The College owns all Clover Park Technical College computing systems and applications. This policy is intended to provide users with guidelines for responsible and appropriate utilization of these campus computing and technology resources. This policy supplements Use of State Resources WAC 292-110-010, Student Conduct Code WAC 495C-120, CPTC policy Ethical Conduct, and Ethics in Public Service RCW 42.52. CPTC reserves the right to determine, at any time, what constitutes appropriate use of technology resources, network resources, access and/or services provided by CPTC.
This policy applies to all CPTC employees, students and/or non-employees who may be authorized to use technology resources. They shall be notified in writing of these policies before being granted permission to access these resources.
Use of CPTC resources shall be for the purpose of facilitating the exchange of information and furtherance of the College mission.
This policy is adopted in order to help assure the integrity and reliability of network systems, ensure the security and privacy of network systems, and ensure the protection and retention of sensitive data.
These procedures apply to all Clover Park Technical College employees, students and nonemployees who may be authorized to use computing resources. Permission for use forms can be found on the staff intranet at (Request for Administrative Access Form and Network Account Form) http://staff.cptc.edu/forms.
Information and communication resources are those computers, computer software, networks (including access to external networks such as the Internet), and electronic messaging systems (email, telephone, telephone voice mail, facsimile, and imaging systems) operated by and for the benefit of students, faculty and staff of the college.
General provisions for use of college information and communication resources:
Given sufficient cause the Vice President for Finance & Administration or his/her designee has the right to obtain access to materials stored on the Clover Park Technical College network or computers. Such access may be necessary to conduct College business, and/or to investigate a suspected illegal act or violation of policy. These materials may be gathered with or without notification to the employee.
Violations of the policy and/or this procedure may result in: