Help

KLAMATH COMMUNITY COLLEGE

NETWORK & SYSTEMS PROCEDURE

 

General College Responsibilities                                                     

 

Klamath Community College will:                            

  1. Designate staff as necessary to ensure coordination and maintenance of the College's electronic communications system.
  2. Provide staff training in the appropriate use of the College's system, including copies of the College network policy and administrative regulations. Staff will provide similar training to authorized system users.                                                             
  3. Cooperate fully with local, state or federal officials in any investigation relating to misuse of the College's system.
  4. Use only properly licensed software, audio or video media purchased by the College or approved for use by the College. The College will comply with the requirements of law regarding the use, reproduction and distribution of copyrighted works with applicable provisions of use or license agreements.
  5. Retain ownership and control of its computers, hardware, software and data at all times. Maintain system integrity by monitoring network etiquette and ensuring that those authorized to use the College's system comply with board policy, administrative regulations, and law.

 

System Access

  1. Authorized access to the College's system is granted to KCC employees, current KCC students, and other authorized college agents.
  2. Users do not own accounts on College computers, but are granted the privilege of exclusive use. Users may not share their accounts with others, and must keep account passwords confidential. Each account granted on a College system is the responsibility of the individual who applies for the account.
  3. The College’s network is primarily for educational use.
  4. Users may be permitted to use the College's system to conduct business related to the management or instructional needs of the College, or to conduct research related to education consistent with the College's mission and goals. All use must be consistent with the general use prohibitions and guidelines/etiquette set forth in this administrative regulation.

 

 

General Use Prohibitions/Guidelines/Etiquette

Operation of the College's system relies upon the proper conduct and appropriate use of system users. Students, staff and others granted system access are responsible for adhering to the following prohibitions and guidelines which require legal, ethical and efficient utilization of the College’s system.

  • This document serves to inform system users that files and other information, including email, generated or stored on College servers are not private and may be subject to such monitoring. College administrators may routinely review user files and communications;
  • This document serves to inform appropriate system users that email sent or received by a public official or employee in connection with the transaction of public business may be a public record and subject to state archivist rules for retention and destruction.

 

Prohibitions

The following conduct is strictly prohibited:

  • Unauthorized attempts to view and/or use another person’s accounts, computer files, programs, or data.
  • Attempts to use the College's system for commercial or personal gain.
  • Attempts to use, reproduce or distribute material on the College's system in violation of copyright law or applicable provisions of use or license agreements.
  • Attempts to gain unauthorized access to physical networks.
  • Attempts to connect and gain access to wired network with equipment not owned or maintained by the College.
  • Attempts to degrade, disrupt or vandalize the College's equipment, software, materials or data or those of any other user of the College's system or any of the agencies or other networks connected to the College's system. This prohibition includes attempts to gain unauthorized access to restricted information, networks, or another user's accounts or files.
  • Attempts to disable, defeat or circumvent any College security facility.
  • Sharing user identifications or passwords for any College computer or other device.  User identifications and passwords help maintain individual accountability for technology usage. These are meant to be confidential.
  • Attempts to intentionally access or download any text file or picture or engage in any conference that includes materials which are perceived as libelous, obscene, indecent, vulgar, profane or lewd; advertises any product or service not permitted to minors by law; constitutes insulting or fighting words, the very expression of which injures or harasses others; or presents a clear and present likelihood that, either because of its content or the manner of distribution, it will cause a material and substantial disruption of the proper and orderly operation of the College or College activities, will cause the commission of unlawful acts or violation of lawful board policies and/or administrative regulations;
  • Attempts to gain access to any service via the College's system which has a cost involved or attempts to incur other types of unauthorized costs. The user accessing such services will be responsible for these costs;
  • Attempts to post or publish personal contact information unless authorized by the person in question. Personal contact information includes photographs, age, home address or phone numbers;
  • Download or attempt to install software on College owned computers. Request and authorization for additional software is made through the appropriate channels.
  • Knowingly access or transmit any confidential records of the College, our students, or vendors without adequate authority to do so. Employees must know what is and is not acceptable based on their position and function within the College.
  • Engage in any activity restricted by local, state, federal, or international laws, including the non-compliance of FERPA regulations.  The College will cooperate with any legitimate law enforcement activity.
  • Using KCC’s computers and/or networks to send fraudulent or harassing messages including and but not limited to "spamming" or "flooding".
  • Attempting to deprive other users of KCC’s technology resources or access to systems/networks

 

Guidelines/Etiquette

 

System users will:

  • Adhere to the same standards for communicating online that are expected in the classroom, and are consistent with board policy and administrative regulations.
  • Respect other people's time and cyberspace. Avoid downloading excessively large files.
  • Take pride in communications. Check spelling and grammar.
  • Respect the privacy of others. Do not read the mail or files of others without permission.
  • Cite all quotes, references, and sources.
  • User identifications and passwords help maintain individual accountability for technology usage. Passwords are confidential. College policy prohibits the sharing of user identifications or passwords for use of any College computer or other device.
    • When choosing a password, it is imperative that the password is unique and difficult to guess. All passwords must be complex and should not be common words or names that could be easy to guess or easy for computer programs to crack. Below is the KCC Password Requirements. The College realizes that remembering passwords can be challenging; however, compromised security by lax passwords could be detrimental to the College or yourself.
    • KCC PASSWORD REQUIREMENTS
      • Passwords must contain 8 characters from three of the following categories:
      • Uppercase characters,
      • Lowercase characters,
      • Base 10 digits (0 - 9),
      • Non-alphanumeric characters like: ~!@#$%^&*_- =`|\(){}[]:;"'<>,.?/.

 

  • Report security problems to your supervisor, instructor, or Human Resources.

 

Violations/Consequences

  • Students who violate general system user prohibitions shall be subject to discipline up to and including expulsion and/or revocation of College system access up to and including permanent loss of privileges.
    • Violations of law will be reported to law enforcement officials.
    • Disciplinary action may be appealed in accordance with established College procedures.              

 

  • Staff who violate general system user prohibitions shall be subject to discipline up to and including dismissal in accordance with board policy, negotiated agreements and applicable provisions of law.
    • Violations of law will be reported to law enforcement officials.

Wireless and BYOD (Bring Your Own Device)

  • The wireless network only provides internet access.
  • KCC reserves the right to limit or ban systems from the network that are abusive.
  • KCC is to ensure that wireless network use does not compromise the security and availability of other networks.        
    • Certain ports are blocked because of security issues.
    • Blocked ports are liable to change to meet security concerns.     
    • KCC is not responsible for the content that is accessed over the wireless network.
    • You are responsible for protecting your own computer or device.

 

Agreement for an Electronic Communications System Account

 

I have read the College's Electronic Communications System policy and administrative regulation. I fully understand the terms of this policy and agree to abide by them. I realize the College may incorporate monitoring software and that any message I send or receive may be recorded and stored in an archive file and that I have no expectation of privacy while using the College’s computer resources, whether authorized or not. In consideration for the privilege of using the College's Electronic Communications System and in consideration for having access to the public networks, I hereby release the College, its operators and any institutions with which they are affiliated from any and all claims and damages of any nature arising from my use or inability to use the system including, without limitation, the type of damages identified in the College's policy and administrative regulation.

 

 

Signature ______________________________        Date____________________

 

 

Printed Name __________________________