In support of Brevard Community College’s mission to provide accessible high quality education, the college provides information technology for use by its students, faculty and staff. All users are expected to conduct themselves in a manner that reflects respect for the rights of others and protects the integrity of data, equipment, software licenses and information technology. Use of the college’s computers and network must at all times be consistent with lawful and ethical behavior and in compliance with international, federal, state, and local law, the State Board of Education Rules for Community Colleges, and all other policies and procedures of the college. Access to the college’s information technology by faculty, staff, students, and community users is a privilege extended for the purpose of academic endeavors and other pursuits in support of and consistent with the educational objectives of Brevard Community College. Additionally, there is no expectation of privacy by employees, students, or others when using e-mail (Titan e-mail) or Internet communications when such communications occur over the BCC provided network, connection or equipment or other college provided information technology.
Students, faculty, and staff may be provided Internet access or other information technologies using an account assigned to them by the college. Students, faculty, and staff are responsible for any activity originating from their accounts which they can reasonably be expected to control. Accounts and passwords may not, under any circumstances, be used by persons other than those to whom they have been assigned by the account administrator. In cases when unauthorized use of accounts or resources is detected or suspected, the account owner should change the password and report the incident to the appropriate department or personnel. The college reserves the right to review any material on user accounts for purposes of maintaining security, server space, and compliance with acceptable use policies. The college may require users to limit or refrain from specific uses if such use interferes with the efficient operations of the college-wide system.
The college has no control over the information accessed through the Internet and is not responsible for the Internet's content. The Internet is an uncontrolled information resource with a highly diverse user population and should be used with discretion and in compliance with this Technology and Internet Ethics and Acceptable Use Policy (AUP). The college may deny use of its information technology to persons under the age of 15.
Successful participation in the use of the Internet and information technologies requires that its users regard it as a shared resource and that they conduct themselves in a responsible, ethical, and legal manner while using the network. Any use of Brevard Community College information technology for illegal, inappropriate, or obscene purposes, or in support of such activities, is prohibited. Engagement in such prohibited activities may result in suspension, termination or revocation of access to information technology, internet privileges, user account, or other sanctions as deemed appropriate.
Users must not utilize computing resources to gain unauthorized access to remote computers or networks to impair or damage the operations of Brevard Community College’s computers, networks, terminals or peripherals. This includes but is not limited to blocking communication lines, intercepting or sniffing communications, and running, installing, or sharing virus programs. Deliberate attempts to circumvent data protection or other security measures is prohibited and may be subject to other penalties and disciplinary action as set forth herein or within any other college policies or procedures.
The college recognizes that defining immoral or unethical uses of the Internet is highly subjective. The college also recognizes that BCC students may access sites as listed below in pursuit of academic projects. In such cases where use of information technology is questionable, the college may review such cases to determine compliance with this AUP.
Examples of illegal, immoral, or unethical uses of the college Internet computers include, but are not limited to:
Any student, faculty, staff, or community user who improperly utilizes or accesses BCC’S information technology (hardware and or software) and in the course of improper access or utilization causes any damage, loss of service or interruption of services due to willful or negligent behavior, may be liable for all direct and consequential damages resulting from such willful or negligent misuse.
Additionally, all students, faculty, staff, and community users must comply with federal and state laws, college rules and policies, and the terms of applicable contracts including software licenses while using the college’s information technology resources. Examples of applicable laws, rules and policies include the laws of libel, privacy, copyright, trademark, Florida Computer Crimes Act, the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, all other international, federal, state and local laws, including the Florida State Board of Education Rules for Community Colleges, and the college’s sexual harassment policy and student code of conduct. Users who engage in electronic communications with persons in other states or countries or on other systems or networks may also be subject to the laws of those jurisdictions and the rules and policies of those other systems and networks.
Any student, faculty, staff, or community user utilizing the printing function of any standalone or networked computer must comply with all departmental policies and procedures regarding such printing function. This includes, but may not be limited to, all limitations on the number of pages printed and or payment for the cost of such printing.
Current technology easily allows users to duplicate and distribute copyrighted video images, audio recordings and other digital materials. The receipt of, possession of, or distribution of copyrighted material without the permission of the copyright holder is prohibited and is in violation of the laws of the United States (Title 17, U.S. Code). Violators of copyright law could be subject to felony charges in state or federal court, and may also be sued by the copyright holder in civil court. Additionally, such improper use may be a violation of the BCC’s student code of conduct and may amount to actionable plagiarism. U.S. Copyright Act (Title 17, U.S.C.§§101-810) prohibits the unauthorized reproduction or distribution of copyrighted materials, except as permitted by the principles of "fair use.” Users are responsible for any consequences of copyright infringement and the college disclaims any liability or responsibility resulting from such use.
All software loaded on campus computers must be licensed by the college. Faculty, staff, students, and community users are prohibited from downloading software to individual campus computers or servers; if found, unlicensed software will be removed, and access to campus computing resources may be suspended and/or terminated.
The Digital Millennium Copyright Act of 1998 requires the college to file with the Copyright Office a designation of an agent to receive notifications of claimed infringement. The college’s agent is listed at http://www.copyright.gov/onlinesp/list.
For purposes of this document, e-mail and Titan e-mail includes point-to-point messages, listserves, and any electronic messaging involving computers and computer networks. BCC Titan e-mail is the official email account for students. Students are responsible for accessing their Titan e-mail accounts and retrieving all communications sent to the students from the college.
The college has adopted Titan e-mail protocol and procedures which are routinely outlined in student publications. The use of the BCC provided Course Management System’s (i.e. BlackBoard) communication tools, also requires adherence to all protocols and procedures for the use of Imail. Organizational e-mail accounts, including those used by student organizations, are held to the same standards as those for individual use by other students, faculty, or staff. E-mail is also generally subject to the Florida Public Records Law to the same extent as it would be on paper.
Examples of inappropriate and unacceptable uses of e-mail and Imail may include but are not limited to:
College provided informational resources are not to be used by anyone for commercial purposes or for personal financial or other gain. Occasional personal use of college information technology resources for other purposes is permitted when it does not consume a significant amount of those resources, does not interfere with the performance of the faculty or staff’s job, and is otherwise in compliance with this policy. Further limits may be imposed upon personal use in accordance with normal supervisory procedures concerning the use of college equipment.
In the interest of protecting free speech and privacy regarding academic freedom and responsibility, the college does not routinely monitor an individual's use of the college’s information technologies. However, the college employs various measures to protect the security of its information technology resources and its users’ accounts. Users should be aware that the college does not provide security and confidentiality when using its computer technology. Users should therefore engage in "safe computing" practices by establishing appropriate access restrictions for their accounts, guarding their passwords and routinely changing all passwords. The normal operation and maintenance of the college’s computing resources require the backup and caching of data and monitoring usage patterns. The college may also monitor the activity and accounts of specific users in the event of a complaint relating to this policy or possible security breach.
Access to certain college systems requires the use of usernames and passwords. Many of these systems require the user to periodically change passwords.
Security of student and financial records on BCC systems is a highly regulated environment. All users must adhere to the following rules to maintain the security of records and to ensure an accurate audit trail:
Technology and Internet ethics and acceptable use policies and procedures will be implemented as follows:
In order to insure that the policies and procedures regarding the use of technology and the Internet by faculty, staff, students, and community users represent a contemporary application of this technology, and to accommodate the change process, the college’s Information Technology Committee will review this AUP annually.