- About JCC Menu
- Mission & Vision
- Quick Facts
- College Directory
- College Administration
- College Departments
- Academic Advisement
- Continuing Education
- Learning Skills
- TRIO Student Support Services
- Student Records
- Title IX
- Zoo Technology
- Higher Education Center
- Lab Sciences
- Board of Trustees
- Foundation Board of Directors
- Board of Legislators
- Employment Resources
- Maps and Directions
- Applications and Forms
Users of the Jefferson Community College network have a responsibility to properly use and protect the information resources and to follow all federal, state and local and other applicable law as well as all generally applicable College rules and policies and all applicable contracts and licenses including the policies of networks contracted for College use, such as Internet and distance learning networks. This policy provides guidelines for the appropriate use of the networks provided by and contracted with the College both on- and off-campus.
STATEMENT OF POLICY:
- Access to the campus-wide, wireless and contracted networks, is a privilege provided at the discretion of the College and as such may be revoked.
- The general right of privacy should be extended to the extent possible in the electronic environment. Jefferson Community College and all electronic users should treat electronically stored information in individual files as confidential and private.
- The College does not routinely monitor computer, Internet or network activities or content but users should not assume or expect any right of privacy with respect to the College’s IT resources.. There is an acknowledged trade-off between the right of privacy of a user and the need of system administrators to gather necessary information to ensure the continued functioning of these resources.
- The use of college computer resources for private business or commercial activities (except where such activities are otherwise permitted or authorized under applicable college policies), fundraising, or advertising on behalf of non-college organizations, or reselling the College's name, are prohibited.
- Unlawful communications, as defined by law, are prohibited.
- The campus network is a shared resource; therefore, excessive non-academic use of network resources which inhibit usage by another person is prohibited.
- At no time shall anyone attach an unauthorized device to the campus network. These include, but are not limited to, unauthorized access points, wireless routers, and network detection appliances. Any unauthorized equipment will be considered rogue and will be shut down immediately and removed from the network.
- The College provides separate access to the Internet through a wireless network and users of the wireless network are responsible for their appropriate use and by their use agree to comply with all applicable policies, regulations, and laws, as well as the acceptable use policies of affiliated networks and systems.
- Any use of the campus-wide network which results in plagiarism, copyright infringement or any other violation of academic regulations is prohibited.
- All uses of the campus-wide network which harass, annoy, intimidate or otherwise inconvenience users are prohibited.
- Use of the network to misrepresent or conceal one’s identity is prohibited.
- Attempts to circumvent network access restrictions are prohibited.
- Attempts to gain unauthorized access or to circumvent network security are prohibited.
- The Federal Digital Millennium Copyright Act will be strictly enforced.
- Attempts to operate any type of unauthorized servers (e.g., DHCP, web, mail, Quake, etc.) is prohibited.
- The Board of Trustees hereby authorizes the President, or his/her designee, to develop and establish appropriate standards and procedures to implement and enforce this policy.
Infrastructure: The hardware and supporting software, such as cabling, routers, servers, and other equipment that makes up the physical aspect of the campus-wide network.
Campus-wide network: The interconnecting of computers and the infrastructure to provide resources such as software applications, email, Internet access, phones, shared disk space, cable television, etc. to the users.
Telecommunications: The exchange of information by electronic means.
Network Security: Protection of the network infrastructure, equipment, software and information that is sent and stored on the network, through the use of technology, procedures, and training.