Campus and Network Computing Resources

Use of Campus and Network Computing Resources

Policy Statement  5.4

Illinois Valley Community College (IVCC) makes available computing and network resources for students, faculty, and staff, and community/guest users.  The resources exist solely for educational purposes to carry out the legitimate business of the College, the Board of Trustees, and the IVCC Foundation. All users of Illinois Valley Community College campus and network computing resources are responsible for using these resources in an effective, ethical and lawful manner, and in accordance with IVCC Administrative Procedures (5.4 a, b, c, and d). The College’s technology resources and the data entered, created, received, viewed, accessed, stored or transmitted by the College’s technology resources are College property with the exception of student-created work stored on network drives or unless stipulated otherwise by the Intellectual Property Rights agreement between the College and IFT Local 1810 (Article VI, A) or IVCC Board Policy 4.18 Ownership of College Commissioned Works, or any applicable law.  Acceptable and unacceptable uses of resources are outlined in related procedures. Users should:

  • Exercise personal responsibility for understanding limits and privilege of computing resources.

  • Use resources legally and ethically.

  • Understand related privacy and ownership issues.

  • Conserve and protect resources.

Enforcement:

Abuse of computing privileges and failure to observe this policy will result in disciplinary action. Computing privileges will be revoked and violators will be subject to the due process procedures of the College as outlined in the Student Code of Conduct, the Administrative Procedures, IVCC Employee Handbook, or the IVCC Board of Trustees Policy Manual. In case of conflict, local, state or federal laws and regulations will supersede this policy. Action taken by IVCC in accordance with this policy or related administrative procedures does not eliminate the possibility of legal action taken by the College or by others.

A copy of the Use of Campus Network and Computing Policy, as well as the accompanying Administrative Procedures will be made available to students, and will be available to all employees with a sign-off sheet acknowledging receipt and understanding.

Acceptable Usage Guidelines for Computer and Internet Resources

Number: 5.4 (a)

Computing and networked resources are available to students, College employees and community/guest users for the educational and administrative purposes of IVCC. General student access to computing and networked resources is provided in open lab areas and throughout the campus via wireless access. Other computers and computer labs are restricted to students in specific programs or courses. College staff members are available to help student users and new employees gain the computer access appropriate to their course of study or type of work. IVCC works with external partners to bring technology resources to campus, and has agreed to comply with the Acceptable Use policies of these entities.

Use of the campus computing resources is a privilege and not a right, and may be suspended during an investigation of alleged misconduct, and possibly terminated when improperly used. The following guidelines must be followed by all persons who use the College computing and networked resources, whether accessing them from on or off campus.


Guidelines and Prohibited Practices

Exercise personal responsibility

  1. Users are required to learn, understand, and follow the guidelines for each type of computer, lab, or other electronic resource.

  2. Users must only access those computing and information technology resources and data for which they have authorization and only in the manner and to the extent authorized.

  3. Installing software or connecting any device to the College’s network without prior consent from the IVCC Department of Information and Technology Services (ITS) is prohibited.

  4. Persons to whom an individual account is issued are responsible at all times for its proper use. Passwords are assigned to approved users and may not be shared or transferred to someone else. Passwords should be changed frequently. Users are cautioned not to leave a computer logged in and unattended in a public area or classroom.

Use resources legally and ethically

  1. Users should become aware of local, state, and federal laws governing certain aspects of computer and telecommunications use. Members of the College community are expected to respect these laws, as well as to observe and respect College rules and regulations. Users may not engage in unauthorized copying or distribution of software, graphics, text files, music or video, including peer-to-peer and file sharing (see IVCC Board Policy 4.16 Copyright). Users are prohibited from transmitting fraudulent, harassing, or obscene messages and /or other materials over the Internet or any other directly connected network on or off campus. Users must exercise respect for others who may be offended by content displayed on a computer monitor or laptop, whether college-owned or otherwise. Some content is expressly prohibited [See Administrative Procedure 5.4(d)].

  2. Prohibited unethical activities include, but not limited to, attempts to obscure the origin or content of a message or document; using College resources to promote personal financial gain of self or other individuals or entities; IVCC employee use of College resources to engage in political activities; activities that might damage the reputation of the College; and employee misrepresentation of personal opinion as the official position or viewpoints of the College.

  3. Incidental personal use of computing and network resources by employees (e.g. redirecting email to personal account; unsubscribing to listservs or commercial messages, etc.) is acceptable.

Understand related privacy and ownership issues

  1. Employees are expected to store work in network storage space. Files will be retained according to IVCC Record Retention Guidelines & Procedures.

  2. All contents of files located anywhere on the computer or network equipment owned or maintained by the College may be reviewed by the College, its agents and designees at any time for the purpose of investigating possible violations of Board Policy 5.4, or any alleged criminal violations. Users have no reasonable expectation of privacy with regard to any such search of contents of files located anywhere on the computer or network equipment owned or maintained by the College.

  3. An employee may make a request to have the ITS department access, retrieve, or move his or her own files from their networked account. With the exception of faculty-owned files, this action may also be initiated by the individual’s department head, provided the file is needed to carry out College business.

Conserve and protect resources

  1. Game playing, use of chat rooms, social networking sites, music, video and other graphic-intensive Internet sites that are not course-related consume needed bandwidth. Their use may be limited or curtailed at peak times by ITS. Employees are prohibited from accessing such sites that are not job-related during scheduled work hours.

  2. Users must not knowingly create, send or forward electronic chain letters, viruses, worms, or spam, or any other malicious software.

  3. All users contribute to the protection of campus computing resources. Users are responsible for reporting any observed gaps in system or network security to the College’s ITS Department.

Observed Violations and Enforcement

Observed violations of Board Policy 5.4 and/or its related administrative procedure [5.4(a), (b), (c), and (d)] should ultimately be reported to the Director of Information and Technology Services. Notification may originate from students through computer lab employees, faculty members, or administrative staff. If the case is an alleged student violation, the matter will be referred to the Associate Vice President for Student Services for consideration under the provisions of the Student Code of Conduct. If the case is an alleged IVCC employee violation, the matter will be referred to the Vice President for Business Services and Finance, the Director of Human Resources, or the individual’s immediate supervisor per the appropriate Administrative Procedure(s).

If, in the opinion of the Director of ITS, a violation is committed that is excessive or a blatant attempt to undermine the use of the Internet or IVCC computer resources, ITS reserves the right to disregard the warning process and immediately disable the user’s account.  The matter will then be turned over to Associate Vice President for Student Services (student violation) or the Vice President for Business Services and Finance (employee violation) for further action.

ITS will cooperate fully, upon the advice of College legal counsel, with any local, state, or federal officials investigating an alleged crime committed by an individual who has an account on the Illinois Valley Community College computer or networking system. The College will also cooperate with regulations enumerated in the Acceptable Use Policies of the Illinois Century Network (http://www.illinois.net/AUP.pdf).