2024-2025 Academic Catalog

Technology Use Policy

1.0 Overview

Bladen Community College requires lawful use of technology among members of the campus community (employees, students, visitors).

2.0 Access to information systems

Access to information systems, computer systems, and computer networks at Bladen Community College is granted to authorized users for the purpose of accessing these systems and networks. Appropriate use of technology is required.

3.0 Appropriate use

Appropriate use of technology must be ethical, reflect academic honesty and demonstrate restraint in the use of shared resources. Appropriate use must be in compliance with intellectual property right rules; copyright policies; data system security mechanisms; individual rights to privacy (including FERPA) and free from acts of cyber bullying or unwarranted annoyance.

The College will take all practical measures possible to protect privacy rights. The systems administrator shall have the ability to view files and messages on the networks.

Acceptable User Access

Authorized users with legitimate educational and operational need to access electronic files may do so as part of their duties or assignments. To ensure appropriate use of all technology resources, users shall adhere to the following behaviors/activities.

  1. Use resources only for authorized purposes.
  2. Protect USERIDs and passwords (electronic signatures) from unauthorized use and assume responsibility for any unauthorized use of USERIDs or passwords.
  3. Access only files and data to which authorized access has been given as part of assigned duties or classes.
  4. Use only legal versions of copyrighted software or electronic publications in compliance with vendor license requirements or terms of use policies.
  5. Use technology resources prudently, avoiding monopolizing systems, overloading networks with excessive data or downloads, wasting computer time, excessively connecting to internal or external networks or abusing printing or other related resources.

4.0 Unacceptable User Access

To ensure acceptable use of all technology resources, users shall not engage in the following behaviors/activities.

  1. Use another person's USERID, password, files, system, or sharing of electronic signature without permission.
  2. Use computer resources to decode passwords or access controlled information.
  3. Attempt to circumvent, subvert, or damage system security measures.
  4. Engage in any activity that might be harmful to systems or to any information stored thereon, such as creating or propagating computer viruses, disrupting services, or damaging, deleting, or destroying files.
  5. Use the College's systems for partisan political activities, such as using electronic mail to solicit support for a political candidate.
  6. Make or use illegal copies of copyrighted media files or pirated software or store such copies on college systems or transmit them over college networks.
  7. Use College messaging systems, including, but not limited to, campus email systems, learning management systems and College social media sites, for purposes of cyber-bullying, broadcasting unsolicited mass messages, or distribution of unwanted mail.
  8. Use system for personal gain unless authorized by the college.
  9. Use systems for downloading, sending, or receiving information which contains obscene, indecent, or lascivious material or other material which explicitly or implicitly refers to sexual conduct or for downloading, sending, or receiving information which is bigoted or sexist. The College reserves the right to judge if material meets criteria for the above.
  10. Create, modify, execute, or retransmit any computer program or instructions intended to obscure the true identity of the sender of electronic mail or electronic messages.
  11. Use Bladen Community College’s resources for Cyber-bullying or any other computer related crimes as Outlined in Chapter 14:453, 457; Article 60 “Cyber-bullying of the General Statutes of the General Assembly of North Carolina
  12. All networks and technology resources (desktop, laptop and mobile devices) are the Property of Bladen Community College, and thereby, subject federal and state laws pertaining to lawful usage.

5.0 Violations

Violations of this policy and guidelines will result in appropriate disciplinary action through established college disciplinary procedures, which may include, but not be limited to, suspension of computing and information system access privileges, suspension, or expulsion, or termination of employment. The College will contact state or federal authorities for prosecution for violation of state or federal laws. This policy applies to employees, students and visitors. Violations of this policy will be dealt with by appropriate disciplinary procedures. Unauthorized users may also be subject to prosecution under relevant state and federal laws.

6.0 Liability

Users are responsible for knowledge and compliance with any updates to this document. Current editions will be posted on the college’s website. Users are solely responsible for all activity with the respect to their accounts, electronic, communications, and data security.