Appropriate Use of Information Technology Resources Policy (200.2)
In pursuit of its mission to provide educational opportunities and public services to the colleges of southeastern Illinois, the Board of Trustees of Illinois Eastern Community Colleges ("IECC" or the "District") provides access to “information technology and resources” (as defined in IECC Policies and Procedures 200.2) for students, faculty and staff members and other authorized users within institutional priorities and financial capabilities.
Access to the District's information technology and resources is a privilege granted to District students, faculty and staff members and other authorized users. Access to District information technology and resources may be granted by the data owners of that information based on their judgment of the following factors: relevant laws and contractual obligations, the requestor's need to have access to the information technology and resources, the information technology and resources’ sensitivity and the risk of damage to or loss by the District which could result from its disclosure.
The District reserves the right to extend, limit, restrict or deny privileges and access to its information technology and resources. Data owners--whether departments, units, students, faculty or staff members--may allow individuals other than District students, faculty and staff members access to information which they own or for which they are responsible, so long as such access does not violate any license or contractual agreement, District policy or any federal, state, county or local law or ordinance.
IECC information technology and resources are to be used for the District-related activities for which they are intended and authorized. District information technology and resources are not to be used for commercial purposes or non-college related activities without written authorization from the District. In these cases, the District will require payment of appropriate fees. This policy applies equally to all District-owned or District-leased computers and peripherals.
All members of the college community who use IECC's information technology and resources must act responsibly in their use of the resources. All users of District-owned or District-leased information technology and resources must respect the rights of other users and comply with all pertinent licenses and contractual agreements. IECC's policy requires that all students, faculty and staff members and other authorized users act in accordance with these responsibilities, relevant laws and contractual obligations and the highest standard of ethics. Each user must remember that his/her freedom to access, display or publish information is constrained by the rights of others who have the right not to be subjected to material that they find offensive. Information posted and/or published on the Internet may be accessible by any computer on the Internet.
Authorized users and system administrators must all guard against abuses that disrupt or threaten the viability of any and all systems, including those at the college campuses and those on networks to which the District's systems are connected. Access to information technology and resources without proper authorization from the data owner(s), unauthorized use of District computing facilities, and intentional or negligent corruption or misuse of information technology and resources are direct violations of the District's standards for conduct as outlined in IECC Policies and Procedures, District collective bargaining agreement and the Faculty Handbook and may also be considered civil or criminal offenses.
Privacy and Content
Users should have no expectation of privacy or confidentiality in the content of electronic communications or other computer files sent and received on the District computer network or stored in his/her directory. The District computer network’s system operator, or other District employees, may, at any time, review the subject, content, and appropriateness of electronic communications or other computer files, and remove them if warranted, reporting any violation of rules to the District administration and/or law enforcement officials.
Email Information Exchange Security
User IDs and passwords are provided only for personal use. Users should not share passwords with anyone and should not use anyone else’s password regardless of how the password was obtained. If a user suspects someone has discovered their password, the password should be changed immediately. Users shall not intentionally modify files, data, or passwords belonging to other users. When sending electronic communications, users should be cautious when including personal information. IECC is not responsible for personal information which is obtained by unauthorized recipients or interceptors of electronic communications. Use of personal credit cards on an IECC owned computer is done at the user’s own risk and IECC is not responsible for any loss or damages resulting from this use.Copyrighted Material
Users shall not: copy and forward, download, and/or upload to the IECC network or Internet server any copyrighted, trademarked, and other intellectual property without express authorization from the owner of the trademark, copyrights or intellectual property right.
Unauthorized copying, use or distributions of software is illegal, strictly prohibited, and subject to criminal penalties. Similarly, other intellectual property content owners may take criminal or civil action against a user for unauthorized copying, use or distribution of intellectual property materials. All the content transmitted via e-mail and web publishing must either be the users’ own or must be transmitted with express authorization for distribution by IECC or by the individual who owns the trademark, copyright or intellectual property right.
Inappropriate and Illegal Use of Computers
Examples of inappropriate and illegal use include:
1. Accessing, e-mailing or web publishing of material, including text or images, determined to be obscene and/or pornographic.
2. Use of information technology to facilitate, engage in and/or encourage academic dishonesty.
3. Email distribution or web publishing of derogatory statements intended to offend other individuals, groups, or organizations or which violate IECC’s anti-discrimination/harassment policy and procedures. (See policy 100.8 and procedure 100.8 for more information.)
4. Use of the computer network system in a manner that violates the IECC Computer Use Policy or Procedures, any other District/College policy, and/or local, state or federal law.
5. Intentionally infiltrate, or “hack,” IECC or outside computing systems and/or networks.
6. Release viruses, worms, or other programs that damage or otherwise harm IECC’s network, or an outside computing system, or network.
7. Knowingly disrupt a system or interfere with another student’s, staff or faculty member’s or other authorized user’s ability to use that system (e.g., by sending “e-mail bombs” that cause disk fill up, a network to bog down, or software application to crash).
8. Willfully damage or destroy computer hardware, software, or data belonging to IECC or its users.
Priority Usage of Computer Hardware, Software and/or Facilities
Priority shall be given to classroom activities, assignments and/or research and to IECC faculty, staff, and students.
Lab User Age Restriction
Patrons under the age of 18 who are not enrolled students are not permitted to use the open lab computers without obtaining authorization from the college’s Learning Resource Director or Lab Supervisor.
Users are not allowed to store personal work and/or software on the hard disk drives in the open lab and all users should have a personal data disk for saving their work. Any files or software found on the hard drives will be deleted. IECC is not responsible for data lost for any reason including but not limited to: power failure, computer failure, or any other unplanned or unavoidable event or emergency.
Students are not allowed to install any software onto any IECC computers.
Network capacity is limited and users must not exceed reasonable usage. Recreational network activities such as: downloading large files, viewing streaming video and listening to streaming audio are prohibited unless pre-approved by the Director of Information and Communications Technology.
Only authorized IECC technical staff are allowed to connect personal computers or other devices to the internal IECC network.
Public Internet Access
Public Internet access areas have been established in some areas to provide Internet connectivity for personal computing devices. Please be advised that the public network does not enforce any security or encryption. Transmissions of secure information such as ID’s, credit card numbers, passwords, etc. may be intercepted by wireless users in or near the open networks. IECC is not responsible for damage to personal property or other injury, including damage to computers resulting from software/hardware installation or Internet use.
Users shall not use the District’s computer network to set up web pages to advertise or sell products or services, solicit sales or conduct business (e.g., by posting an advertisement to a news group) without prior written approval and, if required, the payment of an appropriate fee.
Alleged violations of this policy will be processed according to the disciplinary policies outlined in the IECC Policies and Procedures Manual, the IECC collective bargaining agreement and the college’s catalog. IECC treats access and use violators of information technology and resources seriously. IECC computing resources may also be subject to prosecution by state or federal authorities.
IECC has the right to remove, without notice, any material from its system found to be threatening, obscene, pornographic or which violates the District’s anti-discrimination/harassment policy or any other District policy. Such action may result in the termination of the user’s account.
Policy Adoption Administration Liability
This policy will be reviewed and updated periodically and the current policy, inclusive of any revisions, will be electronically posted on the IECC Internet and web servers.
The Chief Executive Officer, Presidents and Director of Information and Communications Technology are responsible for supervising adoption of guidelines to implement this policy.
Alleged violations of this policy will be processed according to the processes outlined in the IECC Policies and Procedures Manual, IECC collective bargaining agreement and the college's catalog. IECC treats access and use violations of information technology and resources seriously. IECC will pursue criminal and civil prosecution of violators as it deems necessary.