6.23 Network and Internet Access Policy

I. Purpose

Central Piedmont Community College provides network and Internet access to aid in the transfer of information electronically. These networks may be used for a wide variety of on- and off-campus communications relating to College business. This policy addresses acceptable use of network and Internet access for all Central Piedmont employees and students.

II. Policy

Network resources shall be used in a responsible, efficient, ethical, considerate, and lawful manner. Users of networks are expected to demonstrate respect for intellectual property, data ownership, system security, and individuals' rights to freedom from intimidation or harassment.

Network and Internet use shall comply with local, state, and federal law and Central Piedmont policies and procedures.

Faculty, staff, and students are expected to be aware of the public nature of content that is placed on the Internet, including the potential questionable  accuracy and validity of Internet-based content, and the lack of privacy concerning personal data and commentary, such as with the use of social networking sites.

III. Confidentiality

Generally, a user's network and Internet use will not be monitored except in the following types of situations: the user gives prior consent; the College needs to ensure the security or operating performance of its systems or networks; the College has a reasonable concern that a violation of College policy or applicable law has occurred; or the College is complying with a valid subpoena or search warrant issued by a court of competent jurisdiction. While general content review will not typically be undertaken, monitoring of electronic information may occur for these reasons and others as necessary. All network and communication activities may be logged for e-discovery and forensic purposes. For these reasons, the College cannot guarantee the privacy of electronic communications.

In order to troubleshoot network problems and to plan necessary enhancements, the College runs monitoring software that records certain information about all network packets transmitted through its facilities. These reports are accessed and used only by authorized staff members with responsibilities for overseeing the network. Reports about this information may be provided to College administration.

IV. Expectations

Network and Internet access is a privilege, not a right, and as such, can be withdrawn from those who use it irresponsibly. Unauthorized use of the network, intentional deletion or damage to files and data belonging to other users, or copyright violations may be considered theft pursuant to some state and federal laws. Network users who are found by the College to have purposely engaged in unacceptable uses of network resources will be subject to disciplinary action up to and including suspension of access to technology resources, dismissal, suspension, expulsion, and/or legal action.

Each network or system has its own set of policies and procedures. Actions which are routinely allowed on one network/system may be controlled, or even forbidden, on other networks. Users must abide by the policies and procedures of these other networks/systems and must comply with local, state, and federal laws and with the College's policies and procedures.

If faculty, staff, or students have questions about a proposed copyright issue when common sense and caution are not adequate, they should refer to Policy 6.10 regarding Reproduction of Copyright Materials and then check Central Piedmont's Library Homepage for additional clarification of copyright laws. Librarians are available at each campus to offer further assistance with copyright issues. 

Central Piedmont personnel are expected to participate in professional development classes and/or enroll in College classes to improve computer knowledge and skills.

Because computer labs are often specialized, lab personnel will develop specific guidelines for each individual lab. Each open lab will be randomly monitored for computer use and inappropriate use will be reported to the proper authority.

V. Examples of Acceptable Uses

VI. Examples of Unacceptable Uses

Changes approved by Board on August 29, 2012