Computer Regulations

Information and Technology Resources

Computers, networks and electronic information systems and the data they provide are essential college operational resources. SCC grants shared access to these resources. These resources must be used and managed responsibly to ensure their integrity, security and availability for appropriate educational and business activities. All users must adhere to approved procedures administered by the Information Technology Department. These procedures are detailed throughout this document.

Personal computers are available for use by students in various buildings on campus. The ACE Tutoring Center (Social Sciences Building) and the Technology Building contain walk-in labs for student academic use. Students also have access to computers for recreational use (email and Internet) in the Student Center lobby and in the Student Activities Office (CC 102). These recreational computers may be monitored and are not secure for confidential information.

Student-owned computing devices may connect to the College wireless network.  Use of the wireless network is also governed by the approved procedures mentioned earlier in this document.

Computer User Rights and Responsibilities

Access is granted to information technology (IT) resources in order to facilitate academic and administrative job activities. Those using IT resources agree to abide by all relevant college policies and procedures, including those related to harassment, plagiarism, commercial use, security, unethical conduct and laws prohibiting theft, copyright and licensing infringement, unlawful intrusion and data privacy.

       Users are responsible for:

  • Reviewing, understanding and complying with all policies and procedures related to access, acceptable use and security of information technology resources;
  • Asking systems administrators or data custodians for clarification on access and acceptable use issues not specifically addressed in policies and procedures;
  • Immediately reporting possible policy violations to one of the following people:
    • the director of network computing;
    • the director of administrative computing;
    • the associate vice-president of Technology and Online Learning
    • or the vice-president for human resources.

Liability for Personal Communications

Computer users are responsible for the content of their personal communications. The college accepts no responsibility or liability for personal or unauthorized use of its resources by users.

Privacy and Security Awareness

Users should be aware that although the college takes reasonable security measures to protect the security of its computing resources and accounts assigned to individuals, the college does not guarantee absolute security and privacy. Users should follow the appropriate security procedures listed in this document to assist in keeping systems and accounts secure. The college assigns responsibility for protecting its resources and data to systems administrators and data custodians, who treat the contents of individually-assigned accounts and personal communications as private and do not examine or disclose the contents except as required for system maintenance including security measures; or when there exists reason to believe an individual is violating the law or college policy.

Consequences of Violations

If, in the course of an investigation, it appears necessary to protect the integrity, security, or continued operation of its computers and networks or to protect itself from liability, SCC may temporarily deny access to its IT resources. Inappropriate use of IT resources may result in disciplinary action and contact of applicable law enforcement agencies.
See board policy 801-IT Resources.

Using the College’s Computing Resources and Information/Data

Login IDs are a unique combination of username and password granted to individuals for their use only. Whenever there is reason to believe that a login ID has been compromised, a system/network administrator should be contacted immediately. All users must log out or lock the PC in use before leaving the area. Users may access only accounts, files and data that are publicly available or to which they have been given authorized access. It is the responsibility of all users to secure information that is in their possession. Use of the college’s network resources is subject to the
Acceptable Use Policy of our Internet provider, MoreNET.

See board policy 803-Resources And Information.

Use of Software and Hardware

College email, computers and networks may be used only for legal, authorized purposes. Occasional, brief personal use is permitted. Unauthorized or illegal uses include but are not limited to:

  • Use that violates any federal or state law.
  • Unauthorized access to files or computer resources (including remote computer systems).
  • Copying, revising, damaging, removing or distributing programs or data or any other user’s programs or data without  the express permission of the owner.
  • Activities that disrupt normal computer/network use and services including, but not limited to:
    1. Propagation of computer viruses;
    2. Sending chain letters or unauthorized mass emails;
    3. Unnecessary printing or other network traffic.
  • Damaging or altering college computer equipment or supplies.
  • Use that is harmful or harassing to other users;
  • Introduction of any unacceptable information onto the administrative or academic systems and applications. Unacceptable types of information include:
    1. Information that infringes on the rights of others;
    2. Information that is abusive, profane or sexually offensive;
    3. Information that may injure another or lead to a lawsuit; such as pirated software, destructive software (including computer viruses), pornographic or libelous, statements or unauthorized copies of licensed software or copyrighted media files;
    4. Advertisements for commercial enterprises;
    5. Software programs not approved by a director of IT.
  • Use of college computing resources for personal or monetary gain.
  • Access to the college’s network resources via any unauthorized device.
  • Violation of regulations as stipulated in the Family Educational Rights and Privacy Act (FERPA) and College Board Policies and Procedures.

Software must only be installed by authorized IT staff.
See board policy 806-Software Hardware Use.

Student E-Communication

E-communication, or email, shall be considered one of the primary means of official communication to students.

E-communication facilitates student success by providing regular, relevant and time-sensitive electronic communication to students via college-assigned email accounts.

The college-wide email system is for communication with students in addition to those e-communications provided through the learning management system for academic instruction.

E-communication falls under the guidelines of Board Policy 483.0 – Release of Student Information in accordance with the Family Educational Rights and Privacy Act of 1974.

Each student will be provided an email address upon enrollment at the college. All students are expected to:

Read their email frequently. Important announcements as well as information specific to enrollment will be sent via email. It is the student’s responsibility to ensure that the information is read. While students may forward their email to a non-college account, the college does not recommend this. The college will not be responsible for email once it has been forwarded off the college’s servers, nor will support be given for any problems this might cause.

  • Monitor their college assigned email account to ensure there is sufficient storage space to receive emails.
  • Comply with college directives sent via email; failure to read email is not an acceptable excuse for non-compliance. Free access to computers with Internet is available on campus.
  • Student e-communication is subject to all college policies and procedures for computer use as established by the college, as well as the guidelines for sending messages to other students as noted below under “Inappropriate Use of Student Email.”

See board policy  850-Student E-communication

Inappropriate Use of Student Email

Examples of inappropriate computer use include, but are not limited to:

  • The creation and exchange of messages that are offensive, harassing, obscene or threatening.
  • The exchange of confidential information to persons without a need to know.
  • The creation or exchange of advertisements, solicitations, chain letters or other spam.
  • The use of email for commercial purposes.
  • The creation, storage or exchange of information in violation of copyright laws.
  • Reading or sending messages from another person’s account without authorization.
  • Intentional distribution of computer viruses.

See board policy 850.4 – Inappropriate Email

Children on Computers

Children too young to be admitted to the college are not allowed access to SCC computers without supervision. In addition, children (supervised or unsupervised) are not allowed in the ACE Center or TECH 116 computer labs.