Policy for the Responsible Use of Information Technology
The information technology facilities of Bristol Community College are intended for use to support the educational and administrative objectives of the College. The equipment and software available are valuable resources that should be used for education, communication and the administrative and financial needs of the College. The user of the College's services and facilities has access to these valuable resources, sensitive data, and data that others are reliant upon. It is incumbent upon the user to behave in a responsible, legal and ethical manner. Appropriate use of the College’s computer resources respects the rights of other computer users, the integrity of the physical facilities, and all related licenses and contractual agreements.
The College will make every attempt to provide an atmosphere where students, faculty, staff, administrators, and the public can pursue intellectual, creative activities individually or in collaboration. The following is a guideline for the use of the College's resources rather than an exhaustive list of rules and regulations. Responsible, considerate, and ethical use of all electronic and computing resources is expected.
Use of the College’s computer resources implies agreement with the terms of this policy. Use of College computer systems is a privilege rather than a right.
Computer Resources the computers and software available in computer labs, the computers available in offices and public areas, campus networks, electronic mail, the Internet, telephone services, including voice mail and other technologies as they are developed. All software and hardware purchased with College funds become the property of the College. An exception is made for software and hardware purchased with College funds for professional development and specifically meant for personal ownership.
Information Technology any and all computer or electronic resources that are utilized in the search, access, acquisition, transmission, storage, retrieval, processing, or dissemination of data.
System Administrator a person authorized by the College to develop, grant, and create user privileges, manage a computer or network, and/or ensure the effective operation of a system connected to the College data network.
Reverse Engineering The process of recreating a design by analyzing a final product. In this context, a design may include hardware or software such as a computer program.
User current staff, faculty, or students. Other users, such as members of the public, guests of the College, former faculty, staff, and students may use systems at the discretion of the College.
Employee current faculty and staff.
3. Respect for the integrity of the system:
3.1 System administrators will make every effort to maintain the integrity of the system through passwords, virus protection, and maintenance. However, users of the College’s computer resources assume their own risk and will in no way hold the College liable for any problems that occur. The College will make every effort to ensure that every computer has an approved virus screening, detection, and elimination program installed.
3.2 System administrators will make every effort to maintain the integrity of access to password-protected realms responsible for faculty course web sites. The College will provide confidentiality of password-protected course space (course web site and all materials contained within the course web site) and will make every effort to ensure privacy. Access to password-protected faculty web sites by anyone other than the instructor and the students registered in the course will be for the purpose of server maintenance only. Access to a faculty web site will not be used for course evaluation or any other purpose but maintenance without permission of the instructor. The College will maintain no additional paired listing of passwords and usernames associated with faculty web sites. Faculty members may change passwords and usernames at any time by contacting the system administrator.
3.3 All users will refrain from activities that would jeopardize the ability of others to use the system effectively. This includes, but is not limited to, abuse, misuse, overuse of resources including printers, reverse engineering, deleting or tampering with software, deleting or tampering with files, sending blocking e-mail messages, or otherwise infringing on another user's rights to work.
3.4 The College’s computers are important and valuable resources necessary for the education of students and for support of College work. Priority will be given to course-related use of computers in public spaces and labs and to work related to the functioning of the College.
3.5 All users will refrain from the unauthorized use, acquisition, or loading of software, including commercial products and those created by students, administrators or other members of the College community. College employees may install privately owned legal software on College owned computers and are responsible for its maintenance. Students wishing to download or install software related to coursework must first get permission from the lab attendant or appropriate personnel.
3.6 All users will refrain from attaching or detaching devices from the system or otherwise altering the system unless it is part of their course work and they have been authorized to do so.
3.7 All users will use College computer resources in accordance with the policies of the College and will not engage in illegal, obscene, or harassing activities with these facilities.
3.8 Any information posted on College web sites must meet the standards established by the College and not contain information that the College deems unsuitable for distribution. The Director of College Communications may review information posted by and for the College.
3.9 Any information posted on the College web site should be accurate and should contain the name of the person, organization, or department posting the information, an email address where they can be reached, a link to the College homepage, the date the page was posted, and the date of any major revisions.
3.10 To safeguard the integrity of the system and manage usage, system administrators may limit or restrict access to specific files.
3.11 Additional regulations and restrictions that are appropriate for the effective utilization and integrity of specific computer facilities may be posted.
3.12 Information Technology Services will create and maintain the capability to deliver broadcast email messages. Broadcast email messages are permitted only if there is a universal need to share College-related information with the whole College community.
4. Respect for the privacy of others:
4.1 No user may attempt unauthorized access to data that belongs to others, including but not limited to College records and the work of students, faculty, staff, administrators, and the public.
4.2 No user may attempt unauthorized access to restricted software, files, or information.
4.3 No user may attempt to acquire a password issued to someone else or use a password issued to someone else. Exceptions to this are when a user specifically requests help from faculty or staff that involves revealing this information.
4.4 Printed output is private and other users should respect this privacy.
4.5 The Internet or the local network may not be used to cause problems for another person, including users of College systems and those beyond the College community. This includes, but is not limited to, sending excessive amounts of mail or harassing messages, using someone else's name to subscribe to a service or group, placing someone else's name, photo, address, or work on the Internet or the local network.
4.6 Users should assume that email is an insecure medium. The College will respect the privacy of email. Exceptions include investigating an alleged violation of policy, routing of lost messages, or safeguarding the integrity of the system. No College employee will be permitted to intercept, read, copy, or modify private electronic data (either in transit across a network or stored within a computer system) without permission from the employee to whom the College has assigned the computer or the written consent of the President. Such consent will only be given in cases of suspected improper and/or illegal use.
4.7 Users should assume that the Internet in general is an insecure medium. Although data about Internet World Wide Web usage patterns are compiled automatically by certain system software and hardware, the College will respect the privacy of Web usage by individual users, except when required to respond to a legal investigation. No data about individual Web usage will be monitored, compiled, or published without permission from the employee to whom the College has assigned the computer or the written consent of the President. Such consent will only be given in cases of suspected improper and/or illegal use.
4.8 To safeguard the integrity of the system, files should be stored on individual’s disk drives or in directories established for their use. Information inappropriately saved on the system or information not stored in appropriate areas will be removed by the system administrator at regular intervals.
4.9 There is information available through the Internet that could be considered offensive by members of the College community. The Bristol Community College Sexual Harassment Policy explicitly prohibits the display of sexually suggestive content. If representatives of the College, the system administrator, or the computer facility staff feel that a user is in violation of the Sexual Harassment Policy, the user will be required to discontinue the activity and appropriate administrative action will be taken. College computer resources may not be used to access, produce, or distribute pornography in violation of the law.
5. Legal use of the system:
5.1 No user may use the computing facilities of the College for non-College commercial endeavors or non-College financial benefits.
5.2 Users agree to waive any claim and release Bristol Community College, its employees and agents, from any claim, demand, liability, cause of action or suit for damages arising out of their use of the College’s network(s), including but not limited to: loss of data, equipment failure or consequences resulting from the preceding.
5.3 All users shall respect copyright laws that apply to software, shareware, and other files that are owned by the author or developer. Users may not copy protected software, files, or information without the express written consent of the copyright holder. Unless expressly stated, it should be assumed that information found on the Internet is protected by copyright.
5.4 Licensed material may not be taken, copied from, or placed on the system without the express written approval of the owner of the license. Except as authorized, users may not loan or give software licensed to anyone including students, faculty, or others. Users may use software on local area networks or on multiple workstations only in accordance with applicable license agreements.
5.5 Only software for which a user is legally authorized may be installed or used on any College computer or network. College-owned software cannot be loaded on a home computer unless its license and the College specifically provide permission to do so.
5.6 The telephone system is intended for business use. Personal calls should be short and limited to those of an important nature.
5.7 Pursuant to Massachusetts campaign finance laws, no governmental resources (including computers, fax machines, modems, printers, and copy machines) may be used by any person (including a public employee, whether during work hours or otherwise) in order to promote or oppose a political candidate or ballot questions or for the purpose of disseminating materials that advocate a particular vote on a ballot question or a political candidate.
6. Policy Violations and Procedures:
6.1 In accordance with the Policy, College officials will investigate misuse or abuse of College computer resources and appropriate action will be taken. The development of this Policy was coordinated by the Technology Policy and Planning Committee, in consultation with the Academic Computer Committee. The Policy was then approved with minor modifications by the President’s Council and the President. These committees will periodically review the Policy and make recommendations for revisions as needed.