropriate college department for further action under applicable college policies and procedures relating to the violator. In any case where a violation of law occurred, the matter may be referred to the appropriate law enforcement agency.