Procedure 7.08.01 - Use of Information Systems
Use of Information Systems applies to students, employees, and other authorized users. The president of the institution and/or his/her designee makes the initial determination of violations under this policy. Unauthorized users are subject to prosecution under relevant state and federal laws and SCC will contact state or federal authorities for prosecution.
Students utilizing the generic laboratory workstation will be made aware of the IS Use Policy through the Student Handbook and by posting of the policy in all student labs and access points. Employees, non-employees, and students with specific logins will confirm that they have read and understand the IS Use Policy by signing a copy of the policy when provided access and on a periodic basis thereafter. Employee affirmation is coordinated via an electronic form and returning students’ affirmation in fall semester. New employees will sign the policy as part of their indoctrination to the IS systems. The IS staff will maintain the most current signed policy.
All users must be aware that the college cannot guarantee the absolute privacy of files and electronic messages. The IS staff can view files and messages on the networks. It is not the policy of the institution to routinely view such files and messages, but privacy cannot be guaranteed.
The following are the guidelines to ensure appropriate use of information systems, computer systems, and information networks.
User Must Do the Following:
- Use the resources for which they have been granted access and only for authorized purposes.
- Protect the privacy of confidential information to which they have been entrusted.
- Protect their username and passwords. Users are responsible for any activity using their username and passwords.
- Access only files and data that are their own, that are publicly available, or to which they have been given authorized access.
- Use only legal versions of copyrighted software in compliance with vendor license requirements.
- Be considerate in their use of shared resources. Users should refrain from monopolizing systems, overloading networks with excessive data or downloads, wasting computer time, wasting or excessively using connect time to internal or external networks, abusing disk space, and excessively using printer paper or other resources.
Users Must Not Do Any of the Following:
- Use another person’s username or password.
- Use another person’s files, system, or data without permission.
- Use computer programs and/or algorithms to decode passwords or access control information.
- Use computer resources without the supervision of college personnel.
- Attempt to circumvent, subvert, or damage system security measures.
- Connect personal equipment to the network.
- Engage in any activity that might be harmful to systems or to any information stored thereon, such as creating or propagating computer viruses, disrupting services, or damaging files.
- Use the college’s systems for partisan political activities, such as using electronic mail to solicit support for a candidate.
- Make or use illegal copies of copyrighted materials (software, videos, music, etc.), store such copies on college equipment, or transmit them on the college’s network.
- Use mail messaging systems to harass, intimidate, or otherwise annoy another person, for example, by broadcasting unsolicited messages, sending unwanted mail, propagating chain mail, or causing the sending of unwanted mail.
- Waste computing resources, for example, by intentionally placing a program in an endless loop or by printing excessive amounts of paper.
- Use systems for personal purposes.
- Use systems for viewing, downloading, sending, or receiving information which contains obscene, indecent, or lascivious material or other material that explicitly or implicitly refers to sexual conduct. The college reserves the right to judge if material meets the criteria for the above.
- Use systems for viewing, downloading, sending, or receiving information that is bigoted or sexist. The college reserves the right to judge if material meets criteria for the above.
- Use systems for viewing, downloading, sending, or receiving copyrighted music, video, or data without adhering to the appropriate copyright laws.
- Use systems for live multimedia (music/video) feeds that are not directly related to instruction or work.
- Create, modify, execute, or retransmit any computer program or instructions intended to obscure the true identity of the sender of electronic mail or electronic messages, collectively referred to as messages, including, but not limited to, forgery of messages and/or alteration of system and/or user data used to identify the sender of messages.
I have read, fully understand, and will abide by the Information Systems Use Policy.
Print Network Login
Reviewed and Last Update on October 19, 2020