Original Date: 6/10/2003 * Last Revision Effective: 6/24/2015
Policy Contact: Vice President, Information Technology Services
Bellevue College technology users are trusted to safeguard all state resources, including physical information technology and electronic files and records that are stored on college systems.
All access to and use of college-owned information technology is intended for the conduct of official college business. Users are expected to maintain the integrity and reliability of college information technology and preserve the security and privacy of college information.
This policy and the procedures established to implement its requirements supplement Bellevue College policy #4400 – Acceptable Use of State Resources; all of its tenets and any other college policies, procedures and/or standards, including the Agreement between the Board of Trustees of Bellevue College District VII and Bellevue College Association of Higher Education, apply to the use of technology assets.
The college reserves the right to determine what constitutes appropriate use of its information technology, and will implement additional policies and procedures as needed to ensure such appropriate use, and to guarantee compliance with Public Law 93-380, the Family Educational Rights and Privacy Act of 1974 (FERPA), which establishes the confidentiality and proper handling of student education records.
All users shall be notified in writing of these policies before being authorized to access any college information technology resources.
This policy and its procedures apply to all college employees, students and non-employees who may be authorized to use any college-owned information technology or system. It also applies to the use of all applicable state resources at any college facilities, as defined by state or federal law.
Its principles extend to and include any use or attempted use of college information technology, whether accessed from on or off-campus. Campus users shall also apply this policy when using college information technology to navigate to networks beyond local college systems.
As with the Acceptable Use of State Resources policy, it is not the intent of this policy or its associated procedures to limit academic freedom in any way, or to impinge on the intellectual property rights of authorized users, but instead provides an appropriate framework for proper exercise of those freedoms.
Authorized users may:
- Use college-owned networks (including access to the internet), computers, programs and electronic information to which each individual has authorized access; and
- Use college information technology in a manner that is consistent with the mission and educational purpose of the college.
Employees should take no actions incompatible with their obligations to the public and should take care to use college information technology only for authorized purposes.
Human Resources (HR) Vice President
Will provide oversight for policy development related to employees and to enforce compliance with all college policies, as well as federal, state and local regulations. The HR VP will review updates and changes to this policy and its procedures in light of current college policies, providing guidance on its implications for employees and other affected individuals or groups.
Student Services (SS) Vice President
Will review updates and changes to this policy in light of applicable student data management policies, providing input on the policy and its implications for students and other affected individuals or groups.
Information Technology Services (ITS) Vice President
Has responsibility for maintenance and administration of this policy. ITS will draft updates and changes to this policy and its associated procedures when required, with input from the Technology Advisory Committee. Changes will be approved following relevant campus procedures.
The ITS VP also will delegate responsibilities to authorized employees for the support and management of all campus information technology in accordance with the guidelines in college policies and procedures.
All users of information technology owned by Bellevue College have a responsibility to:
- Comply with all college policies, procedures and standards, including those pertaining to acceptable use;
- Actively participate in appropriate use of information technology;
- Report security breaches and violations of security policies; and
- Understand their responsibilities and all expectations as articulated in college policy #4400: Acceptable Use of State Resources.
All terms defined in policy #4400 – Acceptable Use of State Resources are applicable in this policy. In addition, all definitions pertaining specifically to information security policies, procedures and standards are centralized in the 220 – Information Security Definitions standards document.
Relevant Laws and Other Resources
- Family Educational Rights and Privacy Act of 1974 (FERPA)
- Revised Code of Washington
- Washington Administrative Code
- Washington State Ethics Board Rules, especially WSR 09-16-046
- Agreement between the Board of Trustees of Bellevue College District VIII and Bellevue College Association of Higher Education
- Policy #1500 Access to Public Records
- Policy #2600 Family Education Rights and Privacy Act: Disclosure of Student Information
- Policy #4400 Acceptable Use of State Resources
- Procedure #5150P Acceptable Use of Information Technology (Procedures)
- Standard #220 Information Security Definitions
Revisions 3/22/2005; 9/20/2005; 5/21/2009; 7/28/2012; 9/11/2012; 4/28/2015; 6/24/2015
Board of Trustees
Last Updated September 17, 2018