BOT Technology Policy
|
|
Oakland Community College (OCC) provides its students, employees, Board of Trustees, and the public with access to information resources and technologies. OCC recognizes the free exchange of opinions and ideas is essential to academic freedom, and the advancement of educational, service, operational, and management purposes is furthered by making these resources accessible.
OCC Information Security and Acceptable Use Administrative Policy states users of
the information technology resources will abide by applicable Federal and State laws
and the College’s regulations (Technology Appropriate Use Regulations) at governing the use of these resources, and will use them in support of activities
directly related to duties and assignments. Those mandates apply to all users of OCC
technology, including students, employees of every kind, and the Board of Trustees.
The aim of that policy is to safeguard the use of resources, including technology
resources acquired
and maintained with public funds.
Limited incidental personal use of OCC technology resources, including through use of personal email systems, is permitted except as described in TAUR. OCC employees and trustees are responsible for exercising good judgment about personal use in accordance with this regulation, OCC’s consistent local guidelines and standards. Personal use refers to activities which only affect the individual and are not related to an employee’s or trustee’s outside business. OCC employees and trustees are required to conduct themselves in a manner which will not raise concern that they are or might be engaged in acts that violate the public trust.
To assure architecture capable of common support, the College will provide each Trustee, upon their request, with IT equipment determined solely by the standards of the College. The College will also provide IT support for the College-owned equipment, including approved software applications relevant to Board activity. The intended use of such equipment is for College-related business in adherence with OCC Information Security and Acceptable Use Administrative Policy and TAUR, and described in the above.
Change Log