Notice: You MUST read this policy then click on the "I Agree" below to continue.
Internet acceptable use policy conditions and rules for use:
I. Policy Application
Access to College owned or operated ITRs (Information Technology Resources) imposes certain responsibilities on users ad is granted subject to College policies and state and federal laws. Appropriate use should always be legal, ethical, reflect academic honesty and community standards, and show restraint in the consumption of shared resources. All use of these services should demonstrate respect for intellectual property, data ownership, system security, and individuals’ rights to privacy and to be free from intimidation, harassment, and unwarranted annoyance.
II. Acceptable Use
Acceptable use of the College's ITRs by authorized users includes usage for academic, educational or professional purposes that are directly related to official College business and in support of the College's Mission.
III. Unacceptable Use
Unacceptable uses of the College’s ITRs, which shall amount to a violation of this policy, shall include, but not be limited to, the following:
- For any illegal act, including violation of any criminal or civil laws or regulations, whether state or federal;
- For any political purpose;
- For any commercial purpose;
- To send threatening or harassing messages, whether sexual or otherwise;
- To access, share or download sexually explicit or obscene material;
- To infringe any intellectual property rights;
- To gain, or attempt to gain, unauthorized access to any computer or network;
- For any use that causes interference with or disruption of network users and resources, including propagation of computer viruses or other harmful programs;
- To intercept communications intended for other persons;
- To misrepresent either the College or a person’s role at the College;
- To distribute chain letters;
- To access online gambling sites; or
- To libel or defame any person.
IV. Privilege
The use of Internet is a privilege, not a right; it is to be used for academic purposes only. Inappropriate use, including any violation of these conditions and rules, may result in cancellation of the privilege, as well as possible civil and/or criminal sanctions. The account holder or user is solely responsible for any and all materials viewed, stored, or transmitted from BCC-based computers. BCC expects, however, that all account holders or users will comply with all College rules and regulations related to Internet use, as well as applicable state and federal law. If BCC, however, receives notice of a violation of its rules, and/or state or federal law, BCC reserves the right to deny, revoke, suspend, or close any user account. Further, no account holder or user should have an expectation of privacy over e-mail transmissions and the College reserves the right to block any "mass" e-mail transmissions.
V. Security
- Security on any computer system is a high priority, especially when the system involves many users. A user must never allow others to use his/her password. Users should also protect their passwords to ensure system security and their privileges and ability to continue use of the system. Attempts to log on to the Internet with other than your own account will result in cancellation of user privileges.
- If you feel you can identify a security problem on the Internet, you must notify a system administrator.
VI. Vandalism and Harassment
- Vandalism and harassment will result in cancellation of user privileges.
- Vandalism is defined as any malicious attempt to harm, modify, and destroy data of another user, Internet, or other networks that are connected to the Internet backbone. This includes, but is not limited to, the uploading or creating of computer viruses or intentionally disrupting network traffic or crashing the network and connected systems.
- Harassment is defined as the persistent annoyance of another user or the interference of another user's work. Harassment includes, but is not limited to, the sending of unwanted mail, Trojan horses, logic bombs, trapdoors, backdoors, viruses and worms.
VII. Monitoring
BCC reserves the right to review any material on user accounts and to monitor file
server space. The system administrator has the right to restrict or terminate network
and Internet access at any time for cause. The system administrator further has the
right to monitor network activity in any form that it sees fit to maintain the integrity
of the network.
VIII. No Warranties
BCC makes no warranties of any kind, whether express or implied, for the service
it is providing. BCC will not be responsible for any damages a user suffers. This
includes loss of data resulting from delays, no-deliveries, misdeliveries, or service
interruptions cause by BCC negligence or by the user's errors or omissions. Use of
any information obtained via the Internet is at the user's own risk. BCC specifically
denies any responsibility for the accuracy or quality of information obtained through
its services. All users need to consider the source of any information they obtain
and consider how valid that information may be.
IX. Procedures for Use
- Student users must sign-in legibly on the appropriate log each time they use the network
- Users shall not play games or use the computer resources for other non-academic activities.
X. Encounter of Controversial Material
On the Internet it is impossible to control the content of data and a user may discover
controversial materials. If you feel you are being harassed or the system is being
used in an inappropriate manner, it is your responsibility to notify the systems administrator.
BCC shall not be held liable for any decision to restrict or regulate access to Internet
materials nor for the student's encounters, access, or use of any inappropriate or
controversial material.
XI. Network Etiquette
All users are expected to abide by the generally accepted rules of network etiquette.
These include, but are not limited to, the following:
- Do not reveal your personal address or phone numbers of students or colleagues.
- Note that electronic mail (e-mail) is not private. People who operate the system do have access to all mail. Messages relating to or in support of illegal activities will be reported to the authorities and will result in the loss of user privileges.
- Do not use the Internet in such a way that you would disrupt the use of the network by other users.
- All communications and information accessible via the Internet should be assumed to be the private property of those who put it on the network.
XII. Violations
Violations of this policy may result in disciplinary action, up to and including dismissal. Further, a user who violates this policy may be subject to civil and/or criminal liability for violating state or federal laws, including, but not limited to: the Electronic Communications Privacy Act of 1986, the Family Educational Rights and Privacy Act, Massachusetts Wiretap Law, defamation, copyright and/or trademark infringement laws, the Digital Millennium Act or sexual harassment or discrimination laws.
Further, intentional or unintentional misuse of this service by an account holder or user may result in a violation of civil and/or criminal statutes, including, but not limited to, the Electronic Communications Privacy Act of 1986, the Family Educational Rights and Privacy Act, Massachusetts' Wire Tap and/or Privacy laws, defamation, copyright and/or trademark infringement laws, and/or sexual harassment or discrimination laws.
By clicking "I Agree" below, you acknowledge you have read the BCC 'Internet Acceptable Use Policy',