Electronic Signature Policy
|Approved By and Date:||Board of Trustees||10-12-2017|
|Executive Leadership Team||08-28-2017|
Stanly Community College (SCC) recognizes an electronic signature as a valid signature from Trustees, faculty, staff, and students.
Electronic Signature Procedures
|Approved By and Date:||Executive Leadership Team||08-28-2017|
1. An electronic signature is defined as any electronic process or submission signifying an approval to terms and/or ensuring the integrity of the document presented in the electronic format.
2. An electronic signature is valid when it meets the following conditions:
- SCC provides a Trustee, student, or employee with a unique username or information regarding a secure site for signature approval.
- Trustee, student, or employee sets his or her own password, if required by the secure site.
- Trustee, student, or employee logs into secure site using both the username and the password, as appropriate for the electronic process or submission.
3. Students use electronic signatures to register, check financial aid, pay student bills, obtain unofficial transcripts, update contact information, log into campus computers, complete forms, submit class work and tests, etc.
4. Faculty and staff use electronic signatures for submitting grades and attendance, viewing personnel payroll data, logging into campus computers, accessing protected data through the administrative computing system and custom web applications provided by the College, etc.
5. Trustees use electronic signatures for authorizing and/or approving actions of the College, its officers, and employees.
6. It is the responsibility and obligation of each individual to keep his or her passwords private so that others cannot use his or her credentials.
7. Once logged in, each individual is responsible for any information he or she provides, updates, or removes.
8. SCC will take steps to ensure the passwords are protected and kept confidential. Users are responsible for logging out of all systems and exercising the necessary precautions when using publicly accessible computers.Email Encryption Procedure