The major policy governing use of technology at Oakton is the Policy for Responsible Use of Information Technology at Oakton. A number of guidelines have been created that point out specific aspects of this policy. In addition, Oakton technology users must comply to all copyright law.
Faculty must also follow the Guidelines for Appropriate Use of Employee Email Groups (PDF) (49 KB).
(adopted by the Board of Trustees of Community College District 535 in March 1994 as Policy 8330.2; renumbered as Policy 1106 on 7/1/01; renumbered as Policy 1107 in 2009.)
In pursuit of its mission of offering exceptional teaching, educational excellence, and public service, the Board of Trustees of Oakton College ("Oakton" or the "College") provides access to information technology facilities and resources for students, faculty members, staff members, and other authorized users within institutional priorities and financial capabilities.
Access to the College's information technology facilities and resources is a privilege granted to College students, faculty members, staff members, and other authorized users. Access to College information technology facilities and resources may be granted by the data owners of that information based on the data owner's judgment of the following factors: relevant laws and contractual obligations, the requester's need to know, the information's sensitivity, and the risk of damage to or loss by the College.
The College reserves the right to extend, limit, restrict, or deny computing privileges and access to its information resources. Data owners—whether departments, units, students, faculty members, or staff members—may allow individuals other than College students, faculty members, and staff members access to information which they own or for which they are responsible, so long as such access does not violate any license or contractual agreement; College policy; or any federal, state, county or local law or ordinance.
College information technology facilities and resources are to be used for the College-related activities for which they are intended and authorized. College information technology facilities and resources are not to be used for commercial purposes or non-College-related activities without written authorization from the College. In these cases, the College will require payment of appropriate fees. This policy applies equally to all College-owned or College-leased computers and peripherals.
Information technology provides important means of communication, both public and private. Authorized users and system administrators will respect the privacy of person-to-person communications in all forms, including voice (telephone), text (electronic mail and file transfer), and image (graphics and television). The principle of academic freedom will apply to public communications in all these forms for faculty members. In accordance with guidelines in the procedure, the College may monitor individual usage of any information technology facilities and resources. The College reserves the right to monitor and record the usage of all information technology facilities and resources if threatening or abusive behavior has been reported.
All members of the College community who use Oakton's information technology facilities and resources must act responsibly in their use of the resources. Every user is responsible for the integrity of the resources. All users of College-owned or College-leased information technology facilities and resources must respect the rights of other users, respect the integrity of the physical facilities and controls, and comply with all pertinent licenses and contractual agreements. Oakton's policy requires that all members of its community act in accordance with these responsibilities, relevant laws and contractual obligations, and the highest standard of ethics.
Authorized users and system administrators must all guard against abuses that disrupt or threaten the viability of any and all systems, including those at the College and those on networks to which the College's systems are connected. Access to information technology facilities and resources without proper authorization from the data owner(s), unauthorized use of College computing facilities, and intentional or negligent corruption or misuse of information technology facilities and resources are direct violations of the College's standards for conduct as outlined in Oakton College Policies and Procedures, College collective bargaining agreements, and the Student Handbook and may also be considered civil or criminal offenses.
The President is responsible for supervising the adoption of guidelines to implement this policy. System administrators may adopt additional guidelines for the use of their own systems.
Alleged violations of this policy will be processed according to the judicial processes outlined in the Oakton College Policies and Procedures Manual, College collective bargaining agreements, the Student Code of Conduct, and the Code of Academic Integrity. Oakton treats access and use violations of information technology facilities and resources seriously. Oakton will pursue criminal and civil prosecution of violators as it deems necessary.