Skip to Main Content

About

Use of Technology Resources Policy Statement

Fletcher Technical Community College acquires, develops, and maintains computers, computer systems, and networks intended for educational-related purposes. These purposes include direct and indirect support of instruction, research and service missions, administrative functions, student activities, and free exchange of ideas within the College’s educational community. This policy applies to all users of Fletcher Technical Community College’s computing resources, whether affiliated with the institution or not, and to all uses of those resources, whether on campus or from a remote location. Fletcher Technical Community College management adheres to the Security Policy & Software License Compliance Policy #7.007 for the Louisiana Community and Technical College System (LCTCS) Information Systems.

Scope and Applicability

This policy applies to all users of Fletcher Technical Community College’s computing resources, whether affiliated with the College or not, and to all uses of those resources, whether on campus or from a remote location.

Definitions For purposes of the Policy Statement, the following definitions shall apply:

  • Computing resources: Computers, printers, related hardware, licensed software, communications such as e-mail, Internet access, video, and any other technologies owned by Fletcher.
  • User: Any person, employee or student that uses any technology resource at Fletcher.

General Policy

  • Users of the institutions computing resources must comply with Fletcher Technical Community College’s rules and policies and with federal and state laws including but not limited to copyright, trademark, Computer Fraud and Abuse Act which prohibits “hacking” and similar activities
  • Users are responsible for obtaining the necessary authorizations before using the institution’s computing resources.
  • Users are responsible for any activity originating from their accounts. Accounts and passwords may not be used by persons other than those to whom they have been assigned by the Information Technology Department.
  • Users must not use computing resources to gain unauthorized access to remote computers or to impair or damage the operations of Fletcher’s computers or networks, terminals or peripherals. This includes but is not limited to, blocking communication lines, intercepting or sniffing communications, and running, installing or sharing virus programs.
  • Users shall not obtain or use another’s logon id or password, or otherwise access computing resources to which authorization has not been validly given.
  • Users shall not copy, install or use any software, data files or other technology that violates a copyright or license agreement. Please reference LCTCS Policy #7.007
  • Users shall not monopolize or disproportionately use shared computing resources, overload systems or networks with endless loops interfere with others’ authorized use, degrade services or otherwise waste computer time, connection time, disk space, printer paper or similar resources.
  • Users shall not modify or reconfigure any component of computing resources without proper authorization.
  • Users shall not accept payments, discounts, free merchandise or services in exchange for any services provided through use of the computing resources. 
  • Users shall not endanger the security of any computing resources or attempt to circumvent any established security measures, such as using a computer program to attempt password decoding.
  • Users shall not transmit personal comments or statements or post information to newsgroups or Usenet that may be mistaken as the position of Fletcher.
  • Users shall not utilize computing resources to develop, perform and/or perpetuate any unlawful act or to improperly disclose confidential information.
  • Users shall not install, store or download software from the Internet or e-mail to Fletcher’s computing resources unless such conduct is consistent with the College’s academic, educational, and administrative policies or otherwise properly approved by Fletcher. Please reference LCTCS Policy #7.007
  • Users shall not copy, impair or remove any software located on any computing resources or install any software on any computing resources that impairs the function, operation and/or efficiency of any computing resources. Please reference LCTCS Policy #7.007
  • Any user that has sensitive data located on a mobile device must encrypt this data for security purposes.
  • Anyone granted access through Fletcher’s Information Systems is deemed an employee or student for the purposes of this security statement and policy only.
  • If you are unsure whether an action details a security violation, you should report it and discuss with Information Systems Personnel.
  • Each employee and/or student is responsible for the security of Fletcher’s Information Systems.
  • Each employee, student, or person accessing LCTCS’ or Fletcher’s Information Systems is bound by the procedures, such as password and account logon procedures, detailed in the Security Policy.
  • Each employee should lock his/her workstation by a form of screensaver password, or logout, when they are away from their workstation.
  • Each employee should be aware of social engineering, the manipulation of employees to gain information for the purpose of perpetrating fraud or damage to the system.
  • Each employee and/or student should be aware that LCTCS or Fletcher personnel may monitor any and all activities without his/her direct consent or knowledge.
  • Software inventory will be performed by the IT department annually in the month of January to ensure there is no unapproved software installed by users.

E-mail

All students will be issued a Fletcher e-mail account, which can be accessed from the Fletcher website, www.fletcher.edu, or from Google’s partner page, https://mail.google.com/a/my.fletcher.edu  

  • Users shall not transmit or participate in chain letters, hoaxes, scams, misguided warnings, pyramid schemes or any other fraudulent or unlawful schemes.
  • Users shall not utilize computing resources, including the Internet and/or E-mail, to access, create, transmit, print or download material that is defamatory, obscene, fraudulent, harassing (including uninvited amorous or sexual messages), threatening, incites violence, or is offensive, such as slurs, epithets, or anything that may be construed as harassment or disparagement based on race, color, national origin, sex, sexual orientation, age, disability, or religious or political beliefs or to access, send, receive, or solicit sexually oriented messages or images or any other communication prohibited by law or other directive.
  • Users shall not send unsolicited mass mailings or “spamming.” Mass mailings to clearly identified groups for official purpose (for example, disseminating administrative announcements, notifying students of educational opportunities, or FLETCHER organizations sending announcements to their members) are allowed.

Google Apps is used as the official e-mail for students. Google’s policy for using their product can be found at http://www.google.com/intl/en/privacypolicy.html

Wireless

  • Fletcher Technical Community College provides students with free wireless internet within the building for use with their personal computers. This wireless is unsecured and users are encouraged to use some type of encryption.

Student Printing

  • Each semester students will received a Free Quota Balance of 120 pages = $12.00 credit. Once the quota is reached students a financially responsible for printing costs.
  • Printing costs 10¢ a page. Any funds that a student adds will be carried over each semester. The Free Quota balance will not carry over and will reset each semester.
  • Students can pay via credit/debit card online or may pay cash at Fletcher’s cashier windows located at the Schriever campus.
  • Student printing is located at both library locations.
  • FAQ on student printing can be found online at Fletcher’s website under FalconNet or directly at this link http://www.fletcher.edu/index.cfm?md=pagebuilder&tmp=home&pid=716

Personal Devices

  • Users are responsible for their personal devices/computers/phones. Fletcher’s Information Technology Department does not support or work on users’ personal devices/computers/phones.

Abuse of This Policy

The use of Fletcher’s computing resources is a privilege, not a right. Fletcher reviews and monitors its computing resources for compliance with policies, applicable laws and related directives, and discloses transactions to investigating authorities and others as warranted. Users should not have any expectation of privacy when using and storing information on Fletcher’s computing resources, and Fletcher specifically reserves the right to review and copy any data or other information stored on any computing resources, without notice to any User, by use of forensic computers or otherwise. Violations of this policy may result in penalties, such as terminating access to computing resources, Fletcher disciplinary action, civil liability and/or criminal sanctions. LCTCS and/or Fletcher may monitor all usage of the Internet on or through computing resources and all other use of Fletcher’s computing resources, including, without limitation, reviewing a list of any and all sites accessed by any User and all E-mails transmitted and/or received on any computing resources.

Proprietary Rights and Licenses

Except as may specifically be agreed otherwise by Fletcher, any and all software and materials contained on any Fletcher computing resources is solely owned by Fletcher, except to the extent that any such materials are licensed to Fletcher by a third party vendor. Users are forbidden from taking any action that would be in violation of any standard license agreement for any software licensed to Fletcher and contained on any Fletcher computing resources, including without limitation, making any unauthorized copies of any such software. Fletcher management adheres to the Security Policy for the Louisiana Community and Technical College System Information Systems.