Home : acceptable use

Administrative procedure: Acceptable use of CCS information technology resources
(CCS Board Policy 7.30.05

1.0 Acceptable use of CCS IT resources

Community Colleges of Spokane (CCS) information technology (IT) resources are provided to support the instructional, support and administrative activities of the district. IT resources are intended for the sole use of faculty, staff, students and other authorized users. IT resource use will comply with CCS policies and procedures and state and federal laws. Use of IT resources does not confer a right to privacy in those resources. CCS reserves the right to monitor IT resources and take appropriate action to protect the integrity of the IT resources in accordance with laws, policies and procedures.

2.0   Acceptable and prohibited uses of IT resources

2.1
Information technology resources, owned or held by CCS and defined in Board Policy 7.30.05, are state property provided to enhance instructional, support and administrative activities. IT resources will be used only for legitimate student, instructional and support activities and administrative functions. IT resources use will be consistent with state Ethics in Public Service laws (Chapter 42.52 RCW and WAC 292.110.010) and policies and procedures of CCS, its institutions and departments. IT resources are to be used in accordance with Community and Technical College Network Acceptable Use Policy as well as the K20 Network Conditions of Use and Acceptable Use Policies (as referenced on the CCS Internet).

2.2
CCS supports the principles of intellectual freedom. CCS IT resources are provided to support and foster the CCS mission. CCS reserves the right to discontinue users' access if the use violates state or federal law or the policies or procedures of CCS, its institutions or departments.

2.3
Network and application logon accounts issued to individuals (users) are intended for the sole use of that user and are non-transferable. Account passwords for individual accounts are not to be shared with others. Passwords for shared accounts must only be used by college authorized users. The user is responsible for all known usage of his/her assigned account.

2.4
CCS IT resource users will not conceal or falsify their identity when using CCS IT resources.

2.5
CCS IT resources may not be used to violate or circumvent U.S. copyright laws (see Board Policy 7.50.20).

2.6
CCS IT resources shall not be used for commercial, illegal or political purposes. Examples of commercial use include, but are not limited to, advertising, selling or buying for personal gain or benefit. Examples of illegal activity include, but are not limited to, accessing or creating obscene material or material likely to contribute to a hostile environment. Examples of political use include, but are not limited to, opposing or supporting political candidates, issues or ballot measures.

2.7
The following types of activities are examples of CCS IT resources use that are unethical and unacceptable and in some cases may violate state or federal law.

  • Accessing another individual's account, private files, or e-mail without permission of the account user.
  • Misrepresenting one's identity in electronic communication.
  • Violating copyright and/or software agreements.
  • Violating rules or codes set by services subscribed to by CCS.
  • Using computing resources to threaten or harass others.
  • Using the CCS IT resources for noncollege work, including but not limited to commercial or profit-making purposes without written authorization from the administration.
  • Activities that are not CCS mission-related that unnecessarily use network bandwidth or storage, including but not limited to audio or video broadcasts and the downloading or sharing of data, music or videos.
  • Faculty and staff use of e-mail, the Internet or telephone for personal purposes beyond de minimus use as defined in WAC 292-110-010.
  • Lobbying or engaging in political activity in violation of RCW 42.17.190.
  • Violating lab and network system procedures and protocols (e.g., limits on workstation usage).
  • Intentionally and without authorization, crashing, accessing, altering, interfering with the operation of, or damaging or destroying all or part of any computer, computer system, computer network, computer software, computer program, or computer database of CCS or others.
  • Installing unauthorized network services (e.g., web servers, FTP servers, Telnet server)
  • Tampering with systems or files in an attempt to hide activities.
  • Attempting to circumvent, bypass or compromise security of CCS or others.
  • Intentionally using or installing hacker tools, viruses or system misconfigurations (e.g., Trojan horses, backdoors, viruses or exploit programs) to any CCS IT resource.
  • Intentionally or knowingly and without authorization, giving or publishing a password, identifying code, personal identification number or other confidential information about a computer, computer system, computer network or database.
  • Intentionally and with intent to defraud, accessing protected IT resources without authorization, or exceeding authorized access and by means of such access further fraud and obtains anything of value.
  • Downloading unsupported programs that impair the security and integrity of IT resources.
  • Discriminating or harassing on the basis of race, creed, color, age, sex or gender, religion, disability, or sexual orientation.

3.0 Monitoring and Implementation

3.1
CCS reserves the right to monitor use of IT resources in accordance with its policies and procedures. CCS does not guarantee that messages are private or secure, although CCS will make reasonable efforts to maintain the confidentiality of communications. Files, records, messages, and passwords will be disclosed when required by law. Electronic messages created or placed on CCS IT Resources are considered public records subject to disclosure in accordance with Washington public records law, chapter 42.56 RCW. Use of CCS IT resources for electronic messages is subject to the state ethics law, Chapter 42.52 RCW.

3.2
CCS will implement hardware and software technologies that monitor, prioritize, shape and/or control network bandwidth. Such tools will be used to ensure that IT resources are used effectively and efficiently to support the mission, policies and procedures of CCS.

4.0 Violations

Violation of the policies and procedures of CCS or its institutions could result in loss of access to IT resources. Student violation is subject to disciplinary action under the Code of Student Conduct. Violation by employees is subject to the appropriate discipline process up to and including dismissal, consistent with the provisions of the respective collective bargaining agreement or Chapter 357-40 WAC.