Harper College will be closed Tuesday, November 5 in observance of Election Day.
I. Philosophy: II. Risk and Responsibility: E-Mail, Internet Resources, and Electronic Files Users are responsible for all activities originating from their account(s), including
all information sent from, intentionally requested, solicited, or viewed from their
account(s) and publicly accessible information placed on a computer using their account(s).
In addition, users are responsible for logging off applications/computers to prevent
unauthorized access. In addition, users are responsible for refraining from sharing personally identifiable
information or other sensitive data while using collaboration tool applications, including
but not limited to chat, email, or video conferencing applications. B. Privacy The College reserves the right to access its systems, including current and archival
files of users' accounts; if that access would be imperative to conducting College
business; if there is strong evidence of improper usage; or strong evidence of impropriety.
Electronic files can be inspected under the Illinois Freedom of Information Act (IFOIA).
Any inspection of electronic files, and any action based upon such review, will be
governed by all applicable federal and state laws and College policies. C. Education and Training III. Unacceptable Uses: IV. Consequences:Acceptable Use of Harper College Communications Network (HCCN)
Harper College provides technology resources, software, and facilities to further
the College's mission. Access and use of facilities is a privilege and must be treated
as such by all users. Acceptable use is based on common sense, common decency, and
civility. Users are subject to guidelines set in this Acceptable Use Policy.
A. Security
Harper College utilizes best practices and industry standards to protect data and filter
materials transmitted or received via the College. Harper College does not assume
liability for offensive material that any user may encounter, such as material that
is illegal, defamatory, obscene, inaccurate, or controversial.
Users are strictly prohibited from accessing files and information other than their
own, those intended for the user, and those for which the user has permission from
authorized College personnel to access.
All users are responsible for using the facilities and all forms of technology resources
ethically and legally. Users are expected to follow equipment and lab usage guidelines
and, when necessary, receive training in using these resources and accept responsibility
for their work. In addition, users are responsible for learning and adequately using
the features of securing and/or sharing access to data.
D. Personal Use
As a result of agreements Harper College has with technology providers, users may be
offered technology for personal use. If users take advantage of these offers, any
agreement, conditions, or terms of use are between the user and the outside technology
provider. Information resource providers outside the College may, in turn, impose
additional conditions of appropriate use, which the user is responsible to observe
when using those resources.
It is the joint responsibility of all users to help avoid unacceptable uses such as
but not limited to:
Abuse of these guidelines will result in possible legal action and/or official campus
disciplinary procedures. Incidents involving unacceptable uses will be handled through
existing processes.
Personally identifiable information (PII) is information that can be used to locate or identify an individual. Loss of such information may lead to identity theft or other fraudulent use.
Examples of PII include:
Ways to minimize the risks of exposing your PII:
Identity theft is a serious crime. Identity theft happens when someone uses information about you without your permission. They could use your:
Some warning signs that you may be a victim to identity theft are:
If you believe your identity has been stolen, a helpful guide is available from the
Federal Trade Commission at www.identitytheft.gov.
Tips to prevent identity theft:
How is social engineering done?
Laptops are used everyday to make our electronic lives more readily accessible. Some tips to help keep your information secure on your laptop are:
Mobile devices have become an important part of our lives. We recommend the following security tips: