Updated on November 28, 2012
The purpose of technology resources at Bryan College is to support the college’s mission of educating students to become servants of Christ to make a difference in today’s world.
The primary purpose of the networks and Internet access is to provide academic resources to help students achieve their scholastic goals. Other legal uses of the networks including gaming, entertainment, socializing, and all other activities not directly related to the pursuit of academic excellence are not prohibited, but will not be afforded the same level of support as resources pertaining to the primary purpose of the college’s computer networks.
Current faculty, staff, and students are provided with user accounts; guests may be granted temporary, short-term access. Anyone using the college’s computer networks does so under expectation of adherence to the policies set forth below. Failure to comply with said policies may result in disciplinary action via the appropriate office, up to and including termination of employment or expulsion from the institution. Any action deemed illegal in nature may be reported to the appropriate law enforcement agencies.
“Acceptable use” includes, but is not limited to:
- Using the networks for course work, research, correspondence, and collaboration among the Bryan College community. These activities are the primary purpose of the college’s networks and receive the highest level of support and priority.
- Taking responsibility to learn and understand how to use the hardware and software resources you have been given to perform the essential duties of your job or coursework.
- Adhering to copyright laws and respecting the intellectual property of others.
- Abiding by the expectations and standards set forth in the student, faculty, and staff handbooks.
- Accessing entertainment, social, or gaming sites is acceptable, but is not guaranteed, nor will it receive the same support as the activities outlined in item 1 of this section.
- Treating the property of the college with respect, as if it were your own.
“Unacceptable use” includes, but is not limited to:
- Accessing remote sites without proper authorization (more commonly known as “hacking”) is strictly forbidden and is a violation of the Tennessee Code Annotated, which states suitable punishment for violators.
- Accessing, downloading, or displaying obscene, erotic or pornographic materials.
- Transmission of threatening or harassing materials.
- Using the networks for commercial purposes or for-profit activities.
- Violating copyright laws or using the networks for plagiarism or any other dishonest activity.
- Installing software or hardware that has not been authorized by I.T. Services.
- Installing hardware on the college’s networks including Wireless Access Points, printers, or similar items. Hardware shall only be installed on the wired network by I.T. Services.
- Using another person’s credentials or providing your credentials to be used by another person.
Any person found to be in violation of any of the aforementioned policies will be subject to disciplinary action.