Skip to main content

Policy for Responsible Computing and Use of College Resources

The Policy for Responsible Computing and Use of College Resources regulates the use of the Colleges network resources at Goldey-Beacom College. All network users must comply with local, state, and federal laws relating to copyright, security, and electronic media.

The Office of Information Technology (OIT) assigns a network account to network users for accessing the College Technology Resources which include the following:

  • Campus Web
  • Cyber Café
  • gbcALERT System
  • GBC Email
  • GBC Wi-Fi
  • Hirons Library and Learning Center
  • Kiosks
  • Lightning Central
  • Classrooms
  • Specific computers located in College offices
  • Teaching Labs
  • Online services operated on behalf of the College, including Office 365, OneDrive for Business, Skype for Business (formerly Lync), and Yammer

These resources are available to currently enrolled GBC students for the completion of their coursework and to employees of the College. The GBC network account is created for students when they start their education at Goldey-Beacom College. It is available for use throughout the students entire college career at GBC. Downloading and sharing copyrighted material (software, music or video files, etc.) without permission is a federal offense. Downloading or sharing copyrighted materials may result in the loss of network access privileges.

Please Note: The OIT does not provide technical support for personally owned computers and devices including those used on the College network.

A. Use of Hirons Library and Learning Center, Classrooms, Teaching Labs, and College Office Computers

These areas are intended to be a work place and the following rules are designed to safeguard the equipment and environment:

  1. Food, candy, and smoking are not permitted in the teaching labs, classrooms, library and learning center. Only water bottles which have screw-on lids are permitted provided that they are closed while the student is working.
  2. Only current GBC students and employees are permitted network access in these areas.
  3. Prospective GBC students are permitted in the Hirons Library and Learning Center and must see the Student Tech Assistant to register for use of a guest account.
  4. Inappropriate language or offensive behavior is not permitted and will not be tolerated.
  5. These areas are working environments not student lounges or game rooms. Therefore, noise will not be tolerated and students may be asked to leave.
  6. Cell phone calls are not permitted in these areas.
  7. Students are permitted to logon to only one PC at a time.
  8. Illegally copying software is prohibited and violators may be prosecuted.
  9. Users should use a removable storage device, (e.g. an USB flash drive) or cloud storage (OneDrive for Business) to save their work. Any work saved on the hard drive will be deleted automatically at logoff/reboot in the teaching labs, classrooms, library and learning center, kiosks, and student access computers located in College offices.
  10. Users are expected to clean up their workstation space upon leaving, i.e. dispose of trash, pick up printed documents, and push in chairs.
  11. Any logged on/locked computer located in the library and learning center unattended for more than fifteen minutes will be rebooted.
  12. Printing is limited to the requirements for a student's GBC coursework. A student is not permitted to print textbooks in part or their entirety. Conserve paper by saving the information to a file (on a USB flash drive, cloud storage, etc.) and reading it later. More information about student printing is available under the Technology tab of Campus Web.

B. Use of the Cyber Café

  1. Food and drinks are permitted in the Café.
  2. Only current GBC students and employees are permitted network access in this area.
  3. Inappropriate language or offensive behavior is not permitted and will not be tolerated.
  4. Students are permitted to logon to only one PC at a time.
  5. Illegally copying software is prohibited and violators may be prosecuted.
  6. Users should use a removeable storage device (e.g. an USB flash drive) or cloud storage (OneDrive) to save their work. Any work saved on the hard drive will be deleted automatically at log off/reboot.
  7. Users are expected to clean up their workstation space before leaving, i.e. clean up any spills, dispose of trash, and push in chairs.
  8. Any logged on/locked computer located in the Café unattended for more than thirty minutes may be rebooted.

C. Use of GBC Email

GBC Email serves as the official means of sending information to students by faculty and staff. These messages are always sent to the GBC Email address.

  1. Students and employees are responsible for maintaining their official GBC Email accounts and are expected to check them on a frequent and consistent basis.
  2. Students and employees have the responsibility to recognize that certain communication may be time-critical.
  3. Inappropriate language should not be used in email messages.
  4. Email is not to be sent to the entire student population.
  5. Sending junk email, unsolicited or offensive email is not permitted and will not be tolerated.
  6. Students are responsible for maintaining their mailbox size below 100 MB, i.e. empty the deleted items folder, delete old and junk email. File attachments increase the mailbox size; therefore students and employees are advised to save them to a removable storage device or share them using OneDrive and delete the email message.
  7. The GBC Email account is provided by the College for educational purposes and for communicating with family and friends. The College does not provide this account for commercial use.

D. Use of the College's Network

Services provided by the College are for educational purposes and for communicating with family and friends. The College does not provide this service for any other personal or commercial use.

  1. Users must change their initial password as a security measure. Refer to detailed instructions posted on the Technology tab in Campus Web.
  2. All activities of College network accounts are governed by having the logon password, so it is important that GBC NetIDs and/or passwords are not given to anyone (including family members).
  3. It is important that all network users protect GBC NetID and password information as they would their social security number. Do not place them in an easily accessible place, e.g., on a desk in a dorm room or office.
  4. The student/employee will be held accountable for any abuse of technology resources under the use of his/her account (GBC NetID).
  5. Users are not permitted to log into Goldey-Beacom's network and/or technology resources using anyone else's GBC NetID and password.
  6. Users are also not permitted to log into Goldey-Beacom's network and/or technology resources and then allow someone else to use their account.
  7. Appropriate language should be used in all computing activities, e.g. email messages, online posts, etc.
  8. Excessive media streaming, running a server application, or other activities that place a heavy load on the College network are not permitted.
  9. Users should be aware that the computer systems are the property of the College and that email messages, internet usage history, any other computer files, and other network traffic are subject to review at the discretion of the College. In the case of harassment complaints, illegal violations, or a network incident (including but not limited to hardware, software, or attacks by hackers) the OIT staff are authorized to inspect and remove any information or files necessary to investigate complaints or resolve the incident to protect the network systems, and the information they contain. In this situation, the OIT staff is obligated to treat any information they might see that turns out to be unrelated to the problem as strictly confidential. In addition, email messages are subject to subpoena or otherwise discoverable in litigation.
  10. Users must follow local, state, and federal laws and regulations pertaining to computing activities. In cases involving fraud, forgery, extortion, copyright violations, intimidation, humiliation, etc. violators may be legally prosecuted and may be subject to immediate loss of all computing privileges and network access at Goldey-Beacom College.
  11. Users are responsible for reporting any activities which they believe to be in violation of these policies. To report such incidents, email abuse@gbc.edu.

E. Use of the Internet

  1. The internet is an open forum for many subjects, opinions, and ideas, both appropriate and inappropriate to the educational values and/or goals of the College. Therefore, it is up to the users of the internet to be responsible, selective, and wise when dealing with people, topics, opinions, and/or ideas found on the internet that do not serve the educational purposes of the College. Offensive materials on the internet, including but not limited to adult sites and pornography, are not to be accessed through the College's network using any personal computer located at the College or connected to the College network. Anyone accessing these pages may be asked to discontinue doing so, may be asked to leave, may have their network access suspended, and may be subject to disciplinary actions.
  2. Goldey-Beacom College is not responsible for any offensive or inappropriate material that is found on the internet.
  3. The use of the internet for non-class assignments in the labs and the library is permitted, provided a workstation is not needed by a student with a class assignment.

F. Use of GBC Wi-Fi

GBC Wi-Fi is provided for use by current students and employees only.

  1. Only currently enrolled students and employees of Goldey-Beacom College have access to GBC Wi-Fi. Up-to-date anti-malware software must be installed on all PCs to the network. All wireless devices must support WPA2 encryption. On Windows PCs, administrator privileges may be required to complete the connection process.
  2. The use of bridges, hubs, routers, switches or other network equipment which could interfere with GBC Wi-Fi is not permitted on Campus.
  3. Users are not permitted to share or tether their wireless connection to another device.
  4. Users are required to follow the guidelines for the usage of the College's network and the internet when using GBC Wi-Fi.
  5. Misuse of GBC Wi-Fi or not following the approved policies may result in losing complete access to the GBC network.
  6. All network users are responsible for the integrity of their own individual devices. It is each person's responsibility to make certain that their device is secured against viruses, worms, hacker attacks, and other intrusions. Further, they are responsible for all uses of their device and will held accountable for network traffic originating from their device or traced back to their device's IP address.
  7. Users should be aware that connecting to GBC Wi-Fi gives the College the right to investigate cases of harassment complaints, illegal violations, copyright infringement, or network problems, in which the OIT staff may need to review email messages, internet usage, and other files on any device(s) configured for use on GBC Wi-Fi.

G. Use of Third-Party Online Services Operated on Behalf of the College

The College provides currently enrolled students and employees access to various online services operated by third-parties on behalf of the College. These include but may not be limited to Microsoft Office 365, OneDrive for Business, Skype for Business (formerly Lync), and Yammer.

  1. Only currently enrolled students and employees of Goldey-Beacom College have access to such third-party services.
  2. Users are required to follow the guidelines on the usage of the College's network and the internet when using these online services.
  3. Access to such online services is provided to currently enrolled students for the purposes of completing their coursework, and to current employees for their work-related activities. These services should not be used to post personal information, share personal files, or for any other non-academic/work purposes.
  4. Users are solely responsible for all content posted and files shared using their account.
  5. Misuse of these online services or not following the approved policies may result in losing complete access to the online services.
  6. Users should be aware that using these online sevices gives the College the right to investigate cases of harassment complaints, illegal violations, copyright infringement, or network problems in which the OIT staff may need to review service usage, files stored in OneDrive for Business, Skype for Business communications, network traffic, and any other files or data connected to the usage of these online services.

H. Prohibited Activities

A student/employee shall not damage, destroy, misuse, or otherwise endanger the Colleges computing and information resources. This section is intended to aid in interpreting the policies stated above and should not be interpreted as complete or exhaustive. Examples of conduct in violation of the approved policies are:

  1. Using software or material known to have been obtained in violation of Copyright Law or a valid license provision.
  2. Copying and providing to others any copyrighted material or licensed program contents, unless allowed under the fair-use doctrine or explicitly permitted by the copyright owner.
  3. Disrupting, hindering, or damaging the service, use, or ability of others to access or use any College computer, facility, equipment, software, network, other resource, including email.
  4. Accessing resources on the Colleges network using a different GBC NetID and password other than the one assigned.
  5. Providing any person with access to the assigned account, or in any way allowing others access to a machine/network under one's account.
  6. Creating, modifying, reading or copying files (including email) in any areas to which the user has not been granted access.
  7. Disguising one's identity in any way, including the sending of fraudulent email messages, removal of data from system files, and the masking of process names.
  8. Sending harassing or abusive messages via any digital means.
  9. Sending emails that advertise products or advertising services.
  10. Using College facilities to gain unauthorized access to computer systems on or off Campus.
  11. Use of College resources for unauthorized or commercial purposes.
  12. Attempting to interfere with the normal operation of computing systems in any way, or attempting to circumvent the restrictions associated with such facilities.
  13. Using any College computer, facility, equipment, software, network, or other resource, including email, to commit or attempt to commit acts prohibited under applicable federal, state, or local laws.

I. Disciplinary actions

  1. Students violating policies D-10 concerning copyrighted material will be informed of the immediate loss of both their GBC Wi-Fi connection as well as access to various other College network resources, should such activities continue.
  2. Students violating policy A-5 concerning excessive noise and not responding to the request by College staff to reduce the noise level may be asked to leave the area. Continued abuse of this policy will be reported to the Dean of Students and may result in the loss of the computing privileges for the area for which the violation has occurred.
  3. Any student found in violation of any of these policies may be subject to the loss of their access to one or all of the College network resources for a period of time and will be reported to the Dean of Students for action.
  4. Any illegal violations may result in the immediate loss of the use of all GBC network resources and will be reported to the Dean of Students.
  5. The student's network account will be immediately locked and referred by the Office of Information Technology to the Dean of Students in the event of a network threat.

J. Changes to This Policy

The Office of Information Technology may change or amend this policy from time to time. When changes are made, they will be announced through Campus Web announcements. As with all matters of law and ethics, ignorance of the rules does not excuse violations.