Page 9 - Student Organizations Manual

A political party or political candidate may not display literature within 25
feet of a voter registration area.
Each political candidate may reserve the atrium area once per election.
Each political party can reserve the atrium area once per election. Note:
When only one candidate is being considered in a political party, only one
display in the polling booth area is permitted.
As set forth in Title XIII of the Student Code of Rights and Responsibilities, students
must gain the “express authorization of the college” in order to use the Birmingham-
Southern College name, logo or anything bearing the identity of the college. This in-
cludes, but is not limited to, an event, a sign, clothing apparel, and cups. Before using
the Birmingham-Southern identity, students must notify the Dean of Students and
gain subsequent approval from the Office of Student Affairs. Violations of this policy
will result in disciplinary action.
Technology Resources
The primary aim of the college in providing information and technology resources is to
support the educational, instructional, and administrative endeavors of the students,
faculty, and staff of the college. It is the intent of the college that all technology re-
sources will be used in accordance with established policies of the college and with
any and all local, state, and federal laws, and/or guidelines governing the use of tech-
nology and its component parts. Implicit in this is the expectation that all students,
faculty, and staff will utilize the technology resources of the college so as not to waste
them, abuse them, or interfere with or cause harm to other individuals, institutions, or
companies. As is the case with most community resources of facilities, users are ex-
pected to balance their own needs against the needs and expectations of other users.
As an academic community, the faculty, students, and staff of Birmingham-Southern
honor intellectual property, respect the privacy of data, and recognize the rights of oth-
ers. Individuals who access college computing resources incur the responsibility to use
those resources in an ethical manner. The policy (or electronic code of ethics) requires
all computing activities performed on college equipment to be legal and ethical. The
policy is based on adherence to U.S. copyright laws and respects for intellectual labor
and creativity as vital elements of the academic enterprise.
The electronic resources and technologies of the college are intended for the use of
students, faculty, and staff of the college. Use of such resources is limited to those
members of the college community. Authorized users are assigned user accounts and
passwords by the Information Technology staff. Individuals may only use accounts,
files, software, and computer resources that are assigned to them under their user ac-
counts. Individual members of the college community are expected to take all reason-
able precautions to prevent unauthorized access to files and data and any other
unauthorized usage within and outside the college.
It shall be considered a violation of this policy and/or of the BSC Honor Code to:
Use someone else’s password or log into someone else’s account without au-
thorization, except as may be required by management system resources.
Attempt to gain access to computing privileges or resources for which you are not
authorized or via means not authorized.
Give others access (via password or othermeans) to computing resources towhich
they are not entitled.
Damage or destroy software or hardware without authorization.
Read, executemodify, or delete any file belonging to someone elsewithout explicit
permission from the owner, even if the file is unprotected.
Use a system for unauthorized purposes, such as advertising for a commercial or-
ganization or running a business.
Move or install hardware or software without authorization.
Create, display, or transmit obscene, libelous, or threatening messages or mate-
rials on the college’s computer equipment.
Attempt to crash system or exploit weaknesses in security.
Make unauthorized copies of software that is copyrighted.
Misuse technology resources in any way that materially impacts on the efficacy
of use for others.
Modify technology resources, utilities, and/or configurations, or to change the
restrictions associated with their accounts, or attempt to breach any technology
resources security system, whether with or without malicious intent.
The appropriate system administrator may remove or alter as necessary user files that
threaten to interfere with the operation of the system or as needed for systemmainte-
nance. The system administrator should make every effort to notify the user prior to
such action to give the user opportunity to remove such files him/herself. It is recognized
that there may be special cases where the threat to the efficacy of system resources is
so immediate that prior notification is not possible.
Birmingham-Southern College recognizes the role of information and technology in the
academic community and in the larger society. It is the policy of the college to provide
all students, faculty, and staff with access to a variety of technology resources and to
provide opportunities for all members of the college community to learn to utilize these
resources effectively and efficiently. In return, the college expects that technology will
be used in legally and ethically appropriate ways, consistent with the mission state-
ment and goals of the college.
Birmingham-SouthernCollege encourages student groups to have andmaintain aweb-
site for their student organization. IT has created a systematic process for uploading
your webpage to the BSC server. For information on how to upload your page to the
server, go to the helpdesk website at
/. Before a student group
can place a webpage on the BSC server, they must obtain prior approval from the Of-
fice of Student Affairs.