Acceptable Use of Electronic Networks Policy
This policy applies to all users of the College computing and electronic networks resources, whether affiliated with the College or not, and to all uses of the system, on the campuses or from remote locations. By using the computing resources of the College users consent to use such resources in accordance with and subject to this Acceptable Use of Electronic Networks Policy (Policy).
Access to and use of the Delaware Technical Community College computing and electronic networks resources are privileges granted to students, staff, faculty and members of the College community for academic, research, operational and administrative purposes. Electronic networks are comprised of computing facilities, equipment, systems and personnel. Use of these resources includes accessing list servs, World Wide Web pages, electronic mail, application software, and any other electronic communication. Use of the Delaware Tech computer and electronic networks is a privilege and all members of the College community who utilize these resources are expected to do so in an efficient, effective, appropriate, ethical, and legal manner that supports the mission of the institution
Failure to adhere to this Policy, applicable State, local government and Federal laws and regulations, other College Board of Trustees policies and related administrative procedures may result in suspension or revocation of network privileges. Willful or intentional misuse could result in disciplinary action or criminal prosecution under applicable state and federal statutes. Additional policies and procedures may apply to specific computers or computer systems at the various College property locations. Delaware Tech will not provide a legal defense for any illegal use of its electronic facilities, equipment, or software, or any activities found to constitute violations of this Policy
Users who violate this policy may be subject suspension and/or revocation of network privileges, to disciplinary action, up to and including dismissal, for staff and faculty, as outlined in the College Personnel Policy Manual and for students, the Student Rights and Responsibilities Policy outlined in the College Catalog and may be subject to criminal prosecution.
All users of the College electronic networks must:
- Comply with all federal, state, and other applicable laws; all applicable Delaware Technical Community College policies and procedures; and all applicable contracts and licenses. These laws, policies, and licenses include, but are not limited to, the areas of libel, copyright, privacy, obscenity, and child pornography; the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act, which prohibit unauthorized "hacking", "cracking", and other similar acts The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT ACT) which authorizes electronic eavesdropping; the College Personnel Policy Manual, which includes the College's Policy Statement on Sexual Harassment and Conduct and Corrective Action; the College's Student Rights and Responsibilities policy, the State of Delaware Acceptable Use Policy; and all applicable computer contracts and software licenses, which prohibit the distribution of "warez" (copyrighted software).
- Utilize only those electronic resources authorized by the College and use those resources in the manner and to the extent of that authorization. All accounts assigned to users are non-transferable. All accounts and passwords must be kept confidential and may not be released to or shared with any other party other than those authorized by the College. A user's ability to access College networks, resources, and accounts do not imply authorization to do so. It is the responsibility of users to secure all necessary and proper authorizations before proceeding on College systems.
- Refrain from using College resources for any commercial activities or for personal financial purposes. These restrictions include, but are not limited to, conducting a business enterprise from the system, sending commercial advertising messages, or solicitations for non-College related organizations from the system.
- Utilize all electronic and computing resources efficiently. The College reserves the right to monitor usage and content, restrict and/or prohibit excessive non-academic or non-work related use of the network for downloading or transferring files or to impose or to apply other limitations or restrictions on computing resources such as time limits, storage space or amount of particular resources consumed by users to ensure legal and effective administration of the systems and fair access for all users.
- Refrain from stating or implying that they speak on behalf of or represent Delaware Technical Community College without proper authorization to do so. This prohibition includes use of the College logo in computer communications. Use of College computing and electronic networks and affiliation with College programs does not imply authorization to represent the College to outside organizations. Use of the official College logo or seal on College electronic resources may only be authorized, in advance, by the Vice President and Campus Director at the campuses and by the President for the Office of the President or when applicable to college-wide projects.
Electronic mail and other Network Activity (Use of the Internet) - Delaware Technical Community College utilizes numerous measures to maintain the integrity, security, and effective operations of its electronic mail systems. Users are advised, however, that in light of both these efforts and the College's intent to limit network use to the purposes stated in this Policy, the e-mail systems and network usage in general should in no way be regarded as a secure or private medium for the communication of confidential or sensitive information. Due to the nature of electronic communication, system users may not expect individual communications or activities on the College system nor the confidentiality of specific messages that may be created, sent, received, or stored in the system to be or remain private.
In addition, all users are advised that, while the College does not routinely monitor individual usage of computing resources, it reserves the right to monitor activity when: 1) the maintenance and standard operations of the system require the backup of data and communications, the logging of system activity, monitoring of general usage patterns, and 2) in circumstances where the College has reason to believe that network usage may be in violation of this Policy and other procedures required in the administration of the system. In addition, the College may also monitor the activity and accounts of specific users when: it appears to systems administrators necessary to do so to protect the security, integrity, and effectiveness of the systems; it is deemed necessary to protect the College from civil or criminal liability; there is reasonable cause to believe that violations of the College Electronic Networks Policy (including violations of State, local or federal law or applicable College policy) has occurred; an account displays an unusual amount of activity as indicated from general systems monitoring or specific usage patterns; or, it is permitted or required by law.
The College, when it deems necessary or proper may disclose the results of such monitoring activities to an appropriate College administrator or law enforcement agency and may use this information in relevant disciplinary proceedings. In addition, electronic mail may qualify in certain circumstances as a public record subject to public disclosure under applicable laws, including all Freedom of Information statutes.
Only College administrators, faculty, staff, students, and other individuals, who have received permission under the appropriate systems administrator, are authorized users of the College electronic mail system or network. All authorized users must identify themselves accurately and clearly in communications. Concealing or misrepresenting one's identity or using the identity of another user or individual on the College system is prohibited and considered a violation of this policy.
The use of any College network resources must be related to College business. Incidental and occasional personal use of the network including the use of electronic mail may occur when such use does not create an unreasonable direct cost to the College and is not inconsistent or interfere with the user's primary function as student, staff, faculty or administrator. Such incidental and occasional communications are subject to the provisions of this policy.
Delaware
Tech employees will not retain access to their College email account and address once they have separated from the College. Exceptions may be approved by the President of the College. Employees who separated from the College prior to April 12, 2022 are grandfathered and will be allowed to retain their email account and address until December 31, 2023, at which point they will be deactivated. (Board of Trustees, April 12, 2022)
Prohibited uses of the Delaware Tech electronic mail and network system include, but are not limited to, the following activities:
a) using foul, profane, obscene, offensive or defamatory language;
b) sending copies of documents or using materials in violation of copyright laws;
c) using the system to harass, intimidate, or interfere with the employment duties or learning process of others;
d) attempting unauthorized access to the email system, attempting to breach security measures on any external email system, or attempting to intercept electronic mail communications;
e) attempting to access, disrupt, or destroy the College's or other computer systems or files malicious code attacks or other means;
f) using the system for personal financial gain, outside commercial venture, or illegal activity or for any activity that violates a State, local or federal law or regulation or constitutes a violation of this Policy or an other College policy;
g) forwarding chain letters and sending mass electronic mailings or using the system for open mail relay; individual users may request prior permission from the systems administrator to send electronic mailings to more than 100 recipients on a case by case basis.
h) excessive non-academic or non-work related use of the network for downloading, sharing or transferring large files.
The individual systems administrators at the campuses and in the Office of the President will investigate and document apparent or alleged violations of the College Acceptable Use of Electronics Networks Policy. The systems administrators may temporarily suspend a user's access to the system pending the outcome of an investigation of misuse. Identified cases of alleged abuse of any system will be referred to the user's Dean or Director, who will consult with the campus Director of Human Resources regarding appropriate action and immediately notify the Vice President and Campus Director of the alleged violation. For alleged violations in the Office of the President, the administrator will consult with the Chief Legal Counsel for appropriate action and who will also notify the President. In the event the case involves a student, the matter will be referred to the campus Dean of Student Affairs for further investigation, appropriate action, and who will immediately notify the Vice President and Campus Director
Deactivating technology services for students outside of the readmit window for Credit and Non-Credit Students
In accordance with the College’s readmission policy,
- After four (4) consecutive semesters with no registration activity, student accounts would be deactivated, and all email, network, Google Drive and MS 365 data would be purged. Data within the Student Information System (SIS), learning management system (D2L), and early alert systems is retained.
- Deactivated student accounts will need to reapply to the College.
Admitted Students’ accounts that have not registered for the semester they applied for will be deleted if they do not register by part of term 3 for Fall and Spring or by part of term 4 for Summer.
The following definitions shall apply to this policy:
a. Prospective Student- a student who has submitted an application but has not yet been accepted by the College.
b. Admitted Student – a student whose application has been accepted by the College.
c. Active Student – a student who has registered for a course.
d. Graduate/Alumni - a student who has completed a certificate, diploma or degree.
Provisioning Table of Student Information Technology Systems and Services
|
Prospective |
Admitted Student |
Active Student |
Portal (MyDTCC) - Full |
No |
No |
Yes |
Portal (MyDTCC) - Announcements |
No |
Yes |
Yes |
LMS (D2L) |
No |
No |
Yes |
SIS |
No |
Yes |
Yes |
Early alert system |
No |
Yes |
Yes |
Electronic forms |
No |
Yes |
Yes |
Email |
No |
Yes |
Yes |
MS 365 |
No |
No |
Yes |
Google Drive/Calendar |
No |
No |
Yes |
Note: Only non-credit students that are enrolled in a course/activity that uses the LMS (D2L) will be given an email account and LMS access. All other students will not have an account generated.
For the purpose of enforcing this policy, the "systems administrators" are: the Chief Technology Officer, or their official designees.
Any questions regarding this policy should be directed to: the Chief Technology Office or the Chief Legal Counsel. (Added Board of Trustees 9/19/1998; Amended Board of Trustees, 4/16/2002, 4/12/2005 and 1/16/24)