5150 Acceptable Use of Information Technology

Original Date: 6/10/2003 * Last Revision Effective: 5/19/2021
Policy Contact: Vice President, Information Technology Services

Policy

Bellevue College technology users are expected to safeguard all state resources, including physical information technology and electronic files and records that are stored on college systems.

College-owned information technology, including networks, access to the Internet, computers, programs, and electronic information, should be used in a manner consistent with the mission and educational purpose of the college. Users are expected to maintain the integrity and reliability of college information technology and preserve the security and privacy of college information.

The college reserves the right to determine what constitutes appropriate use of its information technology. All users will be notified in writing of these policies and associated procedures before being authorized to access any college information technology resources.

Applicability

This policy and associated procedures apply to all college employees, students, and non-employees who may be authorized to use any college-owned information technology or system through BC login credentials and/or additional permissions, whether accessed from on or off-campus. Campus users should also apply this policy when using college information technology to navigate to networks beyond local college systems.

Responsibilities

  • Vice President of Huma Resources (VP HR)
    The VP HR is responsible for addressing violations of BC Policy 5150, Acceptable Use of Information Technology, and its associated procedures, when those violations involve employees.
  • Student Conduct Officer
    The student conduct officer is responsible for addressing violations of BC Policy 5150, Acceptable Use of Information Technology, and its associated procedures, when those violations involve students.

Definitions

All definitions pertaining specifically to information security policies, procedures and standards are centralized in the terms defined the Information Security Definitions document.

Relevant Laws and Other Resources

Revision History

Original 6/10/2003
Revisions 3/22/2005; 9/20/2005; 5/21/2009; 7/28/2012; 9/11/2012; 4/28/2015; 6/24/2015; 5/19/21

Approved By

Board of Trustees

Last Updated May 20, 2021