Computers & Electronics
Computer And Electronic Resources
BP 3720 Computer and Network Use
References:
Education Code Section 70902;
Government Code Section 3543.1(b);
Penal Code Section 502;
Cal. Const., Art. 1 Section 1;
17 U.S. Code Sections 101 et seq.
The District owns, leases, and/or operates a variety of computer and communication systems, including but not limited to, voicemail, electronic mail (e-mail), telephone, and access to the internet, which are provided for the use of District faculty, administrators, staff, and students in support of the programs of the colleges and District. Hereinafter, this system and all of its component parts shall be referred to as the “District Network.” This network establishes a communications platform that often substitutes for in-person meetings regarding District business.
All individuals who use the District Network, including the information it contains and related resources, have a responsibility not to abuse those resources and to respect the rights of others. The Chancellor shall establish a Procedure that provides guidelines for the appropriate use of the District Network and information technologies. The Procedure shall include provisions that users must respect software copyrights and licenses, respect the integrity of computer-based information resources, refrain from seeking to gain unauthorized access, and respect the rights of other computer users.
Students who do not observe the requirements of this Policy may be in violation of the Student Code of Conduct and subject to student discipline. Employees who do not observe the requirements of this Policy may be subject to disciplinary action up to and including termination.
Adopted January 19, 2005
Revised February 20, 2008
Replaces CCCD Policy 050-1-6.2, Spring 2011
Revised March 21, 2018
Reviewed December 12, 2018
Revised February 3, 2021
AP 3720 Computer and Network Use
References:
Education Code Section 7054;
17 U.S. Code Sections 101 et seq;
18 U.S. Code Section 2520
Penal Code Section 502, Cal. Const., Art. 1 Section 1;
Government Code Section 3543.1(b);
Government Code Section 8314;
California Civil Code 1798.29(g);
BP/AP 3710 Securing of Copyright;
BP/AP 3750 Use of Copyrighted Material;
BP/AP 3410 Prohibition of Unlawful Discrimination, and Harassment, and Retaliation
This Procedure applies to all members of the District community using the District Network including, but not limited to, faculty, administrators, staff, students, independent contractors, and authorized guests. The Procedure covers the use of all District computer equipment and communication systems in computer labs, classrooms, offices, and libraries, and the use of the District equipment, servers, systems, and networks from any location. If any provision of this Procedure is found to be legally invalid, it shall not affect the other provisions of this Procedure as long as they can be effective without the invalid provision.
Ownership Rights
This Procedure is based upon and shall be interpreted according to the following fundamental principle: the entire District Network, including all hardware and software components with it, is the sole property of the District which sets the terms and conditions of its use consistent with the law. Except as provided in Board Policies, Administrative Procedures, and collective bargaining agreements pertaining to intellectual property rights, network users have no rights of ownership to these systems or to the information they contain by virtue of their use of all or any portion of the District Network.
Privacy Interests
The District recognizes the privacy interests of faculty and staff and their rights to freedom of speech, participatory governance, and academic freedom, as well as their rights to engage in protected union and concerted activity. However, both the nature of electronic communication and the public character of the District’s business make electronic communication less private than many users anticipate, and may be subject to public disclosure. In addition, the District Network can be subject to authorized and unauthorized access by both internal and external users. For these reasons, there are no online activities or services that guarantee an absolute right of privacy, and therefore, the District Network is not to be relied upon as confidential or private. Nonetheless, the District seeks to afford email communications privacy protections comparable to those it traditionally affords paper mail and fax communications, consistent with state and federal laws. The District will also provide voice mail protection to the extent required by the Federal Wiretap Act.
District’s Rights
System administrators may access user files or suspend service that they manage without notice only: (1) to protect the integrity of computer systems; (2) under time-dependent, critical operational circumstances; (3) as required by and consistent with the law; or (4) where evidence exists that violations of law or Board Policies or Administrative Procedures have occurred. For example, system administrators, following District guidelines, may access or examine individual files or accounts based on evidence that they have been corrupted or damaged or subject to unauthorized use or misuse. In such cases of access without notice, data or information acquired may be used to initiate or extend an investigation related to the initial cause or as required by law or Board Policy or Administrative Procedure and/or to protect system integrity.
Access to any aspect of the District enterprise resource planning (“ERP”) system or other District applications containing personally identifiable information (“PII”) or protected health information (“PHI”), or any other student or employee information protected by state or federal law, shall be granted upon the successful completion of the Department of Justice (“DOJ”) Live Scan fingerprint check.
In order to ensure effective handling of emergency situations, the District monitors calls only when an emergency call is made to 911. Call monitoring will not be available during any other call regardless of number or extension dialed. Emergency calls can only be monitored by Campus Safety director and officers. Campus Safety cannot be heard during monitoring; they can only listen. 911 monitoring allows Campus Safety to be aware of the emergency situation so they can better communicate and assist campus personnel, Police, Fire, and other emergency responders.
User Rights
The District utilizes automated processes to monitor electronic usage as part of its normal network operating procedures. The District shall attempt to notify users before authorized personnel access computer hardware and files or prior to suspending service. In the event that the District acts without user consent, under its District’s Rights specified above, the District shall do so with the least perusal of contents and the least action necessary to resolve the immediate situation. When the District accesses files without user consent, it shall notify the user as soon as practical of its access and provide the reason for its action.
User Responsibilities
The District recognizes that computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, policies, procedures, and contractual obligations.
For District employees, the intended uses of the District Network are those which are reasonable and necessary for the pursuit of job duties; for students, the intended uses are those which are reasonable and necessary for the pursuit of instructional or other authorized activities.
Although personal use is not an intended use, the District recognizes that the District Network will be used for incidental personal activities provided that such use is within reason and provided that such usage is ordinarily on an employee’s own time, is occasional, and does not interfere with or burden the District’s operation, and is not otherwise contrary to Board Policies or Administrative Procedures.
“Unauthorized uses” include prohibited uses and any other use for a prohibited purpose, including illegal activities, messages which may constitute discrimination or harassment under state or federal law, or anything that interferes with the intended use. In addition, no Personally Identifiable Information (PII) unrelated to District matters should be stored or transmitted using the District Network.
All users of the District Network must read, understand, and comply with this Procedure as well as any additional guidelines established by the District. Such guidelines will be reviewed by the District and may become subject to Board approval as a Board Policy or Administrative Procedure. By using any part of the District Network, users agree that they will comply with this Procedure.
Enforcement of the Procedure
The Chancellor or designee will enforce applicable federal and state laws, Board Policies and Administrative Procedures, including not only those laws and regulations that are specific to computers and networks but also those that apply generally to personal conduct. Violations of this Procedure will be dealt with in the same manner as violations of other Board Policies or Administrative Procedures or standards of behavior and may result in disciplinary action, subject to applicable due process requirements. Such violations may be subject to appropriate personnel action and/or criminal investigation.
Users who believe this Procedure has been misinterpreted or misapplied may file a complaint in accordance with the Complaint Procedures noted below.
Students who do not observe the requirements of this Procedure may be in violation of the Student Code of Conduct and subject to student discipline. Employees who do not observe the requirements of this Procedure may be subject to disciplinary action up to and including termination.
This Administrative Procedure shall be distributed to all new and existing employees. Nothing in this Procedure should be construed to interfere with First Amendment rights or with the academic freedom of faculty.
The District is responsible for making this Procedure readily accessible to all users prior to their use of the District Network. Abuse of computing, networking, or information resources contained in or part of the District Network may result in the loss of access to the District Network. Additionally, abuse can be prosecuted under applicable laws. Users may be held accountable for their conduct under any applicable Board Policies, Administrative Procedures, state and federal laws, or collective bargaining agreements. Complaints alleging abuse of the District Network will be directed to those responsible for taking appropriate disciplinary action. Illegal reproduction of material protected by U.S. Copyright Law is subject to civil damages and criminal penalties including fines and imprisonment.
System Abuse
Examples of system abuse include, but are not limited to, the following:
- Using a computer account that one is not authorized to use.
- Obtaining a password for a computer or application or system account that one is not authorized to have.
- Using the District Network to gain unauthorized access to any information technology systems.
- Knowingly performing an act which will interfere with the normal operation of applications, systems, computers, terminals, peripherals, or networks.
- Knowingly running or installing on any system or network, a program intended to take control of the computer(s) or systems, or giving to another user, a program intended to damage or to place excessive load on a system or network. This includes but is not limited to programs known as computer viruses, Trojan horses, zombie software, and worms.
- Knowingly or carelessly allowing someone else to use an account.
- Forging e-mail messages.
- Forwarding email specifically marked as confidential.
- Attempting to circumvent data protection schemes or uncover or exploit security loopholes.
- Masking the identity of an account or machine.
- Deliberately wasting computing resources by file sharing schemes, participating in e-mail chains, spamming, and/or excessive bandwidth usage.
- Intentionally accessing, downloading, displaying, uploading, or transmitting obscenity, as legally defined.
- Attempting without District authorization to monitor or tamper with another user’s electronic communications, or changing, or deleting another user’s files or software without the explicit permission of the owner, or any activity which is illegal.
- Personal use which is excessive or which interferes with the user’s or others’ performance of job duties, or otherwise burdens the intended use of the Network.
- Using the District Network for online gambling.
- Using the District Network for political purposes as set forth in Education Code Section 7054.
Harassment
- Using the District Network, including telephone, e-mail, or voice mail to harass or threaten others.
- Knowingly downloading, displaying or transmitting by use of the District Network, communications, pictures, drawings or depictions that do not constitute proper exercise of academic freedom or constitutionally protected free speech or expression which contain ethnic slurs, racial epithets, or anything that may be construed as harassment or disparagement of others based on their race, national origin, sex, sexual orientation, age, disability, religious or political belief.
- Knowingly downloading, displaying, or transmitting by use of the District Network sexually explicit images, messages, pictures, or cartoons which have the clear purpose of harassment or have been identified as harassment as the result of a formal investigation into the matter.
- Knowingly downloading, displaying or transmitting by use of the District Network sexually harassing images or text that do not constitute proper exercise of academic freedom or constitutionally protected free speech or expression which in a public computer facility, or location that can potentially be in view of other individuals.
- Using the District Network to publish defamatory information about another person.
Commercial Use
Using the District Network for any commercial activity, other than incidental or traditional commercial use, without written authorization from the District. “Commercial activity” means for financial remuneration or designed to lead to financial remuneration. Examples of “incidental or traditional commercial use” include but are not limited to:
- Electronic communication between an instructor who is an author of a textbook and his/her publisher.
- Electronic communication by a staff member who uses the District Network to communicate regarding a presentation at an educational conference or workshop, for which that staff member might receive an honorarium.
- Electronic use by a student of the District Network to seek a part-time or full-time job or career related to the student’s field of study, or to assist her/him in applying for such work.
- Electronic communication by a staff member to inform a colleague about a child’s candy bar fundraising sale for the child’s school.
- Using electronic resources to research and/or purchase supplies, equipment, or other items required for campus, District, or student use.
Copyright
- Violating terms of applicable software licensing agreements or copyright laws.
- Publishing copyrighted material without the consent of the owner on District websites in violation of copyright laws.
- Downloading of unlicensed or copyrighted movies or music for other than legally authorized uses or uses authorized by the District.
- Illegally downloading copyrighted material or information that would enable the unauthorized utilization of copyrighted material.
Exceptions
The interaction of a user’s personal computing equipment, connected to the District Network, is subject to this Procedure. Contents of a user’s personal computing equipment are subject to search by the District only by legal warrant.
There may be times when District employees may be exempted from certain provisions of this Procedure in order to perform their duties or assignments that are an established part of their job.
Should an employee be directed by a supervisor to perform an activity that they believe may be in violation of this Procedure, or if they are given a directive which inhibits the employee in performing his/her duties or assignments, the employee may request that the directive and/or permission for exception be put in writing and signed by the supervisor.
Activities by technical staff as authorized by appropriate District or college officials that take action for security, enforcement, technical support, troubleshooting, or performance testing purposes will not be considered abuse of the Network.
Although personal use is not an intended use, the District recognizes that the Network will be used for incidental personal activities and will take no disciplinary action provided that such use is within reason and provided that such usage is ordinarily on an employee’s own time, is occasional and does not interfere with or burden the District’s resources. Likewise, the District will not purposefully surveil or punish use of the network for union business-related communication between employees and their unions.
Complaints by Employees or Students Regarding Enforcement of this Procedure
An employee who asserts that the District or District personnel have violated this Procedure may file a complaint using the “Report An Issue” online form posted on the District web site under the Internal Audit department or by contacting the District Director Internal Audit. A student who asserts that the District or District personnel have violated this Procedure may file a complaint pursuant to the College’s student complaint process.
Ratified March 21, 2018
Ratified December 12, 2018
Ratified February 3, 2021
Higher Education Opportunity Act of 2008 (HEOA) Notification
It is the Coast Community College District’s intent to fully conform to the requirements of section 668.14 of the Higher Education Opportunity Act of 2008 (HEOA), commonly known as the Peer-to-Peer provision. The District maintains Policies and Procedures necessary to ensure that copyright violations and improper computer use are prohibited within the District and its colleges, and that Student users face possible disciplinary consequences for such unlawful use.
The District requires that each new user, including students, to affirmatively confirm, by use of a dialogue box at the time of log-in, that the user has reviewed the District’s applicable policies and the District’s HEOA Compliance Plan concerning peer-to-peer file sharing and copyright responsibilities as a necessary step for their logging onto District or its colleges’ computer networks.
Peer-to-Peer (P2P) File Sharing can Infringe Copyright Laws
Unauthorized use of, or distribution of copyright protected materials, including the use of Peer-to-Peer (P2P) software to distribute such protected materials, may be actionable in both criminal and civil courts, if a court determines that users have infringed on copyright protections. Copyright protections may be infringed through the practice of copying and distributing protected work without permission of the owner. If the student uses P2P software to infringe copyright, they may liable civilly and/or criminally for copyright infringement. There are significant economic and criminal penalties associated with copyright infringement actions.
Copyright infringement constitutes a severe violation of District policy and may subject the violator to the student disciplinary process. The student disciplinary actions that the District could take against student users are described in the Coast Community College District’s Student Code of Conduct. Please note that any disciplinary action taken against a student user by District under District policy does not prevent the content owner, or law enforcement from initiating a criminal or civil proceeding against the student. A content owner may bring an infringement claim, and by law would be entitled to a minimum of $750 for each infringement; if intent to infringe copyright is demonstrated, statutory damages may go as high as $150,000 per infringement.
Copyright infringements and unauthorized Peer-to-Peer (P2P) Activities will subject District Students to Discipline under the District’s Student Code of Conduct.
Intentional file sharing of material when the student user does not have the copyright holder’s permission is a violation of the District’s Computer Use Policy. Such a violation subjects the student user to the District’s Student Code of Conduct disciplinary process. District Policies and Student Disciplinary Procedures serve to protect the District, its Colleges, and other students from harm for the conduct of individual violators.
Users of file sharing programs should be aware of the criminal, civil, and student discipline liabilities that they create for themselves by using such programs on the District’s or its Colleges’ computer networks.
Student and Staff Email
As a form of communication, most email is not secure in the same manner as mail processed by the United States Postal Service and/or other primary carriers. Because of this fact, there should be no expectation of privacy. While the college takes precautions to protect the privacy of student's email address as well as their email correspondence, privacy cannot be assured. A good rule to follow when using email, in general, is to treat email correspondence similar to a post card instead of sealed envelope. Because of the manner in which email can be forwarded, it may easily become public information. As a public agency the college may be obligated to release copies of this type of correspondence based on provisions in the Freedom of Information Act and/or a related court order to provide certain records.
Coursework and Computers
Increasingly instructors and publishers are utilizing various forms of mediated instruction, assignments and or testing methodologies which require the use of a computer with Internet access as well as CD-ROM capabilities. The college provides a number of different ways for students to complete these types of mediated assignments. Frequently, students who have access to the Internet and computers with the necessary equipment complete their assignments off-site. Students wishing to complete assignments on campus may ask their instructor for suggestions regarding the most appropriate facility to complete that assignment. Additionally, students may inquire at the Student Computer Center in the Learning Resource Center (LRC), Student Success Center, any Open Lab, or the Public Library.