Information Technology Services Policy

Last Updated: 

Apr 1 2016

The purpose of Information Technology Services (ITS) is to provide leadership, communication, and support for the effective and efficient use of information systems for learning, resource management, decision-making, and innovation.

Acceptable Use of IT Resources

The College endeavors to respond to changing needs in providing and maintaining IT resources to support its teaching, learning, and support functions. College IT resources are for use by students, faculty, staff, and other community users. Academic use takes priority over personal use across all user categories.

Responsible, ethical behavior is expected of persons using IT resources. To assist College personnel in making decisions regarding the use of IT resources, the following guidelines have been adopted. Different divisions may have additional guidelines concerning practices, procedures, and scheduling of IT resources.

Minimum Security Rules & Requirements

•   Users will use only DCCC authorized hardware and software while on the DCCC network to include wireless technology (personal computers on the wireless network are authorized).

•   Users will not introduce or download executable code (such as, but not limited to, .exe, .com, .vbs, or .bat files) into the DCCC network without authorization, nor write malicious code.

•   Users will not utilize DCCC provided IT resources for personal financial gain or illegal activities.

•   Other than designated curriculum computer networking labs, authorized DCCC personnel will perform maintenance only. Physical relocation or changes to DCCC hardware (i.e. workstations), software, network configurations, or telephone systems are unauthorized without DCCC ITs approval.

•   Users will address any questions regarding policy, responsibilities, and duties to a faculty or staff member or the DCCC Informational Technology Services Help Desk.

•   Phishing and Social Engineering are prohibited. These are techniques (sometimes malicious) used to fraudulently acquire sensitive information, such as passwords, pins, personal information (identity theft), College operations, credit card/financial details (online banking), etc. by masquerading as a trustworthy entity in electronic communications which is predominately performed through Internet email attachments, bogus Web links, and telephone systems.

•   Users will not create, store, or transmit defamatory material within the College network. Users will not vandalize, damage, or disable intellectual property of an individual or the DCCC organization.

Internet Resources

Users are advised that the information available via the Internet is broad in content and uncensored. Availability of such information at DCCC does not imply that the College approves of, condones, endorses, or accepts responsibility for any content not under its control.

Review of Computer Usage

DCCC reserves the right to examine and monitor computer usage, computer files, accounting information, and backups, and to take action to ensure appropriate use, integrity, and operation of its computing systems. Limits may be placed on the duration and purpose of computer usage, particularly during hours of peak usage.

Software — Unauthorized Copying or Use

The College licenses the use of software from a variety of vendors. The College does not own that software or its related documentation and unless authorized by the software developer, does not have the right to reproduce it. Unauthorized duplication or use of software violates the U.S. Copyright Law and exposes the individuals involved and the College to possible civil and criminal liability

NOTE: Individuals found to be in violation of this policy will be subject to disciplinary action in accordance with the College’s Code of Conduct Policy and Procedures.