Shadow
Home :: Stanly Catalog ::

SCC Policies



Computer and Network Use Policy

Approved By and Date:Board of Trustees02-20-2014
 Executive Leadership Team12-19-2013
 ICORE12-11-2013

In order to preserve the utility and flexibility of the technology systems, protect privacy of Stanly Community College financial information, student records, electronic documents of faculty and staff, and to preserve access to the global Internet, the College publishes guidelines that govern the use of the computer and network system for all users.


Computer and Network Use Procedures

Approved By and Date:Executive Leadership Team12-19-2013
 ICORE12-11-2013
  1. GENERAL USAGE
    1. Faculty, staff, and students with authorized accounts may use the College’s computing facilities, including transmissions over the campus network; for scholarly purposes and official campus business so long as such use does not (1) violate any law or college policy or (2) involve significant use of college resources or interfere with the performance of college duties.
    2. Public use of computer equipment is limited to those located in the Learning Resources Center and Student Success Center. Other use of computer equipment or facilities by family or friends is not allowed.
    3. Unauthorized software applications are prohibited from being used on college computers without written authorization from the network support department.  Unauthorized software may be removed without notification. Unauthorized software includes any software that the college does not own. All software on college computing systems must be authorized by the Vice President for Information Technology Services.
    4. User data saved on SCC desktops or laptops is not backed up and not guaranteed to be accessible.
  2. COMMUNICATION
    1. Use of electronic mail or other network communication facilities to harass, offend, or annoy other network users is forbidden.  This includes the practice of writing or forwarding of chain letter type communications or other non-solicited correspondence.  See the Email Use Policy for the appropriate uses of College email accounts.
    2. Transferring copyrighted materials to or from any system or via the network without express consent of the owner may be a violation of federal law and is a felony under state law.
    3. Electronic mail, information passing over the college network, and information stored in user accounts are the property of the institution.  The current administration considers this information private and confidential.  Although this type of information must be accessed by system personnel for the purpose of backups, network management, etc., the content of user files and network transmissions will not be viewed or altered without the express permission of the user except in the following circumstance:
      1. The College has reason to believe that an account or system has been breached and is being used for unauthorized activities.
      2. The College has received a complaint that someone is trying to gain unauthorized access.
      3. The College has reason to believe that an account or system is being used in violation of college policy or federal or state law.
  3. INTERNET USAGE
    1. The provision of open access to the information available via the Internet does not imply that SCC approves, condones, endorses, or accepts responsibility for its content.
    2. SCC does not guarantee the validity or reliability of any information accessed via the Internet.
    3. SCC faculty and staff may observe Internet use that is deemed inappropriate for student/public computer workstations located in the library or labs.  In such cases, the user will be asked to refrain from accessing that site.  Repeated abuse in the usage of Internet resources may lead to suspension and/or legal action.
    4. Access to information via the Internet is provided for the purpose of supporting academic research or activities that support the SCC instructional program.  SCC faculty and staff may ask anyone who is using the Internet for entertainment to relinquish the computer workstation to a user who needs it for research or to support an instructional assignment.
  4. SECURITY
    1. It is every user’s responsibility to protect his or her account from unauthorized use by changing his or her password periodically and by using passwords that are not easily guessed.  Users should not allow any person to use their passwords or to share their accounts.
    2. Any action to circumvent network security or gain access to the system through any unauthorized means is forbidden and may lead to suspension of a person’s rights to use the college network. Any employee whose rights to use the network have been restricted may be terminated.  Employees or students who try to gain entry to the network illegally may have their network rights suspended.  In the case of an employee, this could lead to termination.
    3. Security violations should be reported to any member of the Information Technology Services Department.  The Vice President for Information Technology Services will contact the affected users regarding concerns and corrective measures.  Additionally, an incident report will be completed and sent to the appropriate Vice President.
  5. VIOLATIONS
    1. Violations of policy will be treated as academic misconduct, employee misconduct, misdemeanor, or felony as appropriate.
    2. For noncriminal matters, a violation could result in suspension of the user’s access rights.  A second violation will result in permanent suspension of access privileges.
    3. Misdemeanor or felony charges may be prosecuted to the fullest extent of the law and may result in immediate and permanent loss of privileges.
    4. Student disciplinary proceedings will be initiated against student violators.
    5. Stanly Community College faculty and staff, where appropriate, may also face sanctions cited above.  In addition, violations of the policy may lead to sanctions up to and including termination.