Student Use Policy

Acceptable Use of Technology Services for Students

1. Statement of Purpose

This guideline outlines the conditions under which Southeastern Community College’s (SCC) computer and network resources may be used. SCC’s computing and network resources are the sole property of SCC. Access to computers and network resources is granted for academic purposes only and is a privilege, not a right.

2. Users Governed

This guideline applies to all person(s) using SCC equipment.

3. Resources Covered

This guideline governs the use of all computer and network resources, at all SCC facilities, and includes but is not limited to:

  • Networks
  • Internet (www, file sharing, bulletin boards, etc.)
  • Online computer storage space
  • Email
  • Stand alone computers
  • Networked computers
  • Connecting resources

4. Access as a Privilege

The use of SCC computers and network resources is a privilege, not a right. Any inappropriate use of said resources can result in the cancellation of those privileges. Examples of prohibited uses are listed below in section eight of this guideline and are strictly enforced unless otherwise authorized.

5. Responsibility of Users

The user bears the primary responsibility for the material that he or she chooses to access, send, or display. Respect the rights of others by complying with all college polices, guidelines, and procedures. It shall be each user’s personal responsibility to recognize (attribute) and honor the intellectual property of others. SCC recognizes and adheres to U.S. and international copyright laws, software licenses, and intellectual property rights associated with both print and non-print materials.

Use only computer IDs or accounts and communications facilities that you are authorized to use and use them for the purposes for which they were intended. Do not let others use your user name or password. It is the responsibility of the user to logoff of computer to ensure that their account is not used by other individuals.

Each account owner and computer user is solely responsible for the usage incurred through his or her account or computer. Individuals, who intentionally misuse account privileges, degrade system performance, misappropriate, or interfere with the operation of computers and network resources, including but not limited to those available at SCC, may be subject to disciplinary actions outlined in the SCC Judicial Codes and Appeals and any applicable federal, state, and local laws.

6. Priority of Uses

Please limit your time at the computers to one hour when there are other students waiting. If you are not doing work specifically for class, you may be asked to yield your spot to those who have class assignments to complete.
A. First Priority use is for scheduled classes and workshops.
B. Second Priority use is for students doing assignments required for classes.
C. Third Priority use is for educational uses such as exploration of the Internet and e-mail.

7. Security and Privacy of Users

Confidentiality of email and other network transmissions is not guaranteed. Therefore all users should exercise caution when sending personal, confidential, or sensitive information by email or over the network. Southeastern Community College will not impose any undue restraints on communications other than those imposed by applicable Federal, State, or local laws, including laws regarding the right to privacy and laws which prohibit defamatory material or copyright infringement. Users of Southeastern Community College’s computers and network resources are advised that their communications are subject to such laws and that the consequences of violations can be severe.

A. Routine Logging and Monitoring

Certain central service and network activities from computers connected to the SCC network are routinely logged and monitored. These activities include, but are not limited to:
1. Use of passwords and accounts accessed.
2. Time and duration of network activity.
3. Access to Web pages.
4. Access to network resources.
5. Volume of data storage and transfers.
6. Server space used for e-mail and other files.

B. Detailed Session Logging

In cases of suspected violations of SCC policies and guidelines, especially unauthorized access to computing systems, the system administrator may authorize detailed session logging. This may involve a complete keystroke log and screen recordings of an entire session. In addition, the system administrator of the facility concerned may authorize searching of user files to gather evidence of a suspected violation.

8. Examples of Prohibited Use

  • Reproducing, distributing or displaying copyrighted materials without prior permission of the owner, including text, images, videos, music, movies, etc.
  • Using or sharing a computer account, password, IP address, computer name or port you are not assigned or authorized to use.
  • Deliberately wasting computing resources.
  • Using e-resources to harass others, send chain and junk mail (spam), disseminate mass mail without permission, or harmful or destructive email(s).
  • Using e-resources such as email, Facebook, chat, Myspace, Twitter, etc. to harass, slander, misrepresent, or defraud is prohibited.
  • Using the campus network to gain unauthorized access to any computer systems.
  • Running a port scan on a computer system without prior permission of the owner.
  • Performing an act that interferes with the normal operation of any IT resources. For example, tampering with switch settings, move, reconfigure or do anything that could damage computers or server components.
  • Knowingly running or installing, or giving to another user, a program intended to damage or to place files on another users’ account/system without their knowledge.
  • Attempting to circumvent data protection schemes or uncover security loopholes.
  • Violating terms of applicable software licensing agreements or copyright laws.
  • Masking the identity of an account or machine.
  • Attempting to monitor or tamper with another user’s electronic communications, or reading, copying, changing, or deleting another user’s files or software without the explicit permission of the owner.
  • Using campus IT resources for personal gain, including running a business for profit or non-profit purposes, promoting and selling products and services, etc.
  • Providing services or accounts from your computer to anyone but yourself, e.g., web servers, FTP servers. Providing a pass-through site to other campus hosts. Providing remote log in (e.g. telnet access) on your computer for anyone other than yourself.
  • Registering a SCC IP address with any other domain name.
  • Capturing passwords or data on the network not meant for you.
  • Posting materials that violate existing Federal, State, or local laws or Southeastern Community College’s Judicial Codes and Appeals.
  • Modifying or extending SCC network services beyond the area of intended use. This applies to all network wiring, wireless, hardware and in-room jacks.
  • Minimizing destructive hacking by not providing information about the networks to Newsfeeds, Anonymous FTP site, BBS, UUCP site, etc.
  • Create, disseminate or run a self-replicating program “virus” whether destructive or not.
  • Intentionally access, download, or print obscene or illegal material.

9. Due Process

Activities which are criminal under federal, state, or local law, will be reported to the appropriate authorities. Criminal and non-criminal abuses of computer access and network privileges may result in a warning, suspension, or termination of computer and network resources.

The faculty or staff supervising the use of computer and network resources has the responsibility for insuring student adherence to this guideline. The supervising employee may issue a warning to users as they may be prone to mistakes, especially while learning new software. Warnings should be considered as a guide to users to assist them in the correct use of SCC’s computer and network resources.

Serious or repeated infractions of the college’s guideline may be referred to the appropriate Dean/Vice President for action under the college’s Judicial Codes and Appeals. Actions taken against offenders may include any sanctions listed in the Judicial Codes and Appeals including suspension or termination of computer and network privileges.

10. Disclaimer

SCC shall not be held responsible for any illegal, negligent, or harmful actions as a result of inappropriate use of college internet, email, or network resources. In addition, SCC is not responsible for content downloaded from external web sites and networks.

SCC will not be responsible for any damages or loss of data experienced by those using computing equipment, facilities and network services.

Information Technology Services, library and lab employees will provide troubleshooting assistance to users who experience technical issues on Southeastern Community College equipment and services only; instruction in the use of computers or particular software applications is not their responsibility.