OCC Board Policy

Appropriate Use of Information Technology Resources and Associated Procedure (3.8.2)

DIVISION III      BUSINESS SERVICES

3.8    INFORMATION TECHNOLOGIES

3.8.2    POLICY- Appropriate Use of Information Technology Resources

Information technology resources (computers, voice and data networks, electronic data and information) are provided by Oakland Community College to its faculty, administration, and students in support of the college mission. Users of the information technology resources will abide by applicable Federal and State laws and the college's regulations (Technology Appropriate Use Regulations) governing the use of these resources, and will use them in support of activities directly related to duties and assignments.

Public Act: Federal Copyright Law Title 17, Paragraph 117 (revised 7/1/85). Federal Computer Fraud Abuse Act Federal Electronic Commission Privacy Act. Michigan Computer Law, Section 174 of P.A. 328, 1931, as amended.

Approved: 1/26/89
Revised:   4/21/03

3.8.2    PROCEDURE- Appropriate Use of Information Technology Resources

Information technology resources (computers, voice and data networks, electronic data and information) are provided by Oakland Community College to its faculty, administration, and students in support of the college mission. This document outlines the appropriate use of college information technology resources. More detail may be found in the Technology Appropriate Use Regulations.

  1. ACCESS TO COMPUTER SYSTEMS AND NETWORKS

    College employees may receive user accounts based on the requirements of their job. Students enrolling in courses which require user accounts are provided them for the terms enrolled in those courses.

  2. STANDARDS OF CONDUCT

    Users of OCC's computer systems and electronic networks agree to abide by applicable Federal and State information technology laws as well as the college's standards of conduct. This shall include, but not be limited to any copyright protection of programs or files.

  3. APPROPRIATE USE

    Computer and network resources must be used in support of activities directly related to your duties or assignments at OCC. These activities include but are not limited to:

    1.  completion of assigned job duties or class assignments
    2. relevant communication with colleagues at OCC and other institutions
    3. exchange of research data and papers
    4. authorized exchange of computer programs to support academic research, instruction, and administration, provided such exchange does not violate any copyright protection
  4. INAPPROPRIATE USE

    Any use of computer and network resources for activities outside the college mission is inappropriate. These activities include but are not limited to:

    1. unauthorized access to computer accounts or files
    2. development or use of programs designed to monitor or damage data files
    3. use of college resources to support the activities of any organization not so approved by the college administration
    4. use of college resources for personal consulting, programming, or other profit or not-for-profit activities
    5. use of electronic mail systems for personal attacks, offensive language, political or religious solicitations, or advertising for goods or services
    6. disclosure of passwords or other data which might allow unauthorized persons to gain access to computer accounts, files, or electronic mail
  5. VIOLATIONS

    Any user who perceives that College information technology resources are being used in violation of the standards outlined in this document should report the incident, in writing, to the appropriate Dean or other responsible administrator. If it is deemed necessary, Information Technologies will work with the OCC Human Resources and/or Public Safety Departments to investigate any misuse of computer resources. Any employee or student found to have violated college standards of conduct will be subject to disciplinary action up to and including discharge or dismissal from the college. Any suspected violation of State or Federal information technology laws will be reported to the appropriate legal authority for investigation.

Approved: 1/26/89
Revised:   4/21/03