Acceptable Use Policy

1. Purpose

Kellogg Community College (KCC) owns and operates a variety of computer systems (hardware, software and networks), which are provided for the use of Kellogg Community College students, faculty, staff, and community users in support of the programs of the College and are to be used for education, research, academic development, and public service only. Commercial uses are specifically excluded. All students, faculty, staff, and community users are responsible for seeing that these computing facilities are used in an effective, efficient, ethical, and lawful manner. This document establishes the rules and prohibitions that define acceptable use of these systems. Unacceptable use is prohibited, and is grounds for loss of computing and/or account privileges subject to college policy and/or legal sanctions under Federal, State, and local laws.

2. Audience and Agreement

All users of the Kellogg Community College computer systems must read and comply with the guidelines outlined in this document. Use of these systems acknowledges agreement to comply with these guidelines. Such guidelines will be reviewed by the KCC Technology Committee and may become subject to approval as a College policy or procedure.

3. Rights

Kellogg Community College reserves all rights, including termination of services, to the computing resources that it owns and operates. These procedures shall not be construed as a waiver of any rights of Kellogg Community College, nor shall they conflict with applicable acts of law. Users have rights that may be protected by College policy and Federal, State and local laws.

4. Privileges

Kellogg Community College computer systems’ access and privileges are assigned and managed by the administrators or designees of specific systems. The authorized user is responsible for proper use of the system, including any password protection.

5. Responsibilities

Users are responsible for maintaining the following:

  • An environment in which access to all College computing resources is shared equitably among users. The System administrators or designee set guidelines within which users must conduct their activities.
  • An environment conducive to learning. A user who uses the College’s computer systems to threaten, harass, or make defamatory remarks shall bear full responsibility for his or her actions. Further, by using these systems, users agree that individuals who transmit such remarks shall bear sole responsibility for their actions.Many of the Kellogg Community College computer systems provide access to outside networks, both public and private, which furnish electronic mail, information services, bulletin boards, conferences, etc. Users are advised that they may encounter material, which may be considered offensive or objectionable in nature or content. Users are further advised that Kellogg Community College does not assume responsibility for the contents of any of these outside networks. The user agrees to comply with the acceptable use guidelines for whichever outside networks or services they may access through Kellogg Community College systems. Further, the user agrees to follow proper etiquette on outside networks.The user agrees never to attempt to transmit, or cause to be transmitted, any message in which the origination is deliberately misleading.

    The user agrees that, in the unlikely event that someone does transmit or cause to be transmitted, a message that is inconsistent with an environment conducive to learning or with a misleading origination, the person who performed the transmission will be solely accountable for the message, not Kellogg Community College, which is acting as the information carrier.

  • An environment free of illegal or malicious acts. The user agrees never to use a system to perform an illegal or malicious act. Any attempt to increase the level of access to which the user is authorized or any attempt to deprive other authorized users of resources or access to any Kellogg Community College computer system shall be regarded as malicious.
  • A secure environment. Any user who finds a possible security lapse on any system is obliged to report it to the system administrators. The system must not be used until the System administrators or designee has investigated the problem. Knowledge of passwords or loopholes in the computer security system shall not be used to damage computing resources, obtain extra resources, take resources from another user, gain unauthorized access to resources, or otherwise make use of computing resources for which proper authorization has not been given.
  • Backup of their own data.

6. Accounts

An account assigned to an individual must not be used by others without written permission from the System administrator or designee. The individual is responsible for the proper use of the account, including proper password protection. If an individual user provides his or her password to others, then the individual authorized user is responsible for the consequences of said use.

7. Confidentiality

While reasonable attempts are made to ensure the privacy of users’ accounts and electronic mail, privacy is not guaranteed. Every effort is made to secure sensitive or important files. However, no system can be made entirely secure. Additionally, the system administrators or designees monitor and may access information on computer systems to ensure college policy is observed. The College is subject to laws and regulations that require the release of information under certain circumstances. Student privacy rights are detailed in the Student Handbook.

When performing maintenance, Kellogg Community College reserves the right to access all information on College computer systems. Any violations discovered will be reported immediately to the appropriate systems administrator and to the appropriate divisional supervisor.

Kellogg Community College programs and files are confidential unless they have been made available, with written permission, to authorized individuals.

8. System Usage

Computer systems (such as e-mail) are intended for college-related activities.

Nothing in this policy prohibits the appropriate use of computer systems for educational purposes by minors participating in an educational program.

Acceptable computer system use includes use for education, research, academic development, and public service purposes.

Other uses are prohibited and include but are not limited to these activities:

  • Fraudulent, threatening, harassing, or obscene messages and/or materials are not to be sent or stored:
  • Inappropriate mass mailing (for example, spamming or phishing) are prohibited:
  • Creation or intentional distribution of computer viruses, worms, or Trojan horses is prohibited:
  • Unauthorized access to or denial of service attacks on any computer system shall not be attempted:
  • Connecting devices to the college network without approval of the System Administrator (for example, connecting a personal laptop to the network by disconnecting a college computer or printer and using its network cable).

Abusers are subject to sanctions as outlined in the Violations section.

9. System Performance

No one shall deliberately attempt to degrade the performance of a computer system or network, or to deprive authorized personnel of resources or access to any college computer system.

System administrators or their designees may limit activities that could degrade the performance of computer systems or networks.

10. Unauthorized Access

Loopholes in computer security systems or knowledge of a special passwords should not be used to damage the computer system, obtain extra resources, take resources from another user, gain access to systems, or use systems for which proper authorization has not been given. Users with knowledge of loopholes or special passwords should report the condition to the appropriate system administrator.

11. Copyright

The use of the College network to violate copyright law is prohibited, including violation by the use of personally attached computers and other devices. Specifically, the use of any peer-to-peer file sharing software that copies and distributes copyrighted works (e.g. music, videos, software, games), without the permission of the copyright owner, is a violation of copyright law and is prohibited on any device using the college network. For information on legal alternatives to file sharing, please see www.kellogg.edu/about/p2palternatives.html.

Computer software protected by copyright is not to be copied using campus computing facilities, except as permitted by law or by contract with owner of the copyright. The number of copies and distribution of copies are to be managed by the College’s IS department. The number of simultaneous users shall not exceed the number of original copies purchased.

Materials on computer systems are copyrighted unless stated otherwise. Users of the College’s computer systems agree to follow guidelines for use of copyrighted materials.

Interference with measures used by copyright holders to protect copyrighted works is prohibited.

Users storing materials copyrighted by others on College computer systems or displaying the materials through College web pages must comply with copyright laws and guidelines. Abusers are subject to sanctions as outlined in the Violations section.

12. Violations

An individual’s computer use privileges may be suspended immediately upon the discovery of a possible violation of these guidelines. Such suspected violations will be confidentially reported to the system administrators or designees.

Violations of these guidelines will be dealt with in the same manner as violations of other College guidelines and may result in disciplinary review. In such a review, the full range of disciplinary sanctions is available including but not limited to the loss of computer use and/or account privileges, dismissal or expulsion from the College, and legal actions. Violation of the above guidelines may constitute a criminal offense and result in referral to the appropriate agency.

13. Additional Guidelines

System administration will establish more detailed guidelines, as needed, for specific computer systems and networks. These guidelines may cover such issues as allowable access time and disk space, handling of irretrievable mail, responsibility for account approval and other items related to administering the system.

14. Legal Mandate

This Policy and associated guidelines shall not be construed as a waiver of any rights of Kellogg Community College.

Acceptable Use of Technology Policy revised Jan. 29, 2010, by the KCC Technology Committee and approved for adoption by the President’s Council on Feb. 8, 2010.