BELLINGHAM TECHNICAL COLLEGE
POLICY & PROCEDURES GUIDE
POLICY Acceptable Use of Information Technologies Previously 370.0 Acceptable Use of Information Technologies |
Section 242.0 Page 1 of 2 |
POINT OF CONTACT Administrative Services |
INITIAL DATE OF POLICY: 2/1997 |
RELATED POLICIES and/or PROCEDURES 216.0 Electronic Communications 369.0 Use of College Resources 527.0 Standards of Ethical Conduct/Conflict of Interest |
THIS PAGE WAS LAST REVISED ON: 03/05/2025 |
APPLIES TO Students, Employees |
WAC/RCW RCW 39.26.340, RCW 43.105, WAC 495B-121 |
Bellingham Technical College provides a variety of computing, networking and information systems for the use of students and employees in support of the mission of the College, research, academic development, professional growth in technology, information gathering, and communication. All students and employees are responsible for ensuring that these computing facilities are used in an effective, ethical, and lawful manner.
The College has established herein rules and prohibitions that define acceptable use of these systems. Unacceptable use is prohibited and is grounds for loss of computing privileges, as well as discipline or legal sanctions under Federal, State, and/or local laws, and College policies.
Bellingham Technical College adopts the NorthWestNet Acceptable Use Policy and the K20 Network Acceptable Use Policy. This policy is also governed by Bellingham Technical College’s Standards of Ethical Conduct/Conflict of Interest Policy.
Computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources and observe all relevant laws, regulations, and contractual obligations.
College information technologies are intended to support teaching and learning and College-related activities. All use should be conducted in a professional and ethical manner.
System administrators may access user files as required to protect the integrity of computer systems. For example, following organizational guidelines, system administrators may provide access to examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged. Also, files may be subject to search under court order.
Examples of responsible use include, but are not limited to:
Examples of misuse which are prohibited include, but are not limited to:
POLICY Acceptable Use of Information Technologies |
Section 242.0 Page 2 of 2 |
THIS PAGE WAS LAST REVISED ON: |
03/05/2025 |
Approval for exceptions to this policy for students needs to be coordinated through the student’s instructor and approved by the Director of Computer and Information Support Services. Approval for exceptions to this policy for employees must be coordinated through their supervisor and the Director of Computer and Information Support Services.