Statement of Purpose
PCC provides many technology products and services to support the academic and administrative needs of the College. Individuals who use the College’s IT resources are expected to follow certain defined behaviors in order to minimize information security risk and protect the College and its constituents.
Protecting students, faculty and staff from the risk of identity theft or unauthorized disclosure of personal information is the primary goal of adopting the best practices described in this policy.
This policy enables PCC IT staff to perform key operational and maintenance tasks, manage information security, and respond to legal requests.
The primary purpose of the PCC computer labs is to allow students and guests a place for computer-based learning and related research. This policy seeks to ensure that high-quality computing resources in a welcoming and productive environment are available to all users of public access computers at PCC.
All Portland Community College (PCC) employees, students, and affiliates or other third parties that create, use, maintain, or handle PCC IT resources are subject to this policy. This policy applies to use of all PCC owned and managed IT resources, use of any computer or mobile device connected to a PCC network, all controlled sensitive data stored or transmitted using PCC IT resources and all users of such data.
PCC students and guests shall use PCC computer labs and public computers in accordance with the guidelines documented in this policy, publicly posted procedures, and as directed by authorized PCC staff (including, but not limited to library staff, supervisors, lab assistants, and lab coordinators).
Use of public access computers is subject to all policies regulating the use of any other IT resource.
1. PCC provides public access computing in designated areas only. Use of these public computers is subject to applicable PCC policy.
2. Users of public access computers must comply with all requests and instructions from the lab assistant, lab coordinator, or any other authorized PCC employee. Should users have an issue with any instruction, please request to speak to a supervisor.
3. PCC provides Accessibility stations for individuals with special requirements.
a. Rules of use shall be clearly posted.
b. Support staff shall be familiar with accessibility software and hardware.
c. Anyone may take advantage of accessibility stations, if available, but shall be asked to relocate for individuals with special needs.
4. Children are not allowed in public computing labs unless accompanied by an adult:
a. Children are not to be left unattended anywhere on campus.
b. Please be aware that computers in labs have full access to the Internet and there are no content filters to prevent children from accessing or viewing inappropriate materials.
5. Password sharing and logging in for other users is prohibited.
6. Users are not permitted to install software or otherwise tamper with the hardware or software of lab computers.
COMPUTER LAB GUIDELINES
1. If you are unsure of any policy or guideline, or if you need help regarding any matter when using PCC public computing resources, ask a computer lab assistant, instructor, or other support staff.
2. We recommend you encrypt data on personal mobile devices. PCC is not responsible for lost or stolen devices in public areas.
3. Public computers are connected to the PCC network, which can potentially be infected from malware on personal devices:
a. Unless necessary to support your work activities, avoid plugging personal devices into public computer USB ports.
b. Find alternative ways to charge your cell phones, laptops, etc.
c. If you need to plug a device into a computer’s USB port, please ensure it has been scanned for malware.
4. Be considerate of other users. Labs are intended to be places of study and academic work and every effort is made to maintain this environment.
5. If conversation is necessary for work, please converse quietly. Acceptable noise volume levels are at the discretion of the support staff.
6. Cell phone conversations are strongly discouraged. Individuals may be asked to terminate their cell phone conversations at the discretion of the support staff.
7. Music or other audio should not be audible to other patrons or the support staff. Please use headphones in the labs. If others can still hear your audio, you will be asked to turn the volume down.
8. Printing in computer labs is limited to GoPrint and student accounts.
9. If eating at a public workstation, make best efforts to avoid spilling food or drink on computing equipment. Be considerate of cleaning staff and dispose of any trash in the waste receptacles provided.
1. Violation of this policy may result in disciplinary action in accordance with PCC Human Resources and/or Student Conduct guidelines.
2. PCC reserves the right to report security violations or compromises to the appropriate authorities. This may include reporting violations of Federal, State, and local laws and regulations governing computer and network use, or required accreditation reporting.
3. Anyone who violates this policy may be held liable for damages to PCC assets, including but not limited to the loss of information, computer software and hardware, lost revenue due to disruption of normal business activities or system down time, and fines and judgments imposed as a direct result of the violation.
4. PCC reserves the right to deactivate any user’s access rights (whether or not the user is suspected of any violation of this policy) when necessary to preserve the integrity of IT resources.
Report non-security-related violations (such as receipt of inappropriate content, other Human Resource policy violations, general college policy violations, or regulatory compliance violations) to a supervisor, HR, or EthicPoint.
Report information security and general technical policy violations to the IT Service Desk at 971-722-4400 or email@example.com, or contact the CIO or CISO.
Governing Standards, Policies & Guidelines
Chief Information Officer (CIO)
Senior manager of the Information Technology (IT) Department and a member of Cabinet.
At PCC, the CIO is responsible for all technology, with the exception of:
– Online Learning (Academic Affairs)
– Some specialized technology that supports CTE or other engineering programs (e.g. software that supports machine labs, specialized dental technology, etc.)
– Some technology that supports auxiliary services (e.g. Point of Sale systems in the cafeterias and bookstores)
Chief Information Security Officer (CISO)
Senior manager responsible for information security compliance at PCC.
The process of converting data to an unrecognizable or “encrypted” form.
Encryption is commonly used to protect sensitive information so that only authorized parties can view it.
The collection of physical components that constitute a computer system (a desktop computer, a server in a datacenter, a network switch, a printer, etc.)
(At PCC) All Information Technology (IT) resources that are the property of PCC and include, but are not limited to, all network-related systems; business applications; network and application accounts; administrative, academic and library computing facilities; college-wide data, video and voice networks; electronic mail; video and web conferencing systems; access to the Internet; voicemail, fax machines and photocopiers; classroom audio/video; computer equipment; software and operating systems; storage media; Intranet, VPN, and FTP.
IT Resources include resources administered by IT, as well as those administered by individual departments, college laboratories, and other college-based entities.
A global network that facilitates electronic communication of data between any participating parties.
A network of networks that consists of private, public, academic, business, and government networks of local to global scope linked by a broad array of electronic, wireless, and optical networking technologies.
Short for “malicious software,” malware refers to software programs designed to damage or do other unwanted actions on a computer system. Common examples of malware include viruses, worms, Trojan horses, and spyware.
(In IT) The technology that carries messages between one computer and another.
A network is a primary component of technology infrastructure and consists of hardware (e.g. routers, switches) that control and direct traffic; transport technologies (e.g. cables, fibre, wireless radio waves) that transport messages from Point A to Point B; and standards (e.g. Internet Protocol, Ethernet) that facilitate a common understanding of the messages being sent and how they are to be processed.
End points (or nodes) on a network are the senders and receivers of the messages and are usually computers (e.g. servers, desktops, laptops) – but can also be technology such as machine controllers, audio/visual devices, etc.
The Internet of Things (IoT) largely replaces people interacting across a network with machines and other technology devices interacting across a network, often using artificial intelligence (AI).
A set of instructions that tells a computer what to do.
Computer software is generally constructed as programs (applications) written in a specific language designed to run on computer hardware. Most common softwares are applications for business and personal use. More specialized computer software runs the operating systems of computers, operates machinery, creates artificial intelligence in robots, controls scientific instruments, etc.
USB “Thumb” Drive
A portable data storage device that includes flash memory. Has a USB connector that plugs into the USB socket on a computer.
Any person who makes any use of any PCC IT resource from any location (whether authorized or not).
Chief Information Officer
Chief Information Security Officer (CISO)
Information Technology Department
Last Revision Date