Caldwell Community College and Technical Institute
|
|
|
- Thomasina York
- 10 years ago
- Views:
Transcription
1 Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures for using the administrative systems, computer resources, and network systems at Caldwell Community College and Technical Institute (CCC&TI). Caldwell Community College and Technical Institute will provide network access, computer systems, and other equipment to employees and students for the purpose of completing college-related assignments. Because of a wide range of users and uses, it is necessary to establish policies and procedures that assure that the systems are used in the most efficient manner possible while providing for the protection of equipment, data, and software. While the Vice President of Technology and Instructional Support Services is charged with responsibility for the proper operation of the computer systems, college employees and students are responsible for seeing that the computers are properly used and that security is maintained.
2 Use of Technology Resources: CCC&TI technology resources may not be used for any purpose that is illegal, malicious, dishonest, or damaging. Any other action which violates any college, state, or federal policy is strictly prohibited and subject to discipline up to and including expulsion. Members of computer services or the administration may at any time use or examine the equipment, software, and services on college owned equipment. Technology services and equipment are provided as a tool to complete course assignments and are not intended for personal use. Unacceptable Use: Including but are not limited to the following: Unauthorized software or file downloads Unauthorized relocation or modification of technology systems, equipment, or software Libel or slander Harassment Fraud Violation of copyright or infringement on trademark rights Use of an employee or student s account, password, or any other code or ID assigned to another individual Unauthorized access or attempt to access college systems or other networked devices Abuse or unauthorized use of college communications systems ( , phone, messaging) Business, personal, or other purpose unrelated to normal college business Academic dishonesty Violation of privacy
3 Accessing, sending, sharing or use of any materials contrary to the mission of CCC&TI. Participating in any other activity which violates another college policy **Freedom of expression is a constitutional right afforded to individuals. However, users of college equipment, systems and software are held accountable for their actions and will respect the rights of individuals who may be offended by the services and images retrieved on the Internet. Individuals who feel they have been harassed should report the incident to the Vice President of Technology and Instructional Support Services. Violators of the computer usage policies and procedures previously stated will be subject to one or more of the following sanctions: verbal and/or written warning, temporary or permanent suspension of computer access privileges, or dismissal from the college as stated in the CCC&TI Student Code of Conduct.
4 II. Procedures: The following procedures are to be used by students using college-owned equipment, software, systems, and services. These procedures also apply to personally-owned equipment if they are used to access the campus network and services. Procedures may be modified and information regarding new or modified procedures will be distributed to students via the student system. Security Basic access to the CCC&TI computer system and network is controlled through User ID and password protection. Each computer system has a personal ID that must not be used by any other user. CCC&TI reserves the right to authorize the Computer Information Services Staff to override user accounts and computer systems if sufficient evidence of inappropriate usage exists. Users should not leave their computer systems unattended. If a user must leave the immediate area of his/her workstation for an extended period of time, he/she should log off the system. Sensitive information should not be left unattended or sent to printers that are located in areas open to the public. All students of CCC&TI are provided student accounts. This is the primary form of communication between instructors, staff, and students. Student is provided as a tool to complete college assignments and communicate with college personnel. accounts must not be used for unauthorized purposes. Computer related files or data (including ) are considered open records and are subject to discovery and subpoena during disciplinary or legal actions. The college reserves the right to view, monitor, and disclose contents of and data created, transmitted, received, and stored on college owned computer systems. Electronic Signature Policy Caldwell Community College and Technical Institute recognizes an electronic signature as a valid signature from faculty, staff, and students if the communication occurs through a collegeissued account. Students use electronic signatures for processes such as registering for classes, checking financial aid awards, paying student bills, etc. Faculty and staff use electronic signatures for processes such as submitting grades, accessing campus computers, accessing
5 course management systems, etc. Electronic signatures from accounts not issued by the college will not be accepted. CCC&TI recognizes faculty, staff, and student electronic signatures as their unique username and password. CCC&TI assigns usernames and passwords to faculty, staff, and admitted students. These individuals are required to change their passwords upon initial login. It is the responsibility and obligation of each individual to protect the confidentiality of his/her username and password. Once logged in, the student or employee is responsible for any information he or she provides, updates, or removes. Students and employees are also responsible for adhering to the requirements of the institutional computer usage policy. The CCC&TI electronic signature policy is established to confirm and bind the identity of an individual to a process requiring his or her signature. This policy also reflects the legal intent of the individual that the electronic signature has the same authority as his or her written signature. By establishment of the Electronic Signature Policy, CCC&TI is responsible for assuring electronically-signed record integrity, security, and accessibility to those who are entitled to such access by law, statute, or regulation. These records will be retained for any period mandated and in a form capable of being reproduced as needed. This policy is adapted from the Family Educational Rights and Privacy Act and the Electronic Signatures Act. Network and Telecommunications Policy Network and telecommunications services are provided to students as a tool for completing college related assignments. Network and Internet access is a privilege, not a right, and can be withdrawn from those that use them irresponsibly. Users should not deliberately attempt to modify or degrade the performance of the network. Network services are provided to complete college-related tasks and not for personal business or recreation. Network services must not be used to intercept data, monitor user accounts, gain unauthorized access to restricted data, or for any purpose that violates other college, federal, state or local regulations. This policy applies to any technology equipment used on campus to access the college network whether personal property or college property. Social Networking / Media Policy Social networking, blogs, wikis, and social media sites (along with other on-line community sites) such as Facebook, Twitter, My Space, Youtube, Flickr, and others, are being used increasingly by individuals to electronically communicate with each other. CCC&TI recognizes
6 the benefits of utilizing social media resources and expects all users to agree to use the resources legally, ethically and in keeping with their intended use when using the college network and systems. Inappropriate or questionable use will be addressed. Most online social networking sites and resources require an address and personal profile information. Personal accounts should not be used to officially represent or promote CCC&TI, a CCC&TI organization, department, division, athletic team, group, official business, campus activity or event. When representing the college, or entity of the college, an approved campus representative account must be used. Individuals or groups are not permitted to freely create campus representative accounts on social networking, blog, wiki, or other social media sites. Only CCC&TI employees specifically authorized by the Marketing and Communications Department may create online accounts and/or post official college (departmental, divisional, athletic, organizational) information, media files, documents, resources, calendars, and events. Approved by the CCC&TI Board of Trustees June 16, 2010
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
[Acceptable Use Policy]
South College Computer Code of Ethics [Acceptable Use Policy] Introduction Freedom of expression and an open environment to pursue scholarly inquiry and for sharing of information are encouraged, supported,
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy
Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy Due to the ever-increasing need for integrated technology and data sharing, and because of legal and ethical
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Wikis: A wiki is a website that allows visitors to add, remove, and edit content online.
BYOD (Bring Your Own Device) Policy for Teachers and Students Saint Ann School allows students in grades 4 to 8 to use personal electronic devices that meet the requirements listed below and if they have
Warren Consolidated Schools Technology Acceptable Use & Internet Safety Guidelines
Warren Consolidated Schools Technology Acceptable Use & Internet Safety Guidelines Scope The acceptable use of information resources, information technology, and networks in the Warren Consolidated Schools
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email,
New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, Email, Computer, And Networking Technologies Usage 1.0 Purpose
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
IT1. Acceptable Use of Information Technology Resources. Policies and Procedures
IT1 Policies and Procedures Acceptable Use of Information Technology Resources Originator: Information Technology Governance Committee Approver: President s Council Effective: October 16, 2007 Replaces:
REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS
R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
Dracut Public Schools Technology Acceptable Use Policy Revised 2014
1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation
POLICY 4526. Adopted by Board of Education: 4/20/05
POLICY 4526 COMPUTER NETWORK FOR EDUCATION The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet,
Policy on the Security of Informational Assets
Policy on the Security of Informational Assets Policy on the Security of Informational Assets 1 1. Context Canam Group Inc. recognizes that it depends on a certain number of strategic information resources
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Students Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
DISTANCE LEARNING STUDENT INFORMATION GUIDE CALDWELLCOMMUNITY COLLEGE AND TECHNICALINSTITUTE
DISTANCE LEARNING STUDENT INFORMATION GUIDE CALDWELLCOMMUNITY COLLEGE AND TECHNICALINSTITUTE 2015 2016 Table of Contents CCC&TI Mission... 4 What types of Distance Learning Courses are offered?...5 Should
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
McGill-Toolen Catholic High School Technology Acceptable Use Policy
McGill-Toolen Catholic High School Technology Acceptable Use Policy Ben Fancher Director of Instructional Technology June 24, 2015 Ben Fancher email: [email protected] McGill-Toolen Catholic High
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
COLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Communications 01: Social Media
Communications 01: Social Media Policy: To communicate the Network s mission publicly, to inform and engage the community regarding the Network s activities, and to establish appropriate and professional
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
Students KS2-3 Acceptable Use Policy
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Doughiska, Galway City. Ratified by the Board of Management on 27 th May, 2015 Table of Contents Introduction... 2 General... 2 Internet Use... 3 Email...
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
Internet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
SOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
Page 1 of 10. TITLE: Network Usage Policy STATEMENT OF PURPOSE: Policy Number: AM-RM-010
Page 1 of 10 TITLE: Network Usage Policy STATEMENT OF PURPOSE: Policy Number: AM-RM-010 This document constitutes an Organization-wide policy intended to allow for the proper use of all Neighbor To Family
Johnson Creek School District Parent/Student Information Packet
Johnson Creek School District Parent/Student Information Packet This packet includes Johnson Creek School Board policies as referenced on the Parent/Student Signature Page, as well as, the Johnson Creek
2011-2012. Frisco ISD
2011-2012 Frisco ISD Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 Google Apps for Students... 3 Responsible Use Policy... 4 Wireless Information... 5 Frequently Asked Questions...
MIS 379 Business Process Management and ERP Systems
MIS 379 Business Process Management and ERP Systems Instructor: Mrs. Tina Lancaster Office: BA 337C Phone: (903) 886-5689 Faculty Web Site: http://faculty.tamu-commerce.edu/tlancaster/ E-mail: [email protected]
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
DATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.
DATA ACCESS POLICY As NJIT has moved to a distributed data access environment, policy has been established to protect the computer-based institutional data from unauthorized (c.q. other improprietary)
Mount Wachusett Community College. Information Technology Acceptable Use Policies and Helpdesk Prioritization Practices
Mount Wachusett Community College Information Technology Acceptable Use Policies and Helpdesk Prioritization Practices January 25, 2011 Contents INFORMATION TECHNOLOGY GENERAL ACCEPTABLE USE POLICY...
Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents
Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures
TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic
