Back to Top

DATE OF ADOPTION:           May 1997

DATE OF REVISION:            March 11, 2011

POLICY REFERENCE:           Acceptable Use of Information Technology Resources

PROCEDURES GOVERNING USE OF INFORMATION TECHNOLOGY

These procedures are enacted pursuant to the Acceptable Use of Information Technology Resources Policy. They shall govern all use of Information Technology Resources and apply to all users.

1. Information technology resources shall include, but not be limited to:

  1. All computer hardware, software, peripherals and mobile devices.
  2. Network communications technologies including wireless technologies.
  3. Network and internet bandwidth.
  4. Telephone and voicemail.
  5. Electronic services and information.

 

2. Information technology resources are owned by and are the property of the college. All users must be authorized by the college to access information technology resources. Such access shall be at the discretion of the college. Anything created at the direction of the college using information technology resources shall be the property of the college.

 

3. Any user of information technology resources shall:

  1. Comply with all laws (federal, state, local and other applicable laws and regulations); and all college policies and procedures.
  2. Respect the privacy and personal rights of others so as not to constitute an invasion of privacy, harassment, defamation, threat, intimidation, unwarranted annoyance, embarrassment, discrimination based on race, color, age, religion, sex, national origin, marital status, sexual orientation, ability, genetic information and veteran status, or the like.
  3. Respect the integrity and security of information technology resources by not attempting to circumvent the system security and/or aid others to achieve unauthorized access including, but not limited to, sharing a user password.
  4. Respect the finite capacity of information technology resources so as not to interfere unreasonably with the activity of other users.
  5. Use information technology resources for authorized college-related purposes only.
  6. Respect and honor the intellectual property rights of others whether protected by patent, copyright, trademark, trade secrets law, other legal mechanism and/or the college Intellectual Property Policy and Procedures.
  7. Only access confidential information when authorized by the college. Any confidential information obtained by an authorized user shall be used only for the appropriate college purpose for which access was authorized. Confidential information shall be stored only on college authorized services or devices.
  8. Report any discovered weakness in the Information Technology Resources security system to the chief technology officer.
  9. Report any incident of misuse of any information technology resource or violation of these Procedures to the chief technology officer.
  10. Report any damaged, lost or stolen technology resource, including personal devices that may have college confidential information thereon, to the chief technology officer.
  11. Only use college-owned information technology resources to connect to the internally wired college network unless Customer Support Services reviews and approves other equipment connections in advance.

 

4. The college has the right, at all times, to monitor its information technology resources. Authorized Information Services personnel may inspect files and/or monitor a user's usage of resources, if the college suspects a violation of these procedures, other college policies or procedures, or the law. In response to the Higher Education Opportunity Act the college employs a commercial tool which identifies and blocks peer-to-peer applications running on the network.

 

5. Violations of these procedures shall be dealt with as follows:

 

5.1 All detected or reported violations shall be investigated by the Information Services staff.  They shall promptly collect all relevant documents and information relating to the alleged violation. 

An incident report shall be prepared in all cases of detected or reported procedure violations. Upon collection and review of all relevant information and documentation, a determination shall be made as to whether a violation occurred. If it is determined that no violation occurred it shall be so stated in the incident report and the matter shall be closed. If a violation is found to have occurred, it shall be so stated in the incident report and reference shall be made to the supporting information and/or documentation.  

 

5.2 Sanctions for violation of these procedures may include, but are not limited to, revocation of user account privileges; confiscation of files, data and equipment; and removal of computers from the network. Based on the circumstances, at the discretion of the college, any or all of these sanctions may be imposed prior to the conclusion of the investigation.     

In addition to the aforementioned sanctions, an incident report finding that faculty, staff or a student committed a violation of these procedures may result in a referral to the appropriate college department for further action under applicable college policies and procedures relating to the violator. In any case where a violation of law occurred, the matter may be referred to the appropriate law enforcement agency.