Coker Policies and Procedures
POLICY ON USE OF COMPUTERS, SOFTWARE, AND COLLEGE NETWORKS
Responsibilities of the Information Technology office
Information Technology is responsible for:
- maintaining the campus network and College-owned computer equipment
- providing reasonable availability of and access to networked computers
- providing network connectivity for computers owned by those students who have paid a technology fee
- providing network connectivity for computers owned by employees, if such connectivity is feasible, and the equipment is to be used for College work
- providing access to the Internet
- censoring publicly available data—The College will not allow any device attached to its network to act as a server for illegal, morally or ethically objectionable, or pornographic information.
- providing reasonable protection against system infiltration by viruses and unauthorized users
- removing files from the network—reasons for removing files include, but are not limited to:
a. the user has exceeded his/her allotted space
b. the information endangers system integrity
c. the information is illegal or was obtained illegally
d. presence of the information is in violation of local, state, or federal laws
e. the information is inconsistent with the policies of Coker College
- exercising reasonable efforts in attempting to notify a user that his/her files will be removed from the network
Information Technology office is not responsible for:
- guaranteeing data against loss—If files are inadvertently lost or damaged, Information Technology will make reasonable efforts to mitigate the problem. However, the user is ultimately responsible for problems created by such errors. The user is encouraged to make multiple backups of critical files using personally owned backup media.
- providing a system that allows users to store confidential information—In the course of normal system maintenance, Information Technology personnel may have to view the contents of files. Unless the content of viewed files violates a law and/or College policy, Information Technology will maintain the confidentiality of the information.
- providing unlimited Internet bandwidth—Some applications involve the uploading or downloading of potentially massive amounts of data. Such data transfers monopolize the available bandwidth and restrict, and often make it impossible, for other users to use the Internet.
- censoring private data stored on the system—A user can assume that stored information will not be censored if the user has not violated College policies.
- supporting all type of computers and software—Information Technology supports equipment and software purchased with approval of the I.T. office.
- servicing your personally owned computer
- install personal software, printers, scanners, and other peripherals
Responsibilities of Users
A user is responsible for:
- actions taken using his/her login (user ID) and password—Users are expected to keep passwords secret and to logout when finished. Passwords should be reasonably cryptic and changed periodically. Also, a user who leaves his/her computer unattended while logged in is inviting misuse of his/her account.
- safeguarding his/her sensitive files—Data stored on removable storage can become inaccessible, even after months of problem-free use. It is highly recommended that important files be saved to at least two storage media.
- treating other users with consideration and respect
A user may not:
- attempt to bypass or violate network security mechanisms
- access, copy, alter, view, distribute, or destroy someone else’s data without the owner’s express permission
- harass or otherwise infringe upon the rights or well-being of others
- use College-owned equipment to display, print, or transmit sexually explicit pictures or text, except as required in controlled settings sanctioned by the College
- copy unregistered copyrighted material onto the network, use the network to send copyrighted material to others, or otherwise violate copyright regulations
- commit or attempt to commit illegal acts
Email and Passwords
Email addresses and passwords are assigned to individuals. Email addresses are considered public information.
Passwords are not to be shared. You are encouraged to change it frequently.
Access to and use of email is a privilege and should be treated as such by all users.
Campus computing resources, including email, may not be used for illegal or unauthorized purposes including:
- Destruction of or damage to equipment, software, or data belonging to others
- The disruption or unauthorized monitoring of electronic communications
Using email to participate in illegal acts is itself, illegal and may result in prosecution by state and federal authorities.
You are responsible for using system resources wisely. If you use the system in ways that are judged excessive or wasteful, your access to the system may be taken away, and you may be subject to college disciplinary procedures. Used carelessly, it can annoy other people and damage your reputation.
Some uses that may be deemed "wasteful" include chain letter emails, mass mailing of jokes, and mass mailing of items for sale or lost and found. Official mass emails should be submitted to faculty, staff, or students. If you have a message you feel is important to share with the entire campus, you may send it to the Information Technology department.
Documented violations will be evaluated by the Director of Information Technology, who may impose sanctions including, but not limited to, one of the following:
- verbal warning
- written warning and immediate two week suspension of user privileges
- written warning and immediate suspension of user privileges for the current and/or subsequent term
- written notification and permanent loss of user privileges
- referral to proper campus authorities for judicial action
Any action taken by the Information Technology office may be appealed through appropriate channels as provided in applicable College policy.