Information Technologies
- Procedure Type: Information Technologies
- Procedure Title: Information Technologies & Resources
- Procedure Number: NA
- Office Responsible: Information Technologies
- Related Policies: NA
- Related Procedures: Information Security & Acceptable Use
- Related Laws: NA
- HLC Criterion: NA
Policy Statement
For purposes of this policy, “technology resources” means electronic communication systems and electronic equipment.
Information Security
The information assets of The Oakland Community College (OCC or the College) are administered
in conformance with applicable laws and the Oakland Community College Board Policies.
Appropriate security controls will be applied based on risk as determined by the potential
impact and likelihood of disruptions to the organization's mission, assets, and reputation.
Availability of Access
Access to the Oakland Community College’s (the College) technology resources, including
the Internet, shall be made available to students and employees primarily for instructional
and administrative purposes and in accordance with administrative regulations.
Limited Personal Use
Limited personal use of the College’s technology resources shall be permitted under
certain circumstances. (See Information Security and Acceptable Use Procedure).
Acceptable Use
The Chancellor or designee shall develop and implement administrative regulations,
guidelines, and user agreements consistent with the purposes and mission of the College
and with law and policy. Access to the College technology resources is a privilege,
not a right. Noncompliance to administrative policies, procedures and regulations
governing use of the College’s technology resources may result in suspension of access
or termination of privileges and other disciplinary action consistent with College
policies. Violations of law may result in criminal prosecution as well as disciplinary
action by the College. (See Information Security and Acceptable Use Procedure).
Monitored Use
Electronic mail transmissions and other use of the College’s technology resources
by students, employees, and members of the public shall not be considered private.
Designated College staff shall be authorized to monitor the College’s technology resources
at any time to ensure appropriate use.
Disclaimer of Liability
The College shall not be liable for users’ inappropriate use of the College’s technology
resources, violations of copyright restrictions or other laws, users’ mistakes or
negligence, and costs incurred by users. The College shall not be responsible for
ensuring the availability of the College’s technology
resources or the accuracy, appropriateness, or usability of any information found
on the Internet.
Record Retention
A College employee shall retain electronic records, whether created or maintained
using the College’s technology resources or using personal technology resources, in
accordance with the College’s record management program.
Related Procedures
- Account Administration Security
- Data Storage and Disposal Security
- Database Security
- Desktop and Laptop Security
- Guest Computing Access Security
- Information Security and Acceptable Use
- IT Security Incident Response Plan
- Mobile Device Security
- Network Firewalls Security
- Printer and Copiers Security
- Secured Office Security
- Server Application Security
- Server Rooms Security
- Servers Security
- Shared Computing Device Security
- Web-based Application Security
- Wireless Access Points Security
Change Log
- 07-01-2018 Effective date
- 07-01-2021 Revised