Technology Usage Policy

This policy outlines the appropriate use of Southeastern Community College's technical resources. It is applicable to all individuals, including credit and non-credit students, employees, alumni and guests of SCC. Additionally, personally owned devices connected to SCC's technologies and network are also subject to the following guidelines.

Resources Covered

This policy governs the use of technical resources, at all SCC facilities, and includes, but not limited to:

  • Computers
  • Digital Media
  • Email
  • Hardware
  • Networks
  • Printers
  • SCC Web site and associated pages
  • Social Media
  • Software, Storage and Applications
  • Telephony
Access as a Privilege

Access to computers and network resources is granted for academic purposes only. The use of SCC technologies is a privilege, not a right. Any inappropriate use of said technologies can result in the loss of those privileges. 

Responsibility of Users

Technology users must abide by federal, state and local laws as well as College guidelines. The user bears the primary responsibility for the communication/information that he or she chooses to access, send, or display. The user shall respect the rights of others by complying with all college polices, guidelines, and procedures. It shall be each user’s personal responsibility to recognize (attribute) and honor the intellectual property of others. SCC recognizes and adheres to U.S. and international copyright laws and software licenses.

The faculty or staff supervising the use of technical and network resources has the authority to enforce student adherence to this guideline. The supervising employee may issue a warning to users. This warning should be considered as a guide to users to assist them in the correct use of SCC’s technical and network resources.

Academic freedom is paramount to SCC’s mission as an institution of higher learning, SCC promotes openness to new ideas, sensitivity to multicultural issues and unlimited access to a wide range of information and ideological perspectives.

Priority of Uses

Please limit your time at the computers to one hour when there are other students waiting. If you are not doing work specifically for class, you may be asked to yield your spot to those who have class assignments to complete.

1. First Priority use is for scheduled classes and workshops.
2. Second Priority use is for students doing assignments required for classes.
3. Third Priority use is for educational uses such as exploration of the Internet and e-mail.

Security and Privacy of Users

Confidentiality of technical communications is not guaranteed. Therefore, all users should exercise 
caution when accessing or sending personal, confidential or sensitive information. Southeastern 
Community College will not impose any undue restraints on communications other than those imposed by applicable federal, state, or local laws, including laws regarding the right to privacy and laws which prohibit defamatory material or copyright infringement. 

SCC values the confidentiality of information and does not monitor individual communication without reasonable cause. (e.g. security awareness program, security incidents) Be advised, an Iowa Open Records Law request may require SCC to access specific public data on a College owned computer or POD connected to the wired or wireless network. These activities include, but are not limited to:

  • Use of passwords and accounts created
  • Time and duration of network activity
  • Access to Web pages
  • Access to network resources
  • Volume of data storage and transfers
  • Server space used for email and other files
Examples of Prohibited Use

The following are examples of prohibited use of SCC's technical resources:

  • Reproducing, distributing or displaying copyrighted materials without prior permission of the owner, including text, images, videos, music, movies, etc.
  • Using or sharing a computer account, password, IP address, computer name or port you are not assigned or authorized to use.
  • Deliberately wasting computing resources.
  • Using e-resources to harass others, send chain and junk mail (spam), disseminate mass mail without permission, or harmful or destructive email(s).
  • Using e-resources such as email, Facebook, Instagram, Twitter, etc. to harass, slander, misrepresent, or defraud is prohibited.
  • Using the campus network to gain unauthorized access to any computer systems.
  • Running a port scan on a computer system without prior permission of the owner.
  • Performing an act that interferes with the normal operation of any IT resources. For example, tampering with switch settings, move, reconfigure or do anything that could damage computers or server components.
  • Knowingly running or installing, or giving to another user, a program intended to damage or to place files on another users’ account/system without their knowledge.
  • Attempting to circumvent data protection schemes or uncover security loopholes.
  • Violating terms of applicable software licensing agreements or copyright laws.
  • Masking the identity of an account or machine.
  • Attempting to monitor or tamper with another user’s electronic communications, or reading, copying, changing, or deleting another user’s files or software without the explicit permission of the owner.
  • Using campus IT resources for personal gain, including running a business for profit or non-profit purposes, promoting and selling products and services, etc.
  • Providing services or accounts from your computer to anyone but yourself, e.g., web servers, FTP servers.
  • Providing a pass-through site to other campus hosts. Providing remote log in (e.g. telnet access) on your computer for anyone other than yourself.
  • Registering a SCC IP address with any other domain name.
  • Capturing passwords or data on the network not meant for you.
  • Posting materials that violate existing Federal, State, or local laws or Southeastern Community College’s Judicial Codes and Appeals.
  • Modifying or extending SCC network services beyond the area of intended use. This applies to all network wiring, wireless, hardware and in-room jacks.
  • Minimizing destructive hacking by not providing information about the networks to News feeds, Anonymous FTP site, BBS, UUCP site, etc.
  • Create, disseminate or run a self-replicating program “virus” whether destructive or not.
  • Intentionally access, download, or print obscene or illegal material.
Due Process

Activities which are criminal under federal, state, or local law will be reported to the appropriate 
authorities. Criminal and non-criminal abuses of computer access and network privileges may result in a warning, suspension, or termination of computer and network resources.

The faculty or staff supervising the use of computer and network resources have the responsibility to insure student adherence to this guideline. The supervising employee may issue a warning to users as they may be prone to mistakes, especially while learning new software. Warnings should be considered as a guide to users to assist them in the correct use of SCC’s computer and network resources. 

Serious or repeated infractions of this guideline may be referred to the appropriate Dean/Vice President for action under the College’s Judicial Codes and Appeals. Actions taken against students may include any sanctions listed in the Judicial Codes and Appeals including suspension or termination of computer and network privileges as well as possible expulsion from the College.


SCC shall not be held responsible for any illegal, negligent, or harmful actions as a result of inappropriate use of college internet, email, or network resources. In addition, SCC is not responsible for content downloaded from external web sites and networks.

SCC will not be responsible for any damages or loss of data experienced by those using computing equipment, facilities and network services.

Information Technology Services will provide troubleshooting assistance to users who experience technical issues on Southeastern Community College equipment and services only; instruction in the use of computers or particular software applications is not their responsibility.