Computer Resources Acceptable Use

1. INTENT 

It is the policy of the College to provide access for its community to local, national, and international sources of information and to provide an atmosphere that encourages access to knowledge and the sharing of information. It is expected that members of the College community will use the College computing resources with respect for the public trust, through which they have been provided, and in accordance with its policy and regulations established from time to time by the College and its operating units. 

2. SCOPE 

Computing resources are defined as computer hardware, computer software, computer peripherals, devices, and networks operated by or for the benefit of the students, faculty and staff of the College. The use of these resources is a privilege, not a right. It is the user's responsibility to use these resources in a manner that is efficient, ethical and legal. All users shall strictly adhere to both the letter and spirit of this policy, which is provided to insure a reliable, secure computing environment to all users. Failure to comply with any of the regulations set forth in this policy may result in sanctions as stated in number ten, Sanctions. 

3. GENERAL PROVISIONS 

  1. Authorized Use: You may use College computing resources only for authorized purposes. It is the obligation of College employees to be aware of the governing law, rules, and guidelines set forth in Chapter 42.52 RCW, Ethics in Public Service Act; WAC 292-110-010, Use of state resources; and South Puget Sound Community College Policies and Procedures. It is the obligation of students to be aware of the governing law, rules, and guidelines set forth in WAC 132X-60-090 Student Rights and Responsibilities and Student handbook. 
  2. Network Accounts All authorized users will be provided a network account. 
  3. Secure Passwords: You may use only those computing resources that you have been authorized to use. If your access to computer resources is protected by a personal password, you must not make this password available to others or use passwords not assigned to you. You may not allow someone else to give his/her password to you, or attempt to find out the password of another user, or aid such attempt by any other person. In some instances, shared accounts may be established by the System Administrator, in which case a password may be utilized by multiple users. 
  4. Authorized file access: You may not copy, rename, alter, examine, or delete the files or programs of another user without the user's permission. System administrators may, as a requirement of system maintenance, delete files that are determined to be non-essential after proper notification. Such deletions shall be made in accordance with the College's retention schedule. You may not interfere with the use of computing resources by any other authorized user, or compromise the confidentiality of the College's internal business practices or records. 
  5. Copyright: You must be aware of copyright laws as they apply to computer software and other materials that you may access with College computing resources. If you copy any material that is protected by copyright without proper authorization, you may be subject to criminal and/or civil penalties and/or further discipline by the College. A formal copyright declaration need not be in evidence for legal copyright protection to be in force. 
  6. Inappropriate Content: You may not use the College's computing resources to send, receive, or display information including text, images, or voice that is sexually explicit, or constitutes discrimination or harassment. "Sexually explicit material" is defined in RCW 9.68.130, but exempts authorized education and research. g. Computer Security: You may not subvert (known as hacking), or attempt to subvert or assist others to subvert, the security of any computing resources. The use of software or hardware devices designed to capture or examine network data (protocol analyzer or sniffer) is restricted to authorized College staff for the purpose of network maintenance and instruction. Unauthorized use of such software or hardware devices is expressly forbidden. You may not use College resources to create, disseminate or execute self-replicating or similar nuisance programs (e.g. virus, Trojan horse), whether or not they are destructive in nature. 
  7. Network Access for Personal Devices: You many not connect a personal computer or any other device to the College network without prior approval of IT Services. Wireless access is available throughout the campus, but direct network connections must be approved. 
  8. Network Efficiency: Network users shall promote efficiency in order to minimize network congestion and interference with other network users. Sending inappropriate mail to large distribution lists, downloading large files or purposely engaging in activities which overload the College computing resources is forbidden. 
  9. De Minimus Use: You may make limited personal use of College computing resources that support organizational effectiveness and enhance job-related skills. You may make limited personal use of College computing resources to access the Internet and email, assuming little or no expense to the college, brief duration and infrequent use that does not interfere with performance of official duties. Extensive personal use of college provided email or Internet access is not permitted. See WAC 292-110-010(4). 

     

4. EXTERNAL NETWORKS AND COMPUTING RESOURCES 

If you use the College computing resources to access external networks and computing resources, you agree to comply with the policies of those external networks and computing resources. You agree to comply with the acceptable use policies of the State of Washington Community and Technical Colleges, and the State Board for Community and Technical Colleges, and the K20 network.

5. RIGHT OF FREE SPEECH 

You may disagree with any or all information resource policies, either public or privately, in accordance with your First Amendment rights. However, you may not violate any published policy for any reason or cause. Questions regarding this policy should be directed to the Chief Information Officer.

6. WEB PAGES / INTERNET 

South Puget Sound Community College is a provider of online services. All Internet publishers whether they are divisions, departments, campus organizations or individuals, are responsible for the content of the pages they publish and are required to comply with all South Puget Sound Community College policies and procedures as well as state and federal laws. Any use which violates the policies and procedures as well as state and federal laws is prohibited.  Use of College web space cannot be for commercial gain.  See the College's Social Media Policy.

7. ADMINISTRATION 

The Board of Trustees or designated representative must endorse all computing resource policies before they may be placed in force. Policies may be modified only by formal change, followed by adequate public notice to all users.

8. PRIVACY

Pursuant to the Electronics and Communications Privacy Act of 1989, Title 18, United States Code, Sections 2510, notice is hereby given that there are no facilities provided by South Puget Sound Community College for sending or receiving confidential messages. Users must be aware that electronic messaging systems may not be secure from unauthorized access and should not be used to deliver confidential information.While performing normal maintenance activities, messages may be monitored. The college president or the designated representative may authorize college staff, with due regard for the right of privacy of users and the confidentiality of their data, to have the right to suspend or modify information access privileges, monitor messages, examine files, passwords, printouts, and any other material which may aid in the investigation of possible abuse. Whenever appropriate, the cooperation and agreement of the user will be sought in advance. Users are expected to cooperate in such investigations when requested to do so.  Education records of students attending the college are confidential and can be released only in accordance with the Family Education Rights and Privacy Act of 1974 and the administrative rules of the college.  Electronic Personal Health Information (ePHI) is protected under the Health Information Portability and Accountability Act of 1996 (HIPAA) and is handled using only secure and encrypted systems for storage and transport.  See the College's Data Security Policy.

9. USE VIOLATIONS 

Users of the College Electronic Mail and Internet Services shall not use the college's resources for communications that (see Washington state Executive Order 91-10): Discriminate on the basis of race, creed, color, gender, religion, disability, or sexual orientation; constitute sexual harassment; infringe copyright law; breach security or unauthorized access; constitute political campaigning or lobbying (see RCW 42.52.180); promote personal business interests; violate college policy or state or federal law.

10. SANCTIONS 

Violation of any of the provisions of this policy may result in: Revocation of use privilege. Disciplinary action:Any disciplinary action will be taken in accordance with appropriate college policies, procedures and collective bargaining agreements. Legal action for a violation of civil or criminal law.

11. RIGHT OF APPEAL 

If you disagree with any provision of this policy, you may contact a college administrator to communicate your concerns and/or suggestions. Students who have lost the privilege to use computer resources may appeal to Student Services to have that privilege reinstated. Employees may appeal to the Chief Information Officer.

12. DISCLAIMER 

The College accepts no responsibility for any damages to or loss of data due directly or indirectly to the use of South Puget Sound Community College computing resources or any consequential loss or damage. It makes representation of no warranty, expressed or implied, regarding the computing resources offered, or their fitness for any particular use or purpose. The College's liability in the event of any loss or damage shall be limited to the fees and charges, if any, paid to the College for use of the computing resources, which resulted in a said loss or damage.