For the college's coronavirus updates, please visit http://www.cpcc.edu/coronavirus.
As of July 14, NC Gov. Roy Cooper announced the state will remain in Phase Two for another three weeks, at least until Aug. 7
Central Piedmont announced July 7, that fall semester classes will begin on Aug. 10, and be taught in multiple formats – online, hybrid, blended, and face-to-face. The majority of students will come to campus a minimal number of times, with the rest of their instruction occurring online. Registration for fall semester classes is open at www.cpcc.edu/admissions/registration.
Read the complete message at www.cpcc.edu/coronavirus.
2.12 Network and Internet Access Policy
Central Piedmont Community College provides network and Internet access to aid in the transfer of information electronically. These networks may be used for a wide variety of on- and off-campus communications relating to College business. This policy addresses acceptable use of network and Internet access for all Central Piedmont employees and students.
Network resources shall be used in a responsible, efficient, ethical, considerate, and lawful manner. Users of networks are expected to demonstrate respect for intellectual property, data ownership, system security, and individuals' rights to freedom from intimidation or harassment. Network and Internet use shall comply with local, state, and federal law and Central Piedmont policies and procedures.
The College expects students, faculty and staff, as well as any other users of the College’s IT Resources (each, a “User” and collectively, “Users”) to be aware of the public nature of content that is placed on the Internet, including the potential questionable accuracy and validity of Internet-based content and the lack of privacy concerning personal data and commentary.
While the College does not typically access User files or email, the College reserves the right to do so for any reason. Generally, a User's network and Internet use will not be monitored except in the following types of situations:
- The User gives prior consent;
- The College needs to ensure the security or operating performance of its systems or networks;
- The College has a reasonable concern that a violation of College policy or applicable law has occurred and is investigating the possible violation; or,
- The College is complying with a valid subpoena or search warrant issued by a court of competent jurisdiction.
While general content review will not typically be undertaken, monitoring of electronic information may occur for these reasons and others as necessary. Notwithstanding the foregoing, all network and communication activities may be logged for e-discovery and forensic purposes. For these reasons, the College cannot guarantee the privacy of electronic communications.
In order to troubleshoot network problems and to plan necessary enhancements, the College runs monitoring software that records certain information about all network packets transmitted through its facilities. These reports are accessed and used only by authorized staff members with responsibilities for overseeing the security and functionality of the network. Reports about this information may be provided to College administration.
A. Network and Internet access is a privilege, not a right, and, as such, can be withdrawn from those who use it irresponsibly. Unauthorized use of the network, intentional deletion or damage to files and data belonging to other Users, or copyright violations of state and federal laws. Network Users who are found by the College to have engaged in unacceptable uses of network resources will be subject to disciplinary action, up to and including suspension of access to technology resources, dismissal, suspension, expulsion, and/or legal action.
B. Devices that are intended to retransmit or extend Central Piedmont network services (“Network Transmission Devices”) shall only be installed and maintained with the consent and oversight of College ITS. This may include, but is not limited to, wireless access points, routers, switches, firewalls, network bridges, as well as other remote access technologies.
C.Devices, including Network Transmission Devices, that require a persistent physical connection for data services should undergo review by Information Technology Services prior to connection. Unknown and undocumented devices connected to the college network may be subject to disconnection in the College’s sole discretion.
D. Each network or system has its own set of policies and procedures. Actions which are routinely allowed on one network or system may be controlled or forbidden on other networks. Users must abide by the policies and procedures of these other networks and/or systems and must comply with local, state, and federal laws and with the College's policies and procedures.
E. If Users have questions about a proposed copyright issue when common sense and caution are not adequate, they should refer to Policy 2.05 Reproduction of Copyright Materials, and then examine Central Piedmont's Library website for additional clarification of copyright laws. Librarians are available at each campus to offer further assistance with copyright issues.
F.Central Piedmont personnel are expected to participate in professional development classes and/or enroll in College classes to improve computer knowledge and skills.
G.Because computer labs are often specialized, lab personnel will develop specific guidelines for each individual lab. Each open lab will be monitored for computer use and inappropriate.
V. Examples of Acceptable Uses
- Official work of the College
- Academic research
- Independent study
- Service on behalf of the College
- Professional development
- Occasional non-commercial personal use
VI. Examples of Unacceptable Uses
Central Piedmont technology resources shall only be used for legal purposes, and shall not be used for any purpose which is illegal, immoral, unethical, dishonest, damaging to the reputation of Central Piedmont, inconsistent with the mission of the College, or any purpose that may subject the College to liability. Unacceptable uses include, but are not limited to, the following:
- Unauthorized use of one’s own account or other computer accounts, access codes, passwords, or network identities, including email addresses;
- Use of one’s own Central Piedmont password outside the Central Piedmont network account;
- Unauthorized access to Central Piedmont’s information systems, the Internet, or other networked or non-networked computers;
- Libel, slander, or cyberbullying;
- Fraud or misrepresentation;
- Misrepresentation of the College via the Internet through the use of websites, social network applications, or other Internet-based tools;
- Destruction of or damage to equipment, software, or data belonging to the College or to others;
- Disruption or unauthorized monitoring of electronic communications and electronically stored information;
- Infringement of copyright or trademark laws or rights of others;
- Use of Central Piedmont's logo without prior approval of the assistant to the president for Community Relations;
- Violation of computer system security;
- Connection of unauthorized devices to the College network;
- Use of wireless access points, ad-hoc wireless devices, or any wired networking devices to redistribute the College’s network access;
- Use of computer communications facilities in ways that unnecessarily impede the computing activities of others, such as randomly initiating interactive electronic communications or email exchanges, abuse of interactive network utilities;
- Use of computing facilities for commercial business purposes unrelated to the College;
- Academic dishonesty;
- Violation of software and hosted license agreements;
- Violation of network usage policies and regulations;
- Violation of privacy or the release of any confidential or proprietary information about the College, its current or former students, or its employees;
- Use of Central Piedmont technology resources to send or redistribute unsolicited bulk email;
- Posting, sending, or intentionally accessing pornographic, sexually explicit, offensive material, or material that is contrary to the mission of the College;
- Intentional distribution of computer viruses, Trojan horses, time bombs, worms, or other rogue programming; or,
- Storing sensitive and protected data unsecured on non-approved solutions, including third-party hosted solutions and local mediums such as USB flash drives and portable hard drives.
Changes approved by Board of Trustee on August 29, 2012; May 6, 2020