Mar 28, 2024  
BC3 Academic Catalog: 2018-2019 
    
BC3 Academic Catalog: 2018-2019 [ARCHIVED CATALOG]

Technology Usage


Online Privacy Statement

Acceptable Use of Technology Policy

Mobile Device Usage Policy - Students

Student Printing & Copying Policy

Online Privacy Statement

A. Online Privacy Practices

Butler County Community College (BC3) is committed to ensuring your online privacy with respect to third parties. BC3 does not sell or distribute to third parties any information collected from its sites unless required by law.

B. E-Commerce

All online credit card transactions to BC3 are secure and encrypted.Confidential information you enter during online transactions is used only for the purposes described in that transaction.

C. Sharing of Information

BC3 strictly adheres to the Family and Educational Rights Privacy Act of 1974 (FERPA) otherwise known as the Buckley Amendment and does not release personal student information collected online without explicit authorization.

D. Public Forums

BC3 uses chat rooms, e-mail, discussion forums, etc. for academic purposes. While these electronic communications may be logged and reviewed, these educational records are protected from disclosure by FERPA.

E. Links to Other Sites

BC3 web sites contain links to other sites outside of the BC3 domain. BC3 is not responsible for the content or the privacy practices of these sites. If you have questions about the privacy practices, contact info@bc3.edu.

Acceptable Use of Technology Policy

I. Policy

Access to information systems and networks owned or operated by Butler County Community College (BC3) imposes certain responsibilities and obligations and is granted subject to College policies, and local, state and federal laws. Acceptable use is always ethical, reflects academic honesty, shows restraint in the consumption of shared resources and protects all Information Technology (IT) Resources from any unauthorized or unintended use. It demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and freedom from intimidation, harassment, and unwarranted annoyance unless covered by legal statutes. The establishment of this policy is to safeguard and protect all information systems, including academic and financial, that support the College’s Mission and daily operations.

II.General Guidelines

The Director of Information Technology in conjunction with the Dean of Student Development and/or the Director of Human Resources/Equal Opportunity Compliance Officer is responsible for the enforcement of these guidelines. Any request for use of technology systems other than those identified must receive prior written approval.

In making acceptable use of technology resources users must:

  1. use technology only for authorized purposes;
  2. protect their user ID and system from unauthorized use. Users are responsible for all activities on their user ID or that originate from their system;
  3. access only files and data that are their own, that are publicly available, or to which they have been given authorized access;
  4. use only legal versions of copyrighted software in compliance with vendor license agreements;
  5. be considerate in their use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, or wasting computer time, disk space, paper, manuals, or other resources;
  6. use only College software unless approval is given by the Director of Information Technology to load other software.

In making acceptable use of technology users must NOT:

  1. use another person’s system, user ID, password, files, or data without permission;
  2. use computer programs to decode passwords or access control information;
  3. attempt to circumvent or subvert system or network security measures;
  4. engage in activity that might be harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging or deleting files and directories;
  5. use College systems for commercial or partisan political purposes, such as using electronic mail to circulate advertising for products or for political candidates;
  6. make or use illegal copies of copyrighted software, store such copies on College systems, or transmit them over College networks;
  7. waste information technology resources, for example, by intentionally placing a program in an endless loop or by printing excessive amounts of paper;
  8. use the College systems or networks for personal gain. For example, by selling access to his/her user ID or to College systems or networks, or by performing work for profit with College resources in a manner not authorized by the College;
  9. engage in any other activity that does not comply with the general principles presented above;
  10. use computer lab facilities at the College unless enrolled as a current student, employed by the College, or granted permission;
  11. install personal equipment on College owned equipment without permission from the Director of Information Technology. These include printers, monitors, LCD displays, keyboards, mice, MagicJacks, IP phones, microphones, and web cams;
  12. connect personal equipment to the College network via cabling other than wireless hotspots.
III. Internet Guidelines

Access to the Internet from BC3 is a privilege, not a right, and abusers may lose their Internet privileges.

Users must adhere to the following guidelines in addition to the general guidelines listed above:

  1. students and employees may access the Internet from designated areas on campus during open lab hours. Class activities take priority over open lab time;
  2. access to the Internet should be used for purposes relative to classroom and work assignments and not for recreational purposes, including digital and social media;
  3. access to the Internet may not be used for unethical, illegal, or criminal activities;
  4. access time may be limited due to the number of people online and equipment availability;
  5. downloading files from the Internet to the hard drives of lab PC’s is prohibited;
  6. students/employees have no reasonable expectations of privacy when using BC3 technology and networks.

A. Digital Media Guidelines

Course content, presentations, and/or lectures shall not be recorded (audio and/or video) without prior knowledge and consent of the instructor, presenter, and/or student. Such recordings are not to be copied, sold, altered, reproduced or distributed without the written consent of the instructor, presenter, and/or student.

Registered students may download digital course materials from their course(s) from within the College’s online Learning Management System (LMS) for the purposes of private study or research but may not copy, sell, alter or further reproduce or distribute these materials.

B. Social Media Guidelines via College Information Systems and Networks

Any online activities, including the use of social media, must not interfere with employee work performance or student academic responsibilities. Employees must adhere to College policies. Students must adhere to policies set forth by their instructors. Employees and students must ensure that their social networking conduct is consistent with all policies contained in the BC3 Student and Employee Handbooks and the Acceptable Use of Technology Policy and the Mobile Device Usage Policy.

IV. General Computer Usage

BC3 technology and networks support the College’s Mission, a student-centered learning environment, and provide resources and effective communication for students and employees. The information systems and networks provided must be reliable and secure. Students/employees have no reasonable expectations of privacy when using BC3 information systems and networks.

V. Email Guidelines

Users must be aware of what is acceptable and unacceptable use of the email system at BC3 and any hosting email services. All messages distributed via the BC3 email system are the property of BC3. Electronic communication is instantaneous and permanent. Users should be cognizant of the fact that electronic communication may be forwarded, altered, shared on electronic bulletin boards and/or stored on network systems.

Employees and students are required to use the email address provided to them by BC3 for all correspondence related to the College and for all course-related correspondence between the instructors and their students. Instructors have no responsibility to and are discouraged from accepting and/or responding to an email sent from a student using a non-BC3 email address.

Employees and students are expected to use email with good judgment and to be aware that email messages are not confidential and privacy cannot be guaranteed. Students/employees have no reasonable expectations of privacy when using BC3 technology and networks. Transmitting any identifiable student information via email, including grades, may violate the Family Educational Rights and Privacy Act (FERPA). Instructors must disseminate grades using a secure website such as Blackboard, Datatel, and Lumens. If there is evidence that a user is not adhering to these guidelines, BC3 reserves the right to take disciplinary action, up to and including termination of employment, permanent student dismissal, and/or legal action.

It is strictly prohibited to:

  1. send or forward emails that are unnecessary, repetitive, or contain libelous, defamatory, hurtful, offensive, racist or obscene remarks;
  2. send or forward emails intended to harass, intimidate, or otherwise annoy another person;
  3. forward a message or copy a message or attachment belonging to another user without acquiring permission from the originator first. Be aware that copyright laws apply to all material. For example, it is inappropriate to copy any material owned by others from any source (e.g., cartoons, photographs, articles, poems, graphics scanned from a magazine, etc.) without permission of the owner. Users should assume that all materials are copyrighted unless a disclaimer or waiver is explicitly provided (This is particularly true on the World Wide Web; to include information from some other source on a Web page, link to it, don’t copy it. In some cases, even this action may violate copyright of licensing agreements by enabling illegal redistribution of programs or data. If a user is unsure, ask the owner);
  4. send unsolicited email messages or chain mail;
  5. share your BC3 provided users name and password with anyone, unless consent is given by the BC3 primary email account user and it is used to conduct appropriate College business and/or communication. Individuals who are not the primary email account user and/or a BC3 registered student are prohibited from sending emails from the primary account user’s email account and are prohibited from viewing any emails intended solely for the primary account user;
  6. forge or attempt to forge email messages, or disguise or attempt to disguise his/her identity when sending mail. 

A. All student email addresses and corresponding account/profile information created by and provided to students by BC3 and any hosting email service must remain unaltered while registered for classes at BC3.

B. Email addresses must match the format specified by BC3.

C. The student’s email account/profile information must match that which is contained in the BC3 student management database.

D. Only official name changes and withdrawal/graduation from BC3 will warrant the change of an email address and/or the account/profile information connected to the email account.

E. use the BC3 email system for anything other than legitimate business or classroom purposes.

   7. use the BC3 email system for anything other than legitimate business or classroom purposes.

A. College use of email - Email is an official means for communications within BC3. Therefore, the College has the right to send communications to students via email and the right to expect that those communications will be received and read in a timely fashion.

B. Assignment of email addresses - Information Technology assigns all employees and students an official BC3 email address. It is to this official address that the College will send email communications; this official address will be the address listed in the College’s Directory for that employee or student.

VI. Enforcement
  1. The College considers any violation of acceptable use principles or guidelines to be a serious offense.
  2. Individuals or groups who act in a manner contrary to existing policy and accepted standards for computer use are subject to the sanctions and disciplinary measures normally applied to misconduct or lawbreaking. Any violations of the acceptable use of technology must be reported to the Director of Information Technology. A copy of the Violation Report Form appears in Appendix Y.
  3. The Director of Information Technology and/or his/her designee will work in conjunction with the Dean of Student Development and/or Director of Human Resources/Equal Opportunity Compliance Officer and investigate the allegations and may disallow network connections by certain computers (even departmental and personal ones); require adequate identification of computers and users on the network; undertake audits of software or information on shared systems where policy violations are possible; take steps to secure compromised computers that are connected to the network; or deny access to computers, the network, and institutional software and databases. The College reserves the right to copy and examine any files or information resident on College systems allegedly related to the unacceptable use. Users are expected to cooperate with investigations either of technical problems or of possible unauthorized or irresponsible use as defined in these guidelines; failure to do so may be grounds for suspension or termination of access privileges.
  4. A matter involving students will be referred to the Dean of Student Development. A student who violates any of these guidelines will be subject to disciplinary action up to and including permanent dismissal and possible legal action.
  5. A matter involving employees will be referred to the Director of Human Resources/Equal Opportunity Compliance Officer. An employee who violates any of these guidelines will be subject to disciplinary action up to and including termination of employment and possible legal action.
VII. Disclaimer

The College will not be responsible for the loss or corruption of user data files of any kind. Use of technology, networks, and facilities at the Butler County Community College shall constitute a full, final, and irrevocable release of Butler County Community College and its agents and employees from any suit, claim, or cause of action arising by virtue of the use of the College’s technology, networks, and facilities, including but not limited to, loss of data or damage to any computer outside of the College due to a computer virus. The user agrees to indemnify and hold the College harmless from any suit, claim, or cause of action arising from the user’s abuse or misuse of the technology, networks, and facilities of the College. It is the user’s responsibility to backup data at regular intervals and provide computer virus protection for their home and/or office computer.

*Portions of the above Acceptable User Guidelines document were used with the permission of Virginia Tech. [http://www.va.edu/policies/acceptuseguide.htm1] (16 Oct. 1996).

Mobile Device Usage Policy - Students

This policy applies to, but is not limited to, the use of mobile/cellular phones, laptop/notebook/tablet computers, smart phones and PDAs, and any mobile device capable of storing corporate data and connecting to an unmanaged network, hereinafter referred to as “mobile device.” Mobile devices can further be defined as having the ability to receive and/or transmit voice, text, data messages and/or internet usage without a cable connection.

General Mobile Device Use

A. During class sessions, all mobile devices should be on silent or vibrate mode. Students may access their mobile device in the event that their mobile devices activate simultaneously due to the e2Campus Alert System.

B. During testing situations and/or when directed by the instructor, the use of a mobile device is prohibited and mobile devices must be turned off. The instructor may leave his/her mobile device on silent or vibrate in the event that an alert would be sent over the e2Campus Alert System during testing situations.

C. To protect the privacy of the faculty, staff, students, and visitors, students are prohibited from using their mobile device as a means to photograph and/or record any individual(s) in any form (audio and/or video) without that individual’s knowledge and consent.

D. The use of mobile devices to photograph and/or record a test, classroom material, private information, and/or related item is prohibited.

E. The College will not be liable for the loss of personal mobile devices brought onto campus and/or an off-campus location.

F. Any connection to the College’s information services must adhere to the Acceptable Use of Technology Policy.

G. Students have no expectation of privacy when connected to the College’s information services.

Failure to follow the provisions of this policy could result in a violation of the Student Code of Conduct and could result in disciplinary action.

Student Printing & Copying Policy

  1. Students will be allotted $15.00 for printing per semester at no charge.
  2. Students will be able to purchase additional pages at the Bookstore, Library, and Finance Office, with a minimum purchase of $1.00. Students will also be able to purchase addition pages at Brockway, Cranberry, Lawrence Crossing, and LindenPointe by check only ($5.00 minimum).
  3. Students will receive a warning when their printing allowance gets low.
  4. It will cost .10¢ per page for black and white and .15¢ for color.
  5. Any balance on students accounts is non-refundable.
  6. Balances will not carry over to the next semester.
  7. These recommendations do not apply to the plotters used by CADD students