Procedures and Policies - SCC Network Computing

St. Charles Community College provides information technology resources to a large and varied group, including faculty, staff, students and guests. All members of this community are responsible for using these resources in an effective, efficient and ethical manner that does not interfere with the reasonable use of these resources by other community members, or endanger the college's legal status. In particular, College employees who deal with sensitive data are required to exercise due diligence with regard to privacy and security policies and practices.

User Account Removal

Network Computing will be notified by the Human Resource department of departing Faculty and Staff members.  Upon receiving the notification, the following procedures will be followed by Network Computing System Administrators:

Part-Time Employees:

  • Account, data, and email accounts are deleted.

Full-Time Employees:

  • The user account is disabled until the former employee's supervisor is contacted.
  • The individual’s supervisor will be contacted to ascertain if any data within the employee’s home directory needs to be saved.  If the supervisor requests the data, then a written request is required before data can be transferred to supervisor.  If data is not required the data will be deleted.
  • If the individual’s supervisor wishes access to the staff member's email, a written request must be sent to the College President, and the President will in turn notify the Network Computing Department whether or not to allow access. Network Computing will then comply with the president's request.

Faculty:

  • Account, data and email accounts are deleted.

Computer Use

Ethical Conduct for Computer Use

Compliance

Achieving compliance in IT is ongoing; it requires diligence and vigilance due to the shifting regulatory landscape, dynamism of technology and changing business objectives of the College. Successful management of compliance requires the IT department to continually evaluate the effective design and operation of our internal controls, record deficiencies or non-compliance when found, map those to policies, regulations and risks, prioritize, resolve through remediation efforts, and finally,to report the results to the vice president of technology, research and planning.