Acceptable Use Policy
Purpose--To enhance its educational, cultural and economic missions in service to the community, Sandhills Community College provides students, faculty, staff, and community members with computers, tools, instruments, and facilities that provide access to campus and global information resources. The college expects and requires ethical and responsible behavior of individuals using information resources. This policy statement identifies acceptable uses of these resources and includes circumstances in which the interests and rights of others must be protected and preserved.
These procedures apply to all Sandhills Community College students, faculty, and staff as well as members of the community who use or access college information technology resources.
Definition--The term "information technology resources" includes all computers, tools, instruments, or facilities which enable individuals to access or interact with information available through, but not limited to, the library automation system, the Internet, the World Wide Web, or local campus networks. Resources may be individually controlled or shared, stand alone or networked. Included in this definition are classroom technologies, computing and electronic communication devices and services, modems, electronic mail, phone access, voice mail, fax transmissions, video, multimedia and hyper media information, instructional materials, and related supporting devices or technologies.
Use Agreement--By using college-supplied information technology resources, individuals, groups, or organizations agree to abide by all policies and procedures adopted by Sandhills Community College as well as all current federal, state, and local laws. These include college policies and procedures against harassment, plagiarism, and unethical conduct; as well as local, state, and federal laws prohibiting theft, copyright infringement, insertion of malicious software into computer systems, and other unlawful intrusions.
In the event of violation of any of these policies, procedures, or laws, the college will follow established disciplinary policies, including those regulating the provision of information to law enforcement authorities. The college shall not examine or disclose the contents of electronic files except when authorized by the owner of the information, when approved by an appropriate institutional official, or as required by law.
Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against users of information technology resources.
User Responsibilities--Anyone using college information technology resources is responsible for:
- recognizing and honoring the intellectual property rights of others, making attribution as appropriate;
- refraining from any illegal and improper intrusions into the accounts of others or into any College information technology resources or systems;
- taking all reasonable steps to insure the accuracy and the security of information compiled, accessed, or provided;
- being ethical and respectful of the rights of others and of the diversity of the College community, including the rights to privacy and all other legal requirements and restrictions regarding access to and use of information; and refraining from acts that waste resources and prevent others from having broad access to College information technology resources;
- abiding by all other applicable College policies and standards relating to information technology resources. These policies and standards include, but are not limited to: software, wireless, remote access and email.
Network Access--All equipment attached to the college network, including wireless networks, must be approved by the Network Administrator except in specifically identified public access areas.
Individual organizations within the College may establish and define procedures or conditions for use of information technology resources under their control. Established procedures or conditions must be consistent with this overall policy but may provide additional detail, guidelines, or restrictions. In addition, all interactions outside the College are subject to the acceptable use policies of the outside agencies such as network access providers, telecommunications companies, or software developers.