|F.S. 1001.64; 1001.65; F.A.C. 6A-14.0261
|Date of Review:
To allow College technology users, including but not limited to faculty, staff, administrators, other employees, students, and contractors, to work with personally-owned devices (POD), also known as BYOD (Bring Your Own Device), while maintaining the confidentiality, integrity, and availability of Seminole State College (“SSC”) data and systems. The use of personally-owned devices to access the College’s systems is a privilege that may be revoked at any time, and not a right.
- Acceptable Use of Bring Your Own Device (BYOD) or Personally-Owned Device (POD)
This procedure applies to all College technology users, including faculty, staff, administrators, other employees, students, contractors, consultants, and other agents who use a BYOD or POD (see Procedure 7.0001 B.5. for list of PODs) to access, store, backup, or share any of the College’s data or systems.
- College Responsibilities
- The College is not responsible for lost, damaged, or stolen PODs. When bringing PODs to the College, it is the owner’s responsibility to ensure that his/her device is secured.
- The College assumes no responsibility for service charges owners might incur while using PODs. This includes, but is not limited to, charges related to data plans, texting fees, and security programs.
- The College will not provide IT support, additional electronic power access, or network drops to support PODs.
- The College provides filtered Internet access and monitors user activity on the College’s network, including sites visited, content viewed, and communications sent and received. The College may monitor network activities identifying suspicious patterns without prior notice or consent.
- In the event of suspected misuse or violation of College policies, procedures, or guidelines regarding access to the network or use of the device, the appropriate Data Custodian (see Procedure7.0500) may examine an owner’s personal device and search its relevant contents.
- When warranted, the College can and will establish audit trails in some situations to track PODs and the resulting reports may be used for investigation of possible breaches and/or misuse. The owner agrees to and accepts that his or her access and/or connection to the College’s networks may be monitored to record dates, times, duration of access, etc., in order to identify unusual usage patterns or other suspicious activity. This is done to identify accounts/computers that may have been compromised by external parties. In all cases, data protection remains the College’s highest priority.
- Employee/Student Responsibilities
With this in mind, POD owners are allowed to bring personal electronic devices into the College. However, when POD owners bring their personally-owned devices, they must follow all of the Acceptable Use of College Technology (Policy 7.010), as well as the following guidelines:
- Owner use of PODs within instructional settings should not, in any way, interfere with teaching, learning, or productivity.
- PODs should be silenced in classrooms during class times, as well as, professional gatherings, including staff meetings, professional development sessions, conference calls, and other College events.
- PODs should not impair the security of the College’s network. Owners are expected to maintain up-to-date antivirus and antispyware protection on all devices that are connected to the College’s wireless network or any College server. Devices without up-to-date security programs may be denied access to the network.
- PODs shall not, at any time, be physical connected to the College’s wired network. Only the College’s wireless network may be used for PODs. The only exception to this is when a faculty member has authorization while instructing a class in an existing physical smart classroom.
|President, Georgia L. Lorenz