|Computers, networks, and electronic information systems, and the data they provide are essential college operational resources. The College grants shared access to these resources. These resources must be used and managed responsibly to ensure their integrity, security, and availability for appropriate educational and business activities. All users must adhere to approved procedures administered by the Information Technology Department.|
|Pr-801||Rights and Responsibilities - The Computer User|
|Pr-801.1||Access is granted to information technology (IT) resources in order to facilitate academic and administrative job activities. Those using IT resources agree to abide by federal and state laws, and college policies and procedures, including those related to harassment, plagiarism, commercial use, security, unethical conduct, theft, copyright and licensing infringement, unlawful intrusions, data privacy, and accessing pornography.|
|Pr-801.2||Users are responsible for:
When guests are granted access to IT resources they must abide by these policies and procedures.
|Pr-801.3||Liability for Personal Communications
Computer users are responsible for the content of their personal communications. The College accepts no responsibility or liability for personal or unauthorized use of its resources by users.
|Pr-801.4||Privacy and Security Awareness
Users should be aware that although the College takes reasonable security measures to protect the security of its computing resources and accounts assigned to individuals, the College does not guarantee absolute security and privacy. Users should follow the appropriate security procedures listed in this document to assist in keeping systems and accounts secure.
The College assigns responsibility for protecting its resources and data to systems administrators and data custodians, who treat the contents of individually-assigned accounts and personal communications as private, and do not examine or disclose the contents except:
|Pr-801.5||Consequences of Violations
If, in the course of an investigation, it appears necessary to protect the integrity, security, or continued operation of its computers and networks, or to protect itself from liability, the College may temporarily deny access to its IT resources. Inappropriate use of IT resources may result in disciplinary action and contact of applicable law enforcement agencies.
Content Owner: Donna Davis— email@example.com
Page Updated by: Jessica Trimborn
Date Issued: 07/31/07
Date Revised: 04/21/2010