|
Proposer: Jonathan Lawrence |
|
|
Section: 2200s – Technology Advancement & Support |
Last Review Date: 10/2025 |
|
Responsible Area: Technology Advancement & Support |
Effective Date: 03/2026 |
|
Policy/policies the procedure is based on: 1138 |
Procedures that may be impacted by revisions: 2601, 2602, 2795 |
|
Revision History: 01/24/25, 10/2025 |
|
1.0 Scope
This procedure applies to all users of Northland Pioneer College [NPC] computer and electronic communication resources, including but not limited to employees, students, vendors, contractors, and members of the community who are granted access.
2.0 Purpose
This procedure defines standards for acceptable and unacceptable use of computer and electronic access for all individuals who are granted access to NPC technology resources, including employees, students, and authorized external users. These resources include the Internet, electronic mail, computer classrooms, associated software, and networks. Access to computer and electronic communication resources is a privilege provided at the discretion of NPC. Technology Advancement and Support [TAS] will work in cooperation with departments for computer setup, maintenance, and areas of security and permission. All material on NPC servers shall be accessible to authorized personnel when necessary to fulfill their administrative responsibilities. NPC maintains the rights allowed by all federal and state laws and institutional governance. NPC reserves the right to monitor network resources and to prohibit use.
3.0 Definitions
3.1 Computers - A device issued by NPC that enables users to access the Internet, electronic mail, computer classrooms, associated software, and networks. This includes, but is not limited to desktops, laptops, and tablets.
4.0 Procedure
Internet, computing, and network accounts are generally available to faculty and staff, registered students, and authorized guests. Accounts are for the sole use of the individual to whom the account is issued. Generic accounts are used for access to third-party student testing services and authorized classroom instructional use, which must be approved by the appropriate dean and vice president. Users must follow all NPC data security and usage policies.
Acceptable use:
- To support educational objectives and enhance the mission of NPC.
- To conduct official NPC business.
- To support teaching and learning.
- To serve the information and communication needs of the community.
- To deliver instructional content.
- To disseminate information about NPC.
Unacceptable Use:
- Plagiarism, falsification, forgery, or unauthorized modification of NPC-related documents, including the NPC logo; unauthorized use of the college name; false representation; unauthorized use of the account or files of another individual; and forgery to conceal identity.
- Electronic mail chain letters or spamming.
- Installation and use of unauthorized computer software or hardware.
- Use for personal financial gain or for private commercial activities apart from approved coursework or contracted services.
- Playing network games, entertainment streaming and using high-resource applications, including printing multiple copies or excessive copies.
- Destruction, impairment, misuse or changes in configuration of computer hardware or software; actions which obstruct, disrupt or interfere with NPC activity; circumvention of data and software protection schemes.
- Any illegal activities, including but not limited to hacking, harassment, obscenity, pornography, violation of privacy, violation of copyright protection.
- Storing or downloading files, software, or documents on the hard drives of computers open to public access.
- Traveling with NPC issued computer hardware outside the continental United Stateswithout prior authorization by completing the NPC Computer Device Out of Country Use Exemption form.
- Using personal devices to store college-related data or applications. An exception is made for the use of personal mobile devices solely for Multi-Factor Authentication (MFA) purposes.
- Failing to follow established guidelines for computer use.
This is not intended to be an all-inclusive or exhaustive list of matters to consider.
Any activity violating state or federal laws, NPC’s Codes of Conduct (eg Procedures 2601 and 2602),
Employee Handbook, or NPC Acceptable Use Policies and Procedures, where applicable, may result in disciplinary action, including loss of access and repair charges.
Employees will be required to sign a statement of understanding at hire and then annually when contracts are renewed.
Hybrid and remote employees must abide by the acceptable uses defined in this procedure and in Procedure 2795.
5.0 Inquiries
Direct inquiries about this procedure to: Chief Information Officer [CIO]

