Admitted students experienced Birmingham-Southern at the Select 'Southern event held on March 1-2, 2015.
Admitted students experienced Birmingham-Southern at the Select 'Southern event held on March 1-2, 2015.
Birmingham-Southern College recognizes the role of information and technology in the academic community and in the larger society. It is the policy of the College to provide all students, faculty and staff with access to a variety of technology resources and to provide opportunities for all members of the College community to learn to utilize these resources effectively and efficiently. In return, the College expects that technology will be used in legally and ethically appropriate ways, consistent with the Mission Statement of the College. This document explains and defines policies for use of technology resources of the College.
General Policy Statement
The primary aim of the College in providing information and technology resources is to support the educational, instructional, and administrative endeavors of the students, faculty, and staff of the College. It is the intent of the College that all technology resources will be used in accordance with established policies of the College and with any and all local, state, and federal laws, and/or guidelines governing the use of technology and its component parts. Implicit in this is the expectation that all students, faculty, and staff will utilize the technology resources of the College so as not to waste them, abuse them, or interfere with or cause harm to other individuals, institutions, or companies. As is the case with most community resources or facilities, users are expected to balance their own needs against the needs and expectations of other users.
As an academic community, the faculty, students, and staff of Birmingham-Southern College honor intellectual property, respect the privacy of data, and recognize the rights of others. Individuals who access College computing resources incur the responsibility to use those resources in an ethical manner. This policy (or electronic code of ethics) requires all computing activities performed on College equipment to be legal and ethical. The policy is based on adherence to U.S. copyright laws and respect for intellectual labor and creativity as vital elements of the academic enterprise.
Abuse of computing privileges is subject to disciplinary action which may include the loss of computing privileges and other disciplinary sanctions. Flagrant student offenses may be reported to the Honor Council, faculty offenses to the Provost, and staff offenses to the Director of Human Resources. An abuser of the College's computing resources may also be liable for civil or criminal prosecution. It should be understood that nothing in these guidelines precludes enforcement under the laws and regulation of the State of Alabama, any municipality or county therein, and/or the United States of America.
Access to College Technologies
The electronic resources and technologies of the College are intended for the use of students, faculty, and staff of the College. Use of such resources is limited to these members of the College community. Authorized users are assigned user accounts and passwords by the Department of Information Technology (email@example.com). Individuals may only use accounts, files, software, and computer resources that are assigned to them under their user accounts. Individual members of the College community are expected to take all reasonable precautions to prevent unauthorized access to files and data and any other unauthorized usage within and outside the College.
It shall be considered a violation of this policy and/or of the BSC Honor Code to:
The appropriate system administrator may remove or alter as necessary user files that threaten to interfere with the operation of the system or as needed for system maintenance. The system administrator should make every effort to notify the user prior to such action to give the user opportunity to remove such files him/herself. It is recognized that there may be special cases where the threat to the efficacy of system resources is so immediate that prior notification is not possible.
Published material is protected by copyright law unless it has been placed in the public domain. The owner of a copyright holds exclusive right to the reproduction and distribution of the copyrighted work. Duplication of any copyrighted material is prohibited unless specifically allowed for in a license agreement. Unauthorized copying of copyrighted material is illegal and punishable under federal law.
Respect for the intellectual work and property of others has traditionally been essential to the mission of educational institutions. As members of the academic community, we value the free exchange of ideas. Just as we do not tolerate plagiarism, we do not condone the unauthorized copying or distribution of protected materials, including software, media, and code.
Only authorized personnel may sign license agreements. Questions about site licenses should be directed to the Information Technology helpdesk.
Users should assume all materials on the web are copyrighted unless there is a waiver or disclaimer that is clearly stated by the owner. Copyrighted works on a web page cannot be used without express permission of the copyright owner. Copyright works may include: artwork, articles, cartoons, photographs, music, videos, films, and graphics scanned or used from published works or web sites. It is illegal under Federal law (Title 17 of the US Code, and more recently the Digital Millennium Copyright Act, 105 PL 304) to distribute copyrighted media without a license to do so from the copyright holder. Furthermore, it is a violation of College policy to use the campus network for illegal activities, or in ways that consume capacity and services needed for instruction, research, and other core purposes.
Shareware, or "user-supported" software, is copyrighted software that the developer encourages you to copy and distribute to others. This permission is explicitly stated in the documentation or displayed on the computer screen. The developer of shareware generally asks for a small donation or registration fee if you like the software and plan to use it. By registering, you may receive further documentation, updates, and enhancements. You are also supporting future software development.
Public Domain Software is that software that has been dedicated by the authors to the public domain, which means that the software is not subject to any copyright restrictions. It can be copied and shared freely. Before copying or distributing software that is not explicitly in the public domain, check with the Department of Information Technology (firstname.lastname@example.org)
As an academic institution, the College honors the principles of individual privacy. These principles extend to privacy of electronic communication. It is expected that individuals who are given access to College computing resources will be responsible in the ethical use of those resources.
The Computer Usage Policies in the Faculty, Staff, and Student Handbooks require all computing activities performed on College equipment to be legal and ethical.
A. General Policies
The following guidelines express the essence of the usage policies for electronic mail. Those who violate any of these policies may be subject to disciplinary action through existing structures for faculty, students, and staff.
It is a violation of the Birmingham-Southern College Computer Usage Policies for Electronic Mail to:
Please refer to Appendix A for E-mail etiquette guidelines.
B. Guidelines for Operators, Postmasters, Systems Administrators
Computer systems automatically forward all undeliverable mail to the designated "postmaster." This is a standard feature of mail systems in order to provide the equivalent of the "dead letter" office. When possible, the postmaster will forward mail (from the dead letter office) to one or both of the involved parties.
It is a violation of the BSC Computer Usage Policies for Electronic Mail to:
Even with proper permission, messages contained within files shall only be read to the extent needed to assist the user involved.
If a system administrator or postmaster of the BSC System, in the performance of normal duties, comes upon messages whose content are clearly illegal, the computer usage policies extend the right and responsibility to report these messages to the appropriate campus committee or to the Campus Security Office. Examples might include messages containing illegally obtained credit card numbers, telephone authorization codes, grade reports, criminal conspiracy, or similar items. Such items might be discovered as part of user consultation, dead-letter processing, or other tasks. Random mail browsing of electronic or voice communications shall always be in violation of the BSC Electronic Mail Computer Usage Policies and is never authorized.
A person's user-name and e-mail address are considered to be directory information that can be given to other individuals. This information can be withheld by contacting the Office of Records and Research. User-names and e-mail addresses will not be distributed for purposes of mass mailing or advertising.
The College will seek to provide a reasonable amount of privacy of electronic mail messages. However, e-mail users should be aware that there is no such thing as a fully confidential e-mail transmission. Sensitive, private messages should not be sent via e-mail. Moreover, violations of the College computer usage policies may jeopardize the guarantee of privacy.
The College provides access to the Internet for students, faculty, and staff of the College to further its educational goals and to facilitate the instructional and administrative process. Individuals accessing the Internet through the College facilities are expected to do so in a responsible and ethical manner and to conform to all established policies. Inappropriate use includes, but is not limited to: commercial activities; creating, displaying, or transmitting threatening, obscene, or harassing language and/or materials; copyright and licensing violations; violation of personal privacy; and acts in violation of federal or state laws.
By using Birmingham-Southern College computing and network resources, each user implicitly accepts all stipulations in this policy and accepts full responsibility for his or /her use and/or misuse of these resources. The College considers each user to be ultimately responsible for his or /her actions, and does not accept liability for the individual. Furthermore, although a reasonable and conscientious effort is made to backup critical data on College resources for disaster recovery purposes, each user is ultimately responsible for backing up his or /her own personal data.
E-mail Etiquette Guidelines
Rev. February 13, 2002
Didn't find your answer?
Call the IT helpdesk at 205-226-3033, Monday-Friday 7:30am to 4:00pm
Student personal computer support is available through Apogee 24x7 at 1-877-478-8861.