5100 Software Licensing Compliance

Original Date: 6/10/2003 * Last Revision Effective: 10/7/2020
Policy Contact: Vice President, Information Technology Services


Bellevue College expects all users of college technology to comply with applicable federal, state, and local laws governing copyrighted material, including computer software applications. The college complies with Washington State Office of the Chief Information Officer (OCIO) security polities; Title 17 U.S.C. (the Copyright Act); and all related laws, amendments, and policies as they apply to software licensing and copyright.


This policy applies to all employees, students, and non-employees who are authorized to use college technology assets. This includes the use of any computing systems and networks belonging to the college, to the state of Washington, and to any other systems entrusted to the institution by other organizations.

The use of college information technology assets, including software, is strictly for the purpose of facilitating the exchange of information and furtherance of the educational, research, public service and administrative missions of the college.

This policy is not intended to limit academic freedom in any way, nor is it the intent of this policy to impinge on individual intellectual property rights or the rights of authorized software users. This policy and its procedures provide an appropriate framework for the proper exercise of those freedoms and supplements college policy #3600, Copyright and the Right of Fair Use.

Software Ownership

Bellevue College is the sole licensee of all software purchased using state funds or grants where the college is the fiscal agent. The purchasing authority for technology, including software, has been delegated to the vice president of administrative services or their designee, who is authorized to negotiate and sign software licensing agreements on behalf of the college.


Software may not be copied, reproduced or transmitted through or onto Bellevue College information technology assets unless allowed by this policy. Installations of software for which legitimate verification of ownership or license cannot be documented, software that is unlawfully obtained or is not permitted by the software license is strictly prohibited.


All definitions pertaining to this policy, and to all information security policies, procedures and standards, are centralized in the ITS – Information Security Definitions document.

Relevant Laws and Other Resources

Revision History

Original 6/10/2003
Revision 11/24/2008; 5/21/2009; 07/28/2012; 9/11/2012′ 4/28/2015; 10/7/2020

Approved By

Board of Trustees

Last Updated October 8, 2020