Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Policy TrackingDate
Approved
RevisedMarch 2February 8, 20112024
Reviewed


Scroll ignore
scroll-viewporttrue
scroll-pdftrue
scroll-officetrue
scroll-chmtrue
scroll-docbooktrue
scroll-eclipsehelptrue
scroll-epubtrue
scroll-htmltrue


ppmhistoryview, confluence-admins-blueridgeccINLINE


Revision History

Enter text here

Computer and Technology Support: Maintenance of computers, networks, most communications equipment, and related software is the responsibility of the IT Department through the IT Help Desk. Such service may include:
  • Installation of computer hardware and software
  • Writing specifications for new equipment
  • New account and account change requests
  • Hardware repair and upgrades
  • Telephone system support
  • Support of licensed software applications
  • System printing requests
  • Technology consultation services
    Under no circumstances shall anyone not so authorized attempt to repair any College-owned equipment or install or remove software on computers assigned for employee use. Faculty may make temporary adjustments to software on classroom computers as needed for instruction.
  • Appropriate Use: College technology facilities and accounts are to be used for academic research and instruction, electronic mail, Internet access, and for activities related to the mission of the College.
  • Unauthorized Activities: Users should not assume that any use not listed is otherwise excluded. Questions regarding whether a specific use is permitted should be referred to the IT Director, Director of Media Services, or the Director of Instructional Technologies and Distance Learning Support. The following are examples of unauthorized uses of the Blue Ridge Community College Information Technology resources including:
  • Use of a BRCC net account by someone other than that individual (employee or student) for whom the account is specifically designated
  • Providing unauthorized individuals access to net accounts including sharing user names and passwords
  • Interfering with the ability of other users to make effective use of Blue Ridge Community College computer, network, or telecommunications services
  • Gaining unauthorized access to files
  • Creating computer worms or viruses or deliberately infecting College property
  • Using Blue Ridge Community College Net accounts, facilities, or equipment for personal use or profit
  • Use of chat rooms for non-College-related purposes
  • Interfering with the effective operation of the College’s bandwidth capacity
  • Copying, providing, receiving, or using copyrighted material in violation of licensing agreements
  • Sending unwanted, threatening, abusive, harassing, obscene or pornographic messages, language, material, or files to others, including posting such on a Web site or otherwise displaying such. These actions may also be considered workplace harassment
  • Any illegal activity or unauthorized commercial activity
  • Knowingly or unknowingly using unauthorized file sharing programs for accessing music, videos, movies, games, network files, applications, or unauthorized activities.
    Blue Ridge Community College divisions may have additional rules relative to computer or equipment use in their respective areas. Users are expected to abide by such rules.



    Section 1. Application

    This policy applies to any College employee, contractor or third party who uses any device, whether College-owned or personal, to connect to the College Network or access College controlled Information Technology resources.

    Section 2. Requirements

    1. Information Technology Resources of the College are intended solely for use by authorized faculty, staff, students, contractors, or vendors for the purposes of instruction, education, research, or other public service activities performed on behalf of the College.
    2. Users may not connect personal devices to the College Network without express written permission from the agency head or the agency head’s designee. This requirement does not apply to users who connect to the College’s designated Public Wireless Networks.
    3. Personally owned “smart” devices may not be connected to the College Network. “Smart” devices, commonly referred to as the “Internet of Things,” include smart thermostats, smart appliances, or wearable technologies.
    4. All devices connected to the College Network must have updated malware/anti-virus protection.
    5. Users must not attempt to access any data, documents, email correspondence, and programs contained on systems for which they do not have authorization.
    6. Users must not share or divulge confidential or sensitive information to anyone without proper authorization.
    7. Users must not share their account(s), passwords, Personal Identification Numbers (PIN), Security Tokens (i.e. Smartcard), or other similar information or devices used for identification and authorization purposes.
    8. Users must not use College Information Technology resources for non-work related or personal tasks except as allowed in Section 3: Incidental Use below.
    9. Users must not make unauthorized copies of, store or transport copyrighted electronic media including software, video, or audio. It is the responsibility of each individual to ensure their actions do not violate copyright law. Any material found on College managed equipment or services that violates copyright is subject to immediate and permanent deletion.
    10. Users must not download, install, or distribute software to College-owned devices unless it has been authorized by the College’s Information Technology department.
    11. Users must ensure all files downloaded from an external source to the College Network or any device connected to the College Network, including a diskette, compact disc (CD), USB flash drive, or any other electronic medium, is scanned for malicious software such as viruses, Trojan horses, worms or other malicious code.
    12. Users must ensure data classified as sensitive or confidential or otherwise contains personally identifiable information (PII) is only stored on equipment or data services owned by and under the control of the College.
    13. Users must not download College data to personally owned devices
    14. Users must not purposely engage in activity that is illegal according to local, state or federal law, or that violates College policy, or activity that may harass, threaten or abuse others, or intentionally access, create, store or transmit material which may be deemed to be offensive, indecent or obscene such as racially or sexually explicit materials.
    15. Users must not engage in activity that may degrade the performance of information resources, deprive an authorized user access to resources, obtain extra resources beyond those allocated, or circumvent information security measures.
    16. Users must not download, install or run security programs or utilities such as password cracking programs, packet sniffers, or port scanners that reveal or exploit weaknesses in the security of information technology resources unless approved in writing by the CIO or College President.
    17. College Information technology resources must not be used for personal benefit, e.g., gambling, political activity, unsolicited advertising, unauthorized fund raising, personal business ventures, or for the solicitation of performance of any activity that is prohibited by any local, College, or federal law.
    18. Access to the Internet from College-owned, home based, devices must adhere to all acceptable use policies. Employees must not allow family members or other non-employees to access data classified as restricted or highly restricted.
    19. Users must report any suspicious activity or unexpected software or system behavior, which may indicate malicious software is active on the device or unauthorized disclosure of information or exposure to security threats.
    20. Users must report any incidents of possible misuse or violation of the Acceptable Use Policy.
    21. Users have a responsibility to promptly report the theft, loss or unauthorized disclosure of information.
    22. Users should not use any unauthorized Cloud Services (e.g., file storage/sharing services like DropBox, Google Drive, etc.) for storing or sharing of College data.
    23. Users must not send College data to non-authorized individuals or accounts.
    24. Abuse, damage, and theft: Any person who willfully abuses, damages, steals, or otherwise renders inoperable any College-owned item including computers, digital media, software or other technology item, or uses such items for illegal purposes, may be disciplined under the Policies and Procedures Sections 3.11 (employees) or 4.15.1 (students) and could be referred to law enforcement for prosecution as applicable. For the purposes of this section, computer software and digital media are also considered to be property.

    Section 3.  Incidental Use

    College systems are intended for primarily business purposes, but limited (incidental and occasional) personal use may be permissible when authorized by your management and it does not do the following:

    1. Interfere with the normal performance of an employee’s work duties.
    2. Result in direct costs to the agency, cause legal action against, or cause embarrassment to the agency. Agencies should restrict incidental personal use of electronic mail, Internet access, fax machines, printers, copiers, and any other information technology resources to employees. This does not include family members.
    3. Involve interests in personal or outside business and/or other non-authorized organizations and activities such as selling or soliciting personal property/items, promoting commercial ventures, charitable, religious, or political activities.

    Section 4. Violations

    Violation of this policy could result in suspension of the users access to College Information Technology resources, or in disciplinary action.

    Violations: Violations of any procedures set forth herein will result in action being taken by the College including: counseling on the proper use of technology resources, temporary or permanent restriction of such use, or formal disciplinary action pursuant to Policies and Procedures Section 3.

    10.1[Disciplinary Action – Employees]

    11.2 and Section 4.15.1

    [Discipline of Students]

    . Violations of North Carolina statutes dealing with unlawful access or use of a computer may be referred to the State Attorney General’s Office for investigation and/or prosecution. Similarly, violations of 18 U.S.C. Sec. 1030 (Federal laws dealing with unlawful access to or use of a computer) may be referred to the FBI.

    Abuse, damage, and theft: Any employee or student who willfully abuses, damages, steals, or otherwise renders inoperable any Blue Ridge Community College computer, multimedia or related equipment, network or software, or uses such items for illegal purposes, will be disciplined under the Policies and Procedures Sections 3.

    10

    11 (employees) or 4.15.1 (students) as applicable. For the purposes of this section, computer software and digital media are also considered to be property.

  • Software Installation: Only software owned and licensed by Blue Ridge Community College or software which carries a public license, may be installed on College computers. Only IT staff may install such software. Demonstration software downloaded from the Internet will be allowed only on employee or classroom presentation computers and must be removed by IT staff after the demonstration is complete.
  • Use of Licensed Software: Blue Ridge Community College’s IT Department shall physically hold all the Blue Ridge Community College software licenses. Licensed software may not be duplicated unless the license explicitly permits duplication. Copying such software to a disk or to an unauthorized machine is a violation of Blue Ridge Community College policy as well as a violation of various state and federal laws. Where possible, updates of all licensed software will be made available from the IT staff.
  • Software Use Permission Statement (Blue Ridge Community College-produced Software): The following permission statement should be posted (1) whenever a student, faculty member, or staff member makes software available for distribution; (2) when the software is produced with the financial underwriting of the College or with financial underwriting secured through the College; or (3) when the software is intended for use by non-profit, public educational institutions:
    "This software is provided free for use by public, non-profit educational institutions. Making copies of this software is permitted for use by such an institution and its employees for work-related purposes. Making copies for personal use or for profit-making purposes is expressly prohibited. Editing by any means mechanical or electronic is expressly prohibited. Specifically, this means that in downloading this software you agree not to modify, adapt, translate, reverse engineer, decompile, disassemble, or otherwise attempt to discover the source code of the software."
  • Bandwidth Capacity: Bandwidth capacity is the ability to transmit data from one computer to another within a network, to the Internet, or from the Internet. Users should understand that abuse of the network may compromise the system’s resources. Using the Internet for receiving radio broadcasts or streaming media, downloading files or sending large files may be detrimental to network performance; therefore, such activities should be limited to institutional purposes. IT staff can temporarily restrict Internet access of devices which appear to be abusing network bandwidth. Users should consult the IT Helpdesk for guidance in these areas and what constitutes an inordinate use of bandwidth.
  • Public Access Facilities and Designated Open Labs: Public Access computer workstations in the Blue Ridge Community College Library are available to students, faculty, staff, and visitors for the purposes of conducting educational research or doing course work. All rules regarding the use of Blue Ridge Community College computers and use of the Internet contained herein shall also apply to public access computers. An abbreviated set of such rules shall be posted in full view of each public access computer and such rules shall direct users to the location of the expanded computer policies and procedures and shall also contain information regarding saving files, printing guidelines, priority of use, etc. Visitors will be charged for all printing from Blue Ridge Community College computers.

    Section 5. Acknowledgement of Policy

    College employees, contractors and any individual granted access to College Information Technology resources must acknowledge in writing that they have received a copy of this policy.

    Section 6. Supplemental

    1. Library Staff: Only Library staff members, print shop staff or other designated College employees lab assistants shall have access to visitor print account user names and passwords.
    2. Teaching Labs: Teaching computer labs are not considered open access labs and are not intended to be used by students beyond the requirements set by the classroom instructor, who shall be responsible for securing the classroom when the class is over.



    Scroll ignore
    scroll-viewporttrue
    scroll-pdftrue
    scroll-officetrue
    scroll-chmtrue
    scroll-docbooktrue
    scroll-eclipsehelptrue
    scroll-epubtrue
    scroll-htmltrue


    ppmhistoryview, confluence-admins-blueridgeccINLINE


    Change History