Computer Technology Resources Guidelines
a. Computer technology resources include all equipment used to compute and process digital information--data, video, and audio.
b. All technology resources and digital information generated by or from using resources are properties of Angelina College.
c. Use of resources and/or upgrades, changes, modifications, enhancements, etc. to such resources should be requested through the Management Information Systems (M.I.S.) Division. This includes requests for purchases, repairs, maintenance, services, or reassignment of resources.
d. Final decision of any matters pertaining to technology resources rest with the college president and/or college board.
Acquisition of Resources
a. Acquisition of computer technology resources should be planned in advance, and justification for acquisitions should be based on mission, goals, and objectives of the college.
b. All employees desiring to use, upgrade, etc. computer resources are encouraged to complete and submit a "Technology Request" form any time a need occurs.
c. Each request(s)/form should be reviewed for completeness and consistency with divisional goals and objectives by the division director, before it is forwarded to M.I.S.
d. After receiving form, M.I.S. will review it to ensure that all items, services, etc. requested are in accordance with college policy, specifications, and guidelines and are compatible with network(s), existing computers, software, cables, etc. campus-wide.
e. All requests will normally be prioritized by the administration in the following order: (1) technology necessary for basic college operations (e.g. student registration, budgeting, payroll, etc.), (2) technology for special courses and/or computer-assisted-instructions, (3) technology for laboratories, (4) technology for special administrative projects (e.g., federal/state reporting, research, etc.), and (5) technology for faculty and staff support.
f. Time and resources saved, along with projected personnel costs and multiple-verses-shared use of technology, also will be considered in prioritizing requests.
g. Audio visual aids, including those attached to computers, are the responsibility of the Library, and use of such aids should be requested accordingly.
h. Upon receiving shared audio visual aids or prior to using permanently placed aids, users should complete a thorough inspection/check of all items associated with aids and should report malfunctions immediately to the Library, to insure timely repair or replacement.
i. Acquisition and use of interactive video equipment and other instructional technology should be requested through the Dean of Instruction or designated personnel, and coordinated with M.I.S..
a. All network connectivity will be governed by M.I.S. This includes connecting to and disconnecting from the campus network, INTERnet, SEVERS, hubs and switches.
b. Any device, including "drops", cables, wires, etc., attached to the campus network/backbone are considered technology resources and are the responsibility of M.I.S..
c. Access by unauthorized persons--to the network or any device attached to the campus network/backbone--is prohibited
d. All authorized users must insure that their password(s) remains updated and secure or risk losing network access rights.
e. All pertinent documentation, necessary both for installing and maintaining equipment attached to the network and for using it ,must be readily available to M.I.S.
f. A current copy of network SERVER software, files, libraries, databases, etc., will be stored off-site as a contingency for disaster recovery. Daily file-saves will be performed by M.I.S. to limit the impact of computer disasters.
a. Privacy and Security Policy: Angelina College maintains its Web site as a public service. Information collected or maintained by Angelina College is subject to the provisions of the Texas Public Information Act (Chapter 552, Texas Government Code). The identity of members of the public who communicate with state agencies through the Internet is confidential under Texas Law.
b. Use/Release of Information Server Logs/Log Analysis Tools: Angelina College uses server logs and log analysis tools to create summary statistics about Web site usage to improve site management. Angelina College does not report or use this information in any manner that would reveal personally identifiable information, and does not release the information to any outside parties unless required to do so under applicable law.
Angelina College monitors network traffic for site security purposes and to ensure that the site remains available to all users. Unauthorized attempts to upload information, change information on this site, or otherwise cause damage are strictly prohibited and may be punishable under Texas Penal Code Chapters 33 (Computer Crimes) or 33A (Telecommunications Crimes). Except as may be required for authorized law enforcement investigations, no attempts are made to identify individual users or their usage habits. Angelina College does not use raw data logs for any other purposes; however, it is possible that parts of raw data logs could be determined to be open records by the Office of the Attorney General. If such a determination were made subsequent to a Public Information Act request for the logs, Angelina College would be required to disclose parts of the logs deemed open by the Office of the Attorney General.
c. E-Mail: State agencies may not sell or release e-mail addresses that have been provided to communicate electronically with a government body without the consent of the person. Personally identifiable information contained in a question or comment sent to Angelina College in an e-mail message or submitted in an online form is only used by Angelina College to respond to the request and to analyze trends. Angelina College may redirect the message to another government agency or government employee who is in a better position to answer the question.
Acceptable Use of Resources
a. All technology resources should be used only as authorized..
b. User identification information and passwords should be updated periodically and protected at all times.
c. Only digital information and/or software, which are necessary for completing job assignments, tasks, etc. and which are authorized, should be used or transferred to other users, organizations, or agencies..
d. All software should be used in compliance with vendor license requirements or written agreement.
e. Users should be considerate when using shared resources. Refrain from monopolizing systems; overloading networks with excessive data; degrading services; or wasting computer time, disk space, printer paper, manuals, or other resources.
Technology Request Forms:
Technology Requests: Status