Oct 08, 2024  
2024 - 2025 Student Handbook 
    
2024 - 2025 Student Handbook

Technology Usage Policy for EICC


Purpose

Eastern Iowa Community Colleges relies on its computer network to conduct its business. To ensure that its employees, students, independent contractors, agents, and other computer users use its computer resources appropriately, Eastern Iowa Community Colleges has created this Computer Use Policy (the “Policy”).
The rules and obligations described in this Policy apply to all users (the “Users”) of Eastern Iowa Community Colleges’ computer network, wherever they may be located. Violations will be taken very seriously and may result in disciplinary action, including possible termination, and civil and criminal liability.

It is every User’s duty to use Eastern Iowa Community Colleges’ computer resources responsibly, professionally, ethically, and lawfully.

Definitions

From time to time in this Policy, we refer to terms that require definitions:

The term Computer Resources refers to Eastern Iowa Community Colleges’ entire computer network.

Specifically, Computer Resources includes, but are not limited to: host computers, file servers, database servers, application servers, communication servers, mail servers, fax servers, Web servers, workstations, stand-alone computers, laptops, software, data files, and all internal and external computer and communications networks (for example, Internet, commercial online services, value-added networks, e-mail systems, ERP systems) that may be accessed directly or indirectly from our computer network.

The term Users refers to all employees, students, independent contractors, consultants, temporary workers, and other persons or entities that use our Computer Resources.

Policy

The Computer Resources are the property of Eastern Iowa Community Colleges and may be used only for legitimate business purposes. Users are permitted access to the Computer Resources as a tool to assist them in the performance of their various duties. Use of the computer system is a privilege that may be revoked at any time.

In using or accessing our Computer Resources, Users must comply with the following provisions.

  1. No Expectation of Privacy

    No expectation of Privacy: The computers and computer accounts given to Users are to assist them in performance of their jobs or tasks. Users should not have an expectation of privacy in anything they create, store, send, or receive on the computer system. The computer system belongs to the District and may be used only for business purposes.

    Waiver of privacy rights: Users expressly waive any right of privacy in anything they create, store, send, or receive on the computer or through the Internet or any other computer network. Users consent to allowing personnel of the district to access and review all materials Users create, store, send, or receive on the computer or through the Internet or any other computer network. Users understand that Eastern Iowa Community Colleges may use human or automated means to monitor use of its Computer Resources.
     
  2. Prohibited Activities

    Inappropriate or unlawful material. Material that is fraudulent, harassing, embarrassing, sexually explicit, profane, obscene, intimidating, defamatory, or otherwise unlawful or inappropriate may not be sent by e-mail or other form of electronic communications (such as bulletin board systems, newsgroups, chat groups) or displayed on or stored in Eastern Iowa Community Colleges’ computers. Users encountering or receiving this kind of material should immediately report the incident to the Help Desk at extension 3456.
    Prohibited Uses. Without prior written permission from the Director of Information and Technology Services, Eastern Iowa Community Colleges’ Computer Resources may not be used for dissemination or storage of commercial or personal advertisement, solicitations, promotions, destructive programs (that is, viruses or self-replicating code), political material, or any other unauthorized use.

    Waste of computer resources. Users may not deliberately perform acts that waste Computer Resources or unfairly monopolize resources in the exclusion of others. These acts include, but are not limited to, sending mass mailings or chain letters, spending excessive amounts of time on the Internet, playing games, listening to internet radio stations, viewing and listening to non-job/schoolwork related audio/video streaming, engaging in online chat groups, printing multiple copies of documents, or otherwise creating unnecessary network traffic.

    Misuse of software. Without prior written authorization from the Associate Director of Information and Technology Services, Users may not do any of the following: (1) copy software for use on their home computers; (2) provide copies of software to any independent contractors or clients of Eastern Iowa Community Colleges or to any third person; (3) install software on any of Eastern Iowa Community Colleges’ workstations or servers; (4) download any software from the Internet or other online service to any of Eastern Iowa Community Colleges’ workstations or servers; (5) modify, revise, transform, recast, or adapt any software; or (6) reverse-engineer, disassemble, or decompile any software. Users who become aware of any misuse of software or violation of copyright law should immediately report the incident to their supervisors.

    Communication of trade secrets. Unless expressly authorized by the Chancellor, sending, transmitting, or otherwise disseminating proprietary data, trade secrets, or other confidential information of the District is strictly prohibited. Unauthorized dissemination of this information may result in substantial civil inability as well as severe criminal penalties under the Economic Espionage Act of 1996.

    Illegal Copying. EICC recognizes and adheres to the U.S. and International copyright laws, software licensees and intellectual property rights associated with both print and non-print materials. EICC forbids, under any circumstances, the unauthorized reproduction of software, use of illegally obtained software, or gathering or distribution of illegally obtained copyrighted digital materials. Using EICC equipment for any of these purposes is prohibited. EICC employees and students who violate this policy are subject to disciplinary action. Individuals who violate U.S. copyright law and software licensing agreements also may be subject to criminal or civil action by the owner of the copyright.

    Distributing copyrighted songs, games, videos, movies or other copyrighted files or materials without permission is a violation of the Federal copyright laws. Individuals who violate U.S. copyright law and software licensing agreements also may be subject to criminal or civil action by the owner of the copyright. EICC will cooperate with any criminal investigation regarding these matters. According to copyright laws, you do not need to be making a profit to be prosecuted for distributing copyrighted materials such as music, movies, games and software files.
     
  3. Passwords

    Responsibility for passwords. Users are responsible for safeguarding their passwords for access to the computer system. Individual passwords should not be printed, stored online or given to others. Users are responsible for all transactions made using their passwords. No User may access the computer system with another User’s password or account.

    Passwords do not imply privacy. Use of passwords to gain access to the computer system or encode particular files or messages does not imply that Users have an expectation of privacy in the material they create or receive on the computer system. Eastern Iowa Community Colleges has global passwords that permit it access to all material stored on its computer system-regardless of whether that material has been encoded with a particular User’s password.
     
  4. Security

    Accessing another user’s files. Users may not alter or copy a file belonging to another User without obtaining permission from the owner of the file. Ability to read, alter, or copy a file belonging to another User does not imply permission to read, alter, or copy that file. Users may not use the computer system to “snoop” or pry into the affairs of other users by unnecessarily reviewing their files and e-mail.

    Accessing other computers and networks. A User’s ability to connect to other computer systems through the network or by a modem does not imply a right to connect those systems to make use of those systems unless specifically authorized by the operators of those systems.

    Computer security. Each User is responsible for ensuring that use of outside computers and networks, such as the Internet, does not compromise the security of Eastern Iowa Community Colleges’ Computer Resources. This duty includes taking responsible precautions to prevent intruders from accessing the district’s network without authorization and to prevent introduction and spread of viruses.
     
  5. Viruses

    Virus detection and mal-ware. Viruses can cause substantial damage to computer systems. Each User is responsible for taking reasonable precautions to ensure he or she does not introduce viruses or malicious software (mal-ware) into Eastern Iowa Community Colleges’ network. To that end, all material received on floppy disk or other magnetic or optical medium and all material downloaded from the Internet or from computers or networks that do not belong to Eastern Iowa Community Colleges will be scanned for viruses and other destructive programs before being placed onto the computer system. Users should understand that their home computers and laptops may contain viruses. All disks transferred from the computers to Eastern Iowa Community Colleges’ network MUST be scanned for viruses.

    Accessing the Internet. To ensure security and avoid the spread of viruses and mal-ware, Users accessing the Internet through a computer attached to Eastern Iowa Community Colleges’ network must do so through an approved internet firewall. Accessing the Internet directly, by modem, is strictly prohibited unless the computer you are using is not connected to the district’s network.
     
  6. Encryption Software

    Use of encryption software. Users may not install or use encryption software on any of Eastern Iowa Community Colleges’ computers without first obtaining written permission from their supervisors. Users may not use passwords or encryption keys that are unknown to their supervisors.

    Export restrictions. The federal government has imposed restrictions on export of programs or files containing encryptions technology (such as e-mail programs that permit encryption of messages and electronic commerce software that encodes transactions). Software containing encryption technology is not to be placed on the Internet or transmitted in any way outside of the United States without prior written authorization from the Director of Information and Technology Services.
     
  7. Miscellaneous

    Attorney-client communications. E-mail sent from or to an attorney representing the District should include this warning header on each page: “ATTORNEY-CLIENT PRIVILEGED. DO NOT FORWARD WITHOUT PERMISSION”.

    Compliance with applicable laws and licenses. In their use of Computer Resources, Users must comply with all software licenses, copyrights, and all other state, federal, and international laws governing intellectual property and online activities.

    Other policies applicable. In their use of Computer Resources, Users must observe and comply with all other policies and guidelines of the District, including but not limited to the following:

    Eastern Iowa Community Colleges Board Policy Manual
    Eastern Iowa Community Colleges Faculty, Staff, and Student handbooks
    Eastern Iowa Community Colleges Administrative Procedures Manual

    Amendments and revisions. This Policy may be amended or revised from time to time as the need arises. Users will be provided with copies of all amendments and revisions.

    No additional rights. This Policy is not intended to, and does not grant, Users any contractual rights.

Disciplinary Action: A student who is believed to have violated the Technology Policy may be charged with a violation of student conduct. Discipline and appeal processes will follow the established procedures in the Student Code of Conduct.