Maricopa Emergency Management System Alert

Facial coverings are recommended while indoors at any of our facilities. Social distancing (3 feet) is required on campus. SCC strongly encourages students to become fully vaccinated. SCC cares about you and your safety! If you are not feeling well, please do not come to campus.

Reporting FAQs|Coronavirus (COVID-19) Reporting|Maricopa Coronavirus Website  |  Contact SCC

Computer Usage Policies

Scottsdale Community College (SCC) owns and operates a variety of computing systems which are provided for the use of Scottsdale Community College students, faculty, and staff in support of the programs of the college and are to be used for education, research, academic development, and public service only. Commercial uses are specifically excluded. All students, faculty, and staff are responsible for seeing that these computing facilities are used in an effective, efficient, ethical, and lawful manner.

This document establishes rules and prohibitions that define acceptable use of these systems. Unacceptable use is prohibited, and is grounds for loss of computing privileges, as well as discipline or legal sanctions under Federal, State, and local laws.

All users of SCC computing systems must read, understand, and comply with the policies outlined in this document, as well as Maricopa Computing Resource Standards and any additional guidelines established by the administrators of each system. Such guidelines will be reviewed by the Chief Information Officer (CIO) of Information Technology and may become subject to Board approval as a District policy or procedure. BY USING ANY OF THESE SYSTEMS, USERS AGREE THAT THEY WILL COMPLY WITH THESE POLICIES.

These computer systems, facilities, and accounts are owned and operated by SCC. SCC reserves all rights, including termination of service without notice, to the computing resources which it owns and operates. These procedures shall not be construed as a waiver of any rights of SCC, nor shall they conflict with applicable acts of law. Users have rights that may be protected by Federal, State, and local laws.

Access and privileges on SCC computing systems are assigned and managed by the administrators of specific individual systems. Eligible individuals may become authorized users of a system and be granted appropriate access and privileges by following the approval steps prescribed for that system.

All access to the College's computer resources, including the issuing of passwords, must be approved by a designee of the CIO of Information Technology.

Users may not, under any circumstances, transfer or confer these privileges to other individuals. Any account assigned to an individual shall not be used by others without written permission from the systems administrator. The authorized user is responsible for the proper use of the system, including any password protection.

Users are responsible for maintaining the following:

  • (a) An environment in which access to all College computing resources are shared equitably between users. The system administrator of each system sets minimum guidelines within which users must conduct their activities.
  • (b) An environment conducive to learning: A user who uses the College's computing systems to harass, or make defamatory remarks, shall bear full responsibility for his or her actions. Further, by using these systems, users agree that individuals who transmit such remarks shall bear sole responsibility for their actions. Users agree that SCC's role in managing these systems is only as an information carrier, and that they will never consider transmission through these systems as an endorsement of said transmission by SCC.

    Many of the SCC computing systems provide access to outside networks, both public and private, which furnish electronic mail, information services, bulletin boards, conferences, etc. Users are advised that they may encounter material which may be considered offensive or objectionable in nature or content. Users are further advised that SCC does not assume responsibility for the contents of any of these outside networks.

    The user agrees to comply with the acceptable use guidelines for whichever outside networks or services they may access through SCC systems.
    Further, the user agrees to follow proper etiquette on outside networks. Documents regarding etiquette are available through system administrators and through specific individual networks.

    The user agrees never to attempt to transmit, or cause to be transmitted, any message in which the origination is deliberately misleading (except for those outside services which may conceal identities as part of the service).

    The user agrees that, in the unlikely event that someone does transmit, or cause to be transmitted, a message that is inconsistent with an environment conducive to learning or with the misleading origination, the person who performed the transmission will be solely accountable for the message, not SCC, which is acting solely as the information carrier.

  • (c) An environment free of illegal or malicious acts: The user agrees never to use a system to perform an illegal or malicious act. Any attempt to increase the level of access to which (s)he is authorized, or any attempt to deprive other authorized users of resources or access to any SCC computer system shall be regarded as malicious, and may be treated as an illegal act.
  • (d) A secure environment: Any user who finds a possible security lapse on any system is obliged to report it to SCC Information Technology Services. The system must not be used until the system administrator has investigated the problem. Knowledge of passwords or of loopholes in computer security systems shall not be used to damage computing resources, obtain extra resources, take resources from another user, gain unauthorized access to resources or otherwise make use of computing resources for which proper authorization has not been given.

Users are responsible for backup of their own data.

An account assigned to an individual must not be used by others without written permission from the system administrator. The individual is responsible for the proper use of the account, including proper password protection.

Programs and files are confidential unless they have been made available, with written permission, to other authorized individuals. The District reserves the right to access all information stored on District computers. File owners will be notified of file access and/or maintenance, in advance, if such notice is practical. When performing maintenance, every effort is made to insure the privacy of a users files. However, if policy violations are discovered, they will be reported immediately to the appropriate systems administrator.

Electronic communications facilities (such as e-mail) are for college related activities only. Fraudulent, harassing or obscene messages, and/or materials are not to be sent or stored. The district-wide Sexual Harassment Policy for Employees and Students specifically forbids sexually suggestive objects including computer software, photographs, cartoons, or pictures.

No one should deliberately attempt to degrade the performance of a computer system or to deprive authorized personnel of resources or access to any college computer system.

Loopholes in computer security systems or knowledge of a special password should not be used to damage the computer system, obtain extra resources, take resources from another user, gain access to systems, or use systems for which proper authorization has not been given.