Butler County Community College | 2017-2018 Student Handbook - page 34

33
33
G.
Students have no expectation of privacy when connected to the College’s information
services.
Failure to follow the provisions of this policy could result in a violation of the Student
Code of Conduct and could result in disciplinary action.
ACCEPTABLE USE OF TECHNOLOGY POLICY
A. Policy
Access to information systems and networks owned or operated by Butler
County Community College (BC3) imposes certain responsibilities and obligations
and is granted subject to College policies, and local, state and federal laws.
Acceptable use is always ethical, reflects academic honesty, shows restraint in the
consumption of shared resources and protects all Information Technology (IT)
Resources from any unauthorized or unintended use. It demonstrates respect for
intellectual property, ownership of data, system security mechanisms, and individuals’
rights to privacy and freedom from intimidation, harassment, and unwarranted
annoyance unless covered by legal statutes. The establishment of this policy is to
safeguard and protect all information systems, including academic and financial, that
support the College’s Mission and daily operations.
B
.
General Guidelines
The Director of Information Technology in conjunction with the
Dean of Student Development and/or the Executive Director of Human
Resources/Equal Opportunity Compliance Officer is responsible for the enforcement
of these guidelines. Any request for use of technology systems other than those
identified must receive prior written approval.
In making acceptable use of technology resources users must:
1.
use technology only for authorized purposes;
2.
protect their user ID and system from unauthorized use. Users are responsible for
all activities on their user ID or that originate from their system;
3.
access only files and data that are their own, that are publicly available, or to which
they have been given authorized access;
4.
use only legal versions of copyrighted software in compliance with vendor license
agreements;
5.
be considerate in their use of shared resources. Refrain from monopolizing
systems, overloading networks with excessive data, or wasting computer time, disk
space, paper, manuals, or other resources;
6. use only College software unless approval is given by the Director of Information
Technology to load other software.
In making acceptable use of technology users must
NOT
:
1.
use another person’s system, user ID, password, files, or data;
2.
use computer programs to decode passwords or access control information;
3.
attempt to circumvent or subvert system or network security measures;
4.
engage in activity that might be harmful to systems or to any information stored
thereon, such as creating or propagating viruses, disrupting services, or damaging or
deleting files and directories;
5.
use College systems for commercial or partisan political purposes, such as using
electronic mail to circulate advertising for products or for political candidates;
6. make or use illegal copies of copyrighted software, store such copies on College
systems, or transmit them over College networks;
7.
waste information technology resources, for example, by intentionally placing a
program in an endless loop or by printing excessive amounts of paper;
I...,24,25,26,27,28,29,30,31,32,33 35,36,37,38,39,40,41,42,43,44,...168
Powered by FlippingBook