*DMACC Technology Usage Policy*


DMACC Technology Usage Policy   

Technology resources and usage may be described as all College-owned print and electronic media and services including, but not limited to: computers, printers, modems, email communications, DMACC web content, wireless connections and fax transmissions. Personal equipment connected to the DMACC network is also subject to this procedure.   

As a public learning institution financed and supported by public funds, it is incumbent upon the College to ensure that its technology resources are responsibly and effectively maintained and used by all persons affiliated with DMACC. Such persons include credit and noncredit DMACC students, faculty, staff, student employees, alumni, DMACC Pioneers, and guests at the institution who will be referred to throughout this procedure as DMACC technology users—or simply “Users.”   

Students are provided 2 GB of network storage space on a designated P Drive. Students' efforts to comply with this limit will benefit all network users. Accounts that exceed this limit will be contacted by the network administrator and will be asked to take steps to return to the 2 GB limit. Accounts that are not returned to 2 GB by the stated date are subject to possible removal of data at the discretion of the network administrator.  
 

STATEMENT OF GENERAL EXPECTATIONS   

All DMACC technology users must abide by applicable federal and state laws and regulations regarding technology usage, as well as existing College policies and procedures. Paramount to DMACC’s mission as an institution of higher learning, DMACC values academic freedom and academic achievement. DMACC promotes openness to new ideas, sensitivity to multicultural issues, and unlimited access to a wide range of information and ideological perspectives. The College values the free flow of information and does not condone censorship.   


INDIVIDUAL RESPONSIBILITIES   

Technology resources users are expected to:   A. Use technology in a manner consistent with Federal, State and Local laws.   

  1. Support an educational environment free from harassment and discrimination as described in institutional Harassment and Discrimination procedures (HR 3005 and 3010; ES 4645).   
  2. Use technology resources appropriately so as to not interfere with the educational mission of the institution or the daily business of the College.   
  3. Be aware of and employ security practices to prevent unauthorized access to their computers, accounts and/or personal identification numbers (PIN). This would include logging off from the computer following usage, avoiding sharing PIN and other passwords, and using insecure methods for sharing, storing or transferring information.   
  4. Use technology resources consistent with other institutional policies.   F.           Assist in maintaining and enhancing the integrity of DMACC technology resources by taking measures to support the security and privacy of computer networks.   

G.            Report any systems interference, technological performance problem, or damage to equipment to the Help Desk or the computer lab supervisor on duty.   


PROHIBITED CONDUCT   

  1. Disrupting access of students, faculty or staff members to technological resources.   
  2. Obtaining and/or gaining unauthorized access to College computer systems or an account belonging to another individual.   
  3. Using technological equipment to interfere with the lawful rights of others by such activities as falsifying or altering records or software, creating fraudulent documents, damaging programs belonging to the College or another individual.   
  4. Sending harassing, threatening material or information to another individual.   
  5. Violating license agreements, copyrights or intellectual property rights including copyright, patents, etc., by copying, distributing or publishing intellectual property.   
  6. Permitting other persons—whether DMACC users or unauthorized users—to use a DMACC user’s accounts, passwords or access codes. G.       Theft of DMACC hardware or software.   

H.            Inappropriate or malicious use of technology resources including attempts to alter, erase, damage or intercept technological data or programs that are the property of DMACC or DMACC users.

   

SECURITY AND PRIVACY  

Security of technology resources is of the utmost importance—all users are expected to cooperate in maintaining and enhancing the integrity of these resources. The College reserves the right to inspect or monitor technology resources under its control, and to take appropriate action when there is reason to believe that a user has violated established policies. Every effort shall be made to protect the Constitutional rights of all DMACC technology users.   

The College does not endorse the casual review of electronic communication and storage. However, users should be aware that their uses of DMACC information technology shall have no guarantee of privacy. Technology resources are considered property of the College and DMACC may initiate inspections or monitoring of information resources if it is deemed to be in the best interest of the College. DMACC may also be required to initiate inspections or monitoring if subject to subpoena or other legal requirements.   


PERSONAL USE OF DMACC TECHNOLOGY   

Personal use of DMACC technology by all DMACC technology users must be viewed in the context of the College’s academic mission. Usage preference shall be granted to users who are engaged in academic or work-related activity (as opposed to recreational usage) and should adhere to the following guidelines:   A. Users engage in no activity that harms the performance of technology, damages or defaces equipment, or knowingly exceeds the design parameters of the equipment, building or work facility.   

B. Priority in student computer labs is given to users for the completion of academic activities.   


ENFORCEMENT OF TECHNOLOGY USAGE POLICY  

  1. Interim Response: DMACC Information Technology personnel may temporarily disable an account or service to an individual when there is reason to believe an alleged violation of the Technology Usage Policy is believed to have occurred. This may happen when one of the alleged violations:   
    1. Violates Federal, State or Local law;   
    2. Could result in damage or interference with official College business; and/or   
    3. Could result in liability for the College.   
  2. Disciplinary Action: A student who is believed to have violated the Technology Usage Policy may be charged with a violation of the Student Conduct Code according to the Student Conduct, Discipline and Appeals Procedure, ES 4630.   
100% helpful - 2 reviews

Details

Article ID: 10854
Created
Tue 11/1/22 11:30 AM
Modified
Tue 11/1/22 11:31 AM