Butler County Community College | 2017-2018 Student Handbook - page 37

36
36
6.
forge or attempt to forge email messages, or disguise or attempt to disguise his/her
identity when sending mail.
a.
All student email addresses and corresponding account/profile information
created by and provided to students by BC3 and any hosting email service must
remain unaltered while registered for classes at BC3.
b.
Email addresses must match the format specified by BC3.
c.
The student’s email account/profile information must match th
at which is
contained in the BC3 student management database.
d.
Only official name changes and withdrawal/graduation from BC3 will warrant
the change of an email address and/or the account/profile information connected
to the email account.
7.
use the BC3 email system for anything other than legitimate business or classroom
purposes.
a.
College use of email
Email is an official means for communications within
BC3. Therefore, the College has the right to send communications to students via
email and the right to expect that those communications will be received and
read in a timely fashion.
b.
Assignment of email addresses
Information Technology assigns all employees
and students an official BC3 email address. It is to this official address that the
College will send email communications; this official address will be the address
listed in the College’s Directory for that employee or student.
F
.
Enforcement
The College considers any violation of acceptable use principles or
guidelines to be a serious offense.
1.
Individuals or groups who act in a manner contrary to existing policy and accepted
standards for computer use are subject to the sanctions and disciplinary measures
normally applied to misconduct or lawbreaking. Any violations of the acceptable
use of technology must be reported to the Director of Information Technology. A
copy of the Information Technology Policy Violation Report is provided in
Appendix G and is available online under BC3 Forms.
2.
The Director of Information Technology and/or his/her designee will work in
conjunction with the Dean of Student Development and/or Executive Director of
Human Resources/Equal Opportunity Compliance Officer and investigate the
allegations and may disallow network connections by certain computers (even
departmental and personal ones); require adequate identification of computers and
users on the network; undertake audits of software or information on shared
systems where policy violations are possible; take steps to secure compromised
computers that are connected to the network; or deny access to computers, the
network, and institutional software and databases. The College reserves the right to
copy and examine any files or information resident on College systems allegedly
related to the unacceptable use. Users are expected to cooperate with investigations
either of technical problems or of possible unauthorized or irresponsible use as
defined in these guidelines; failure to do so may be grounds for suspension or
termination of access privileges.
3.
A matter involving students will be referred to the Dean of Student Development.
A student who violates any of these guidelines will be subject to disciplinary action
up to and including permanent dismissal and possible legal action.
4.
A matter involving employees will be referred to the Executive Director of Human
Resources/Equal Opportunity Compliance Officer. An employee who violates any
of these guidelines will be subject to disciplinary action up to and including
termination of employment and possible legal action.
I...,27,28,29,30,31,32,33,34,35,36 38,39,40,41,42,43,44,45,46,47,...168
Powered by FlippingBook