1. Scope
    This policy applies to all users of computer and network resources owned or managed by Northwestern Michigan College. Computer and network resources include all College owned, licensed, or managed hardware and software, and use of the College network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.
  2. Definitions
    1. Computer resources refer to all technology based hardware and software including desktop, laptop and tablet computers, smartphones and iPad/iPod devices.
    2. Electronic records and documents refer to any means of expressing information that is created, received, used or maintained within the scope of College business or resides on College resources. Examples include budget reports, contracts with vendors, attendance records, work schedules, architectural drawings, correspondence or memoranda related to College business, course syllabi, meeting minutes, departmental web sites, and committee reports.
    3. Network resources refer to shared applications such as Banner, the Internet, data and file storage systems containing student and employee data, emails, course files, wired and wireless networks, email and calendar systems, etc.
    4. Users refer to anyone who uses computer or network resources belonging to Northwestern Michigan College.
  3. Your Rights and Responsibilities
    The College shall take reasonable measures to protect all persons exercising the privilege of using its computer and network resources from unlawful abuse and/or intrusion by others sharing these resources, through both reasonable proactive means and the imposition of disciplinary sanctions where warranted. Users can expect to receive appropriate and lawful access to stored information, and to be permitted to electronically express opinions pursuant to legal protections applicable to the educational and/or employment setting. In turn, users are responsible for knowing the policies, procedures and guidelines of the College that apply to use of the College's computer and network resources, and for exercising good judgment in the use of those resources.
  4. Responsible use of computer and network resources
    Central to appropriate and responsible use is the recognition that the College’s computing and network resources shall be used in a manner consistent with its instructional, public service, business and administrative objectives. Use should also be consistent with the specific objectives of the project or task for which such use was authorized.
  5. Users of College computer and network resources:
    1. Must use only the computers, computer accounts, and computer files for which authorization is granted.
    2. Must not use the resources for promoting a personal business or for-profit work.
    3. Must not use another individual's account without authorization, and may not attempt to capture or guess other users' passwords.
    4. Must respect the privacy and personal rights of others.
    5. Should be professional and respectful when using computing and network resources to communicate with others. Libel, slander, or harassment is not allowed. See other NMC policies on harassment (nmc.edu/policies/).
    6. Should make a reasonable effort to protect passwords and to secure resources against unauthorized use or access; and they must configure hardware and software in a way that reasonably prevents unauthorized users from accessing NMC's network and computing resources (i.e., do not configure the computer or software to automatically remember passwords).
    7. Must not enable unauthorized users to access data or information on the NMC network.
    8. Must not attempt to access restricted portions of the network, an operating system, security software or other administrative applications for which authorization has not been granted.
    9. Must not develop or use programs that disrupt other computer or network users or that damage software or hardware components of a system.
    10. Must not download and/or use tools that are normally used to assess security or to attack computer systems or networks (i.e., password "crackers", vulnerability scanners, network sniffers, etc.) unless authorization has been given by the Executive Director of Learning Resources and Technologies, or designee.
    11. Must not attempt to forge, alter or remove electronic mail headers.
    12. Should understand that just because an action is technically possible does not mean that it is appropriate to perform that action.
    13. Must not configure computer or network resources in any way that negatively impact the security of those resources, or the documents and services on those resources.
    14. Should understand that this policy may be less restrictive than other policies that govern computer and network use. In such cases, the more restrictive policy takes precedence. If you have any questions, contact the Executive Director of Learning Resources and Technologies, or designee.
    15. Must not engage in unauthorized downloading, copying or use of licensed or copyrighted content (i.e., software, images, video, or other materials).
    16. Must not use NMC computer equipment or network resources to illegally download or provide/allow unauthorized peer-to-peer (P2P) file sharing of media file to include but not limited to music and video files.
  6. Shared Use of Resources
    Systems and LAN Management, Information Technology Service, and other College departments which operate and maintain the computer and network resources expect to maintain an acceptable level of performance and must assure that frivolous, excessive, or inappropriate use of the resources by one person or a few people does not degrade performance for others. The College may choose to set limits on an individual's use of a resource through quotas or time limits and other mechanisms and may monitor traffic to ensure appropriate use.
  7. Adherence with laws, policies, contracts and licenses
    All users of the College’s computing and network resources are expected to comply with all federal, Michigan, and other applicable laws and regulations; all generally applicable College rules and policies; and all applicable contracts and licenses. Examples include the laws of libel, privacy, copyright, trademark, obscenity, and child pornography; the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, which prohibit "hacking", "cracking", and similar activities; the College’s harassment policies; and all applicable software licenses.
  8. Privacy for Employee and Student Electronic Records and Documents
    The College respects the legitimate privacy interests of its employees and students and seeks to foster a climate free from arbitrary or capricious monitoring of electronic records and documents. Nonetheless, the College reserves the right to access electronic records and documents that are under the control of its employees and students in accordance with applicable law and College policies. Here are the rights, responsibilities, and expectations of the College and its employees and students regarding the conditions under which they may access electronic records and documents.
    There are many laws that govern the maintenance and disclosure of electronic records and documents. Federal and state laws, for example, require the College to:
    1. Protect from unwarranted disclosure certain electronic records and documents protected by laws such as Health Insurance Portability and Accountability Act, Family Educational Rights and Privacy Act, and the Michigan Library Privacy Act;
    2. Disclose electronic records and documents (Freedom of Information Act, subpoenas, etc.); and/or
    3. Monitor electronic records and documents.
      1. When the College must monitor computer and network resources to avert reasonably anticipated threats or hazards to those resources. An example includes scanning to detect computer viruses; or
      2. When the College is required by law to access, monitor, or disclose electronic records and documents.
      3. When the College has a legitimate business need to know or access the information contained in electronic records and documents. Examples include, but are not limited to, providing financial records to auditors, or accessing electronic mail to investigate academic, personnel, business or administrative matters of concern to the College, or to investigate any suspected violation of law or College policy.
        The following statements govern those circumstances in which the College, when not governed by external law, will monitor or access electronic records and documents. The College may access or monitor all electronic records and documents in the following circumstances:
        In such circumstances where electronic records and documents are not accessible, the Executive Director of Learning Resources Technology, his or her designee, or the President’s designee, will review a request by an executive officer and, if appropriate, authorize the specific access as necessary.
    4. User Compliance When you exercise the privilege of using College computer and network resources, and accept any College issued computing accounts, you agree to comply with this and all other computing related policies. You have the responsibility to keep up-to-date on changes in the computing environment, as published, using College electronic and print publication mechanisms, and to adapt to those changes as necessary.

    Violations of the Acceptable Use Policy by students will be adjudicated through the Student Judicial Process. Violations of the Acceptable Use Policy by College employees, (including but not limited to: faculty, administrative, professional, technical paraprofessionals, support staff, maintenance/custodial, supplemental, and student employees) will be referred to Human Resources and/or the appropriate executive officer. If any provisions(s) of this policy or set of bylaws conflicts with laws applicable to Northwestern Michigan College, including the Community College Act of 1966, the Freedom of Information Act, or the Open Meetings Act, as each may be amended from time to time, such laws shall control and supersede such provisions(s).