Computer Usage Policy

Purpose:  Cloud County Community College owns and operates a variety of computing systems which are provided for the use of CCCC students, faculty, and staff in support of the programs of the College and are to be used for education, research, academic development, and public service only.  Commercial uses are specifically excluded.   All students, faculty, and staff are responsible for  seeing  that  these  computing  facilities  are  used  in  an  effective,  efficient,  ethical  and  lawful manner.
Unacceptable  use  of  the  system  is  prohibited,  and  is  grounds  for  loss  of  privileges,  as  well  as discipline or legal sanctions under Federal, State, and Local laws.
User Agreement:    All  users  of  CCCC  computing  systems  must  read,  understand,  and  comply with the policies outlined in this document, as well as any additional guidelines established by the administrators of each system.  Such guidelines will be reviewed by the Administration and will become  subject  to  Board  approval  as  a  campus  policy  or  procedure.    By  using  any  of  these systems, users agree that they will comply with these policies.
Rights:   These  computer  systems,  facilities,  and  accounts  are  owned  and  operated  by  CCCC.  CCCC  reserves  all  rights,  including    the  right  to  terminate  without  notice,  the  computing resources which it owns and operates. These procedures shall not be construed as a waiver of any rights of CCCC, nor shall they conflict with applicable acts of law.  Users have rights that may be protected by Federal, State, and Local laws.
Privileges:  Access and privileges on CCCC computing systems are assigned and managed by the network  Administrators  of  the  systems.    Eligible  individuals  may  become  authorized  users  of  a system  and  be  granted  appropriate  access  and  privileges  by  following  the  approval  steps prescribed by CCCC.
Users may not, under any circumstances, transfer or confer these privileges to other individuals.  Any  account  assigned  to  an  individual  shall  not  be  used  by  others.    The  authorized  user  is responsible for the proper use of the system, including password protection.
Responsibilities: Users are responsible for maintaining the following:   
*  An environment conducive to learning:    A  user  who  uses  the  computing  systems  at  CCCC  to harass, or make defamatory remarks, shall bear full responsibility for his or her actions.  Further, by  using  these  systems,  users  agree  that  individuals  who  transmit  such  remarks  shall  bear  sole responsibility for their actions.  Users agree that CCCC’s role in managing these systems is only as an information carrier, and that they will never consider transmission through  these systems as an endorsement of said transmission by CCCC.
Many  of  the  CCCC  computing  systems  provide  access  to  outside  networks,  both  public  and private,  which  furnish  electronic  mail,  information  services,  bulletin  boards,  conferences,  etc.  Users  are  advised  that  they  may  encounter  material  which  may  be  considered  offensive  or objectionable  in  nature  or  content.    Users  are  further  advised  that  CCCC  does  not  assume responsibility for the contents of any of these outside networks.
The user agrees to comply with the acceptable use guidelines for whichever outside networks or services they may access through CCCC systems.
Further, the user agrees to follow proper etiquette on outside networks.  The user agrees never to attempt  to  transmit,  or  cause  to  be  transmitted,  any  message  in  which  the  origination  is deliberately misleading (except for those outside services which may conceal identities as part of the service).
The user agrees that, in the unlikely event that someone does transmit, or cause to be transmitted, a  message  that  is  inconsistent  with  an  environment  conducive  to  learning  or  with  a  misleading origination,  the  person  who  performed  the  transmission  will  be  solely  accountable  for  the message, not CCCC, which is acting solely as the information carrier.
*An environment free of illegal or malicious acts:    The  user  agrees  never  to  use  a  system  to perform an illegal or malicious act.  Any attempt to increase the level of access to which (s)he is authorized, or any attempt to deprive other authorized users of resources or access to any CCCC computer system shall be regarded as malicious, and may be treated as an illegal act.
*A secure environment:  Any user who finds a possible security lapse on any system is obliged to report it to the system administrators.
Knowledge  of  passwords  or  of  loopholes  in  computer  security  systems  shall  not  be  used  to damage  computing  resources,  obtain  extra  resources,  take  resources  from  another  user,  gain unauthorized access to resources or otherwise make use of computing resources for which proper authorization has not been given.
Accounts:  The individual is responsible for the proper use of their account.
Confidentiality:  Programs and files are confidential unless they have been made available, with written  permission,  to  other  authorized  individuals.    CCCC  reserves  the  right  to  access  all information on CCCC computers.  File owners will be notified of file maintenance, in advance, if such notice is practical.  If policy violations are discovered, they will be reported immediately to the appropriate systems administrator.
System  usage:   Electronic  communications  facilities  (such  as  e-mail)  are  for  college  related activities only.  Fraudulent, harassing, or obscene messages and/or materials are not to be sent or stored.
System performance:    No  one  should  deliberately  attempt  to  degrade  the  performance  of  a computer  system  or  to  deprive  authorized  personnel  of  resources  or  access  to  any  college computer system.
Unauthorized  access:    Loopholes  in  computer  security  systems  or  knowledge  of  special passwords  should  not  be  used  to  damage  the  computer  system,  obtain  extra  resources,  take resources  from  another  user,  gain  access  to  systems  or  use  systems  for  which  proper authorization has not been given.
Copyright:  Computer software protected by copyright is not to be copied from, into or by using campus computing facilities, except as permitted by law or by the contract with the owner of the copyright.    This  means  that  such  computer  and  microcomputer  software  may  only  be  copied  in order  to  make  back-up  copies,  if  permitted  by  the  copyright  owner.    The  number  of  copies  and distribution  of  copies  may  not  be  done  in  such  a  way  that  the  number  of  simultaneous  users exceeds the number of original copies purchased.
Violations:   An  individual’s  computer  use  privileges  may  be  suspended  immediately  upon  the discovery of a  possible  violation of the  policies.   Such suspected violations will be confidentially reported to the appropriate system administrator.
Violations  of  these  policies  will  be  dealt  with  in  the  same  manner  as  violations  of  other  College policies  and  may  result  in  disciplinary  review.    In  such  a  review,  the  full  range  of  disciplinary sanctions  is  available  including  the  loss  of  computer  use  privileges,  dismissal  from  the  College, and legal action.  Violations of some of the above policies may constitute a criminal offense.
Additional  Guidelines:    System  administrators  will  establish  more  detailed  guidelines,  as needed, for specific computer systems and networks.   These  guidelines will cover such issues as allowable connect time and disk space, handling of unretrieveable mail, responsibility for account approval and other items related to administering the system.
Legal mandate:   The following  is a statement regarding this system that is  mandated, or may soon  be  mandated,  by  Federal  and  State  law.    In  some  cases,  local  policy  is  also  promulgated.  This policy and procedure shall not be construed as a waiver of any rights of CCCC.
Two accounts on this system have the ability to read your mail:  your own account and the system administrator account.  While reasonable attempts have been made to ensure the privacy of your accounts and your electronic mail, this is no guarantee that your accounts or your electronic mail is private.  The systems are not secure, nor are they connected to a secure network.

Email Policy

Cloud County Community College
Electronic Mail Policy and Procedures
Eligibility to Use Cloud County E-Mail Services
Purpose: Electronic mail services are to be provided by Cloud County Department of Information Technology in support of the teaching, research, and public service mission of the College, and the administrative functions that support this mission.
Users: Users of College electronic mail will be limited to faculty and staff employed by the College.
New employees of the College will obtain an electronic mail address upon the completion of the Dept. of Information Technology Information Card given during new employee orientation.
E-Mail Services Following End of Employment
Upon termination of employment, a user will be given a 30-day grace period in which all electronic mail will be forwarded to a third party account of the users choice. After the 30-day grace period all electronic mail will be disregarded. Exceptions will be made on a per employee basis by Human Resources, Academic Affairs, Community Education and the IT Department. Those exceptions will be based upon the terms on which the user ended employment or whether the employee is still performing task he/she was assigned.
Electronic Mail Restrictions
Each user’s mailbox will have the following send, receive and storage limits imposed upon them.
Storage Limits *
  Issue Warning at 90,000 KB (approx 90 MB)
  Prohibit Send at 95,000 KB (approx 95 MB)
  Prohibit Send & Receive at 100,000 KB (approx 100 MB)
Send & Receive Limits
  Max Sending Message Size is 10,240 KB (approx 10 MB)
  Max Receiving Message Size is 10,240 KB (approx 10 MB)
  Max Number of Recipients is 5000
* The need for larger storage limits will be reviewed on a case by case basis
Abuse of storage limit policies will result in the user’s mailbox being considered ‘closed’.
The use of backgrounds, gifs, and jpegs on e-mails and signatures will be strictly prohibited.
Electronic Mail Backup and Maintenance
Electronic mail will follow the backup and maintenance schedules set forth in the “Backup and Maintenance Policy”.  
Maintenance Interval
  Run Daily from 1:00 AM to 5:00 AM
Mailbox Management Process
  Run Sunday at Midnight

Wireless Policy

Cloud County Community College
Wireless Communication Policy

Built on a foundation of bringing new technologies to the college community, the Information Technology department has deployed a wireless network infrastructure. This infrastructure is the property of the Cloud County Community College and its operation is overseen by the Information Technology department. The purpose of the wireless network is to facilitate teaching, learning, communication, and other business of the college.
Abuse of the wireless network is a violation of acceptable use. All users of the wireless network must abide by existing Cloud County policies and state and federal laws. The IT department reserves the right to refuse wireless connectivity to any client with due cause.

Authority, Standards, & Access
Cloud County Community College Information Technology Department will be the sole provider of design, specification, installation, operation, maintenance, and management services for all wireless access points. Any unauthorized access points will immediately be removed from the network. All access points must adhere to the security standards set forth by the IT department.

Access to the wireless network is allowed to all faculty, staff, students, and authorized visitors. To gain access to the wireless network the wireless device must be registered with the IT department. All WLAN transmissions use an encryption protocol.

Privacy & Accountability
Even with strict encryption and authentication standards the IT department recognizes that no form of wireless communication can nor should be considered ‘secure’. It is recommended that users of the wireless network do not access sensitive or vital information which may include social security number and/or credit card numbers. Users of the wireless network assume full accountability for their actions.