Policies and Procedures Manual

Chapter 3: Student Affairs

03:02:00   Computer Resources

Computer resources at Northeast State Community College are available to all students, faculty and staff for authorized use in a responsible, ethical and equitable manner. It is the responsibility of the Office of Information Technology personnel to maintain a stable operational environment for all users and institutional programs. Cooperation of all users in the form of ethical and responsible behavior is required at all times so that all may share resources freely and equitably.

The following lists of user responsibilities are intended to be illustrative, and not exhaustive. Subject to conformance with Federal and State of Tennessee law and with State of Tennessee and Tennessee Board of Regents (TBR) policies, Northeast State is authorized to supplement the user responsibilities listed below. 

  1. Establish and support reasonable standards of security for electronic information that college members produce, use, or distribute and ensure the privacy and accuracy of administrative information that the College maintains;
  2. Protect college computers, networks, and information from destruction, tampering, and unauthorized inspection and/or use;
  3. Ensure that information technology resources are used to support activities connected with instruction and administration;
  4. Delineate the limits of privacy that can be expected in the use of networked computer resources and preserve freedom of expression over this medium without countenancing abuse or unlawful activities;
  5. Ensure that college computer systems do not lose important information because of hardware, software, or administrative failures or breakdowns.  To achieve this objective, authorized systems or technical managers may occasionally need to examine the contents of particular files to diagnose or solve problems;
  6. Communicate college policies and individuals' responsibilities systematically and regularly in a variety of formats to all parts of the college community;
  7. Monitor policies and propose changes in policy as events or technology warrant;
  8. Manage computing resources so that members of the college community benefit equitably from their use.  To achieve this, authorized staff may occasionally need to restrict inequitable use of shared systems or of the network.  For example, the College reserves the right to require users to refrain from using any program that is unduly resource intensive; and
  9. Enforce policies by restricting access in case of serious violations.  For example, in appropriate circumstances, the director of Computer Services may find it necessary to lock a user's account.  In such circumstances, if a student's account is involved, the student must receive approval from the vice president for Academic Affairs prior to having the account reactivated.  If an employee’s account is involved, the director of Computer Services must receive approval from the director of Human Resources and Organizational Effectiveness prior to having the account reactivated.


Back to Top

Divisional Review Responsibilities Checklist: Information Technology

Revision History: April 2014