Personally-Owned Devices (PODs) for Information Technology (Procedure 7.0150)

Based on board policy number and Florida Statutes:F.S. 1001.64; 1001.65; F.A.C. 6A-14.0261; College Policy 7.010
Effective Date:09/2015
Date of Review:---

Purpose

To allow College technology users, including but not limited to faculty, staff, administrators, other employees, students, and contractors, to work with personally-owned devices (POD) while maintaining the confidentiality, integrity, and availability of Seminole State College (“SSC”) data and systems. The use of personally-owned devices to access the College’s systems is a privilege that may be revoked at any time, and not a right.

Procedure

  1. Acceptable Use of a Personally-Owned Device (POD)
    This procedure applies to all College technology users, including faculty, staff, administrators, other employees, students, contractors, consultants, and other agents who use a personally-owned device (POD) to access, store, backup, or share any of the College’s data or systems.
  2. College Responsibilities
    1. The College is not responsible for lost, damaged, or stolen PODs. When bringing personally-owned devices to the College, it is the owner’s responsibility to ensure that his/her device is secured.
    2. The College assumes no responsibility for service charges owners might incur while using PODs. This includes, but is not limited to, charges related to data plans, texting fees, and security programs.
    3. The College will not provide IT support, additional electronic power access, or network drops to support personally-owned devices.
    4. The College provides filtered Internet access and monitors user activity on the College’s network, including sites visited, content viewed, and communications sent and received. The College may monitor network activities identifying suspicious patterns without prior notice or consent.
    5. In the event of suspected misuse or violation of College policies, procedures, or guidelines regarding access to the network or use of the device, the appropriate Data Custodian (see Procedure7.0500) may examine an owner’s personal device and search its relevant contents.
    6. When warranted, the College can and will establish audit trails in some situations to track PODs and the resulting reports may be used for investigation of possible breaches and/or misuse. The owner agrees to and accepts that his or her access and/or connection to the College’s networks may be monitored to record dates, times, duration of access, etc., in order to identify unusual usage patterns or other suspicious activity. This is done to identify accounts/computers that may have been compromised by external parties. In all cases, data protection remains the College’s highest priority.
  3. Employee Responsibilities
    With this in mind, POD owners are allowed to bring personal electronic devices into the College. However, when POD owners bring their personally-owned devices, they must follow all of the Acceptable Use of College Technology (Policy 7.010), as well as the following guidelines:
    1. Owner use of personally-owned devices within instructional settings should not, in any way, interfere with teaching, learning, or productivity.
    2. Personally-owned devices should be silenced in classrooms during class times, as well as, professional gatherings, including staff meetings, professional development sessions, conference calls, and other College events.
    3. Personally-owned devices should not impair the security of the College’s network. Owners are expected to maintain up-to-date antivirus and antispyware protection on all devices that are connected to the College’s wireless network. Devices without up-to-date security programs may be denied access to the network.
Recommended byExecutive TeamDate:09/22/2015
ApprovedPresident, E. Ann McGeeDate:09/28/2015

Contact