SKIP TO PAGE CONTENT

Network Policy

General College Responsibilities 
Klamath Community College will:
  1. Designate staff as necessary to ensure coordination and maintenance of the college's electronic communications system;
  2. Provide staff training in the appropriate use of the college's system including copies of college network policy and administrative regulations. Staff will provide similar training to authorized system users;
  3. Cooperate fully with local, state or federal officials in any investigation relating to misuse of the college's system;
  4. Use only properly licensed software, audio or video media purchased by the college or approved for use by the college. The college will comply with the requirements of law regarding the use, reproduction and distribution of copyrighted works with applicable provisions of use or license agreements;
  5. Retain ownership and control of its computers, hardware, software and data at all times. Maintain system integrity by monitoring network etiquette and ensuring that those authorized to use the college's system are in compliance with Board policy, administrative regulations and law.
System Access
  1. Access to the college's system is authorized to the following: 
    1. KCC employees
    2. Students when under the supervision of staff
    3. Other college authorized agents
  2. Users may be permitted to use the college's system to conduct business related to the management or instructional needs of the college, or to conduct research related to education consistent with the college's mission and goals. All use must be consistent with the general use prohibitions and guidelines/etiquette set forth in this administrative regulation.

General Use Prohibitions/Guidelines/Etiquette
  1. Operation of the college's system relies upon the proper conduct and appropriate use of system users. Students, staff and others granted system access are responsible for adhering to the following prohibitions and guidelines which require legal, ethical and efficient utilization of the college's system.
  2. This document serves to inform system users that files and other information, including e-mail, generated or stored on college servers are not private and may be subject to such monitoring; college administrators may routinely review user files and communications;
  3. This document serves to inform appropriate system users that e-mail sent or received by a public official or employee in connection with the transaction of public business may be a public record and subject to state archivist rules for retention and destruction; 
  4. Prohibitions 
    The following conduct is strictly prohibited:
    • Attempts to use the college's system for commercial or personal gain purposes;
    • Attempts to use, reproduce or distribute material on the college's system in violation of copyright law or applicable provisions of use or license agreements;
    • Attempts to degrade, disrupt or vandalize the college's equipment, software, materials or data or those of any other user of the college's system or any of the agencies or other networks connected to the college's system. This prohibition includes attempts to gain unauthorized access to restricted information, networks, other user's accounts or files;
    • Attempts to disable, defeat or circumvent any college security facility;
    • Share user identifications or passwords for any college computer or other device. User identifications and passwords help maintain individual accountability for technology usage. These are meant to be confidential;
    • Attempts to intentionally access or download any text file or picture or engage in any conference that includes materials which are perceived as libelous, obscene, indecent, vulgar, profane or lewd; advertises any product or service not permitted to minors by law; constitutes insulting or fighting words, the very expression of which injures or harasses others; or presents a clear and present likelihood that, either because of its content or the manner of distribution, it will cause a material and substantial disruption of the proper and orderly operation of the college or college activities, will cause the commission of unlawful acts or violation of lawful Board policies and/or administrative regulations;
    • Attempts to gain access to any service via the college's system which has a cost involved or attempts to incur other types of unauthorized costs. The user accessing such services will be responsible for these costs;
    • Attempts to post or publish personal contact information unless authorized by the person in question. Personal contact information includes photograph, age, home address or phone numbers;
    • Download or attempt to install software on college owned computers. Request and authorization for additional software is made through the appropriate channels.
    • Knowingly access or transmit any confidential records of the college, our students, or vendors without adequate authority to do so. Employees must know what is and is not acceptable based on their position and function within the college.
    • Engage in any activity restricted by local, state, federal, or international laws, including the non-compliance of Ferpa regulations. The college will cooperate with any legitimate law enforcement activity.
  5. Guidelines/Etiquette 
    System users will:
    • Adhere to the same standards for communicating on line that are expected in the classroom, and are consistent with Board policy and administrative regulations;
    • Respect other people's time and cyberspace. Use real-time conference features such as talk/chat/Internet relay chat only as approved by the supervising instructor as part of a course. Avoid downloading excessively large files. Remain on the system long enough to get needed information then exit the system. Act as though every byte sent costs somebody time and money, because it does;
    • Take pride in communications. Check spelling and grammar;
    • Respect the privacy of others. Do not read the mail or files of others without their permission;
    • Cite all quotes, references and sources;
    • Protect password confidentiality. Passwords and accounts are not to be shared with others. Using another user's account or password or allowing such access by another is forbidden and violates Board Policy.
    • Report security problems to the supervising instructor or Human Resources.

Violations/Consequences
  1. Students
    1. Students who violate general system user prohibitions shall be subject to discipline up to and including expulsion and/or revocation of college system access up to and including permanent loss of privileges.
    2. Violations of law will be reported to law enforcement officials.
    3. Disciplinary action may be appealed in accordance with established college procedures.
  2. Staff
    1. Staff who violate general system user prohibitions shall be subject to discipline up to and including dismissal in accordance with Board policy, negotiated agreements and applicable provisions of law.
    2. Violations of law will be reported to law enforcement officials.
 
Agreement for an Electronic Communications System Account

I have read the college's Electronic Communications System policy and administrative regulation. I fully understand the terms of this policy and agree to abide by them. I realize the college may incorporate monitoring software and that any message I send or receive may be recorded and stored in an archive file and that I have no expectation of privacy while using the college's computer resources, whether authorized or not. In consideration for the privilege of using the college's Electronic Communications System and in consideration for having access to the public networks, I hereby release the college, its operators and any institutions with which they are affiliated from any and all claims and damages of any nature arising from my use or inability to use the system including, without limitation, the type of damages identified in the college's policy and administrative regulation. 
Signature ______________________________ Date____________________ 
Printed Name ____________________________