As an SCC Student, you are responsible for reading and complying with the following policies. All policies and information is accessible from your MySCC home page under the section called:
College Policies & Info.
- Policy 4.03.09 – Weapons on Campus – Provides specific guidelines for weapons on campus.
- Policy 6.04.07 – Student Records – Explains all FERPA privacy and Compliance Rights: Annual Notification of Rights, Right to Inspect Records, Directory Information, Release of Educational Records, Correcting Records. To limit access to your record or to release record information, students must complete The Student Information Access form which can be found at: https://www.southwesterncc.edu/admissions/consumer-information.
- Policy 6.03.04 – Student Drug Free Policy – Outlines the “zero” tolerance policy on the use of drugs and alcohol on campus.
- Policy 6.03.02 - Standards of Student Conduct – Explains the Student Code of Conduct requirement.
- Procedure 6.03.02.01 – Discipline and Appeal Procedures for Academic Related Violations – Explains academic-related violations as defined in Policy 6.03.02 – Standards of Student Conduct.
- Procedure 6.03.02.02 – Discipline and Appeal Procedures for Non-Academic Related Violations – Explains non-academic-related violations as defined in Policy 6.03.02 – Standards of Student Conduct.
- Policy 6.03.03 - Discrimination and Unlawful Harassment – Defines discrimination, sexual harassment and unlawful harassment, how to report harassment and discrimination, the investigation procedure, determinations and due process procedure, retaliation protection, prohibited personal relationships, policy suspension, and education students and employees on sexual violence.
- Policy 6.03.05 – Student Grievance – Outlines the process for a student filing a complaint or grievance.
- Policy 4.05.01 – Computer Resources, Internet and Network Acceptable Use Policy – Describes the student’s responsibility for the use of the college’s computing resources including all networks, computers, email and web programs such as MySCC, Web Advisor, Blackboard.
- Consumer Information – Provides important information about the college.
- Title IX- Sexual Harassment - Provides an overview of Title IX along with information pertaining to SCC’s efforts to comply with Title IX law.
- ALL of the above information can be accessed from the SCC homepage. https://www.southwesterncc.edu/students
Questions: Dean of Student Services: 828.339.4229
As a SCC Faculty or Staff member, you are responsible for reading and complying with the following policies. All policies and information is accessible from your MySCC home page under the section called:
- Campus Security and Crime Statistics
- Outlines campus security procedures and the most recent crime statistics
- Drug-Free Policy (6.03.04)
- Outlines the “zero” tolerance policy on the use of drugs and alcohol
You must indicate your acceptance of the responsibility outlined above before continuing the access process.
Appropriate Use of Computing Resources
I. ACCEPTABLE AND UNACCEPTABLE USES
A. Acceptable Uses
The College's computer resources are intended for the use of its students, employees and other authorized individuals for purposes related to instruction, learning, research, and campus operations. Users are expected to exercise
responsible, ethical behavior when using all College computer resources. This Policy makes no attempt to articulate all required or prohibited behavior by users of the College’s computer resources.
B. Unacceptable Activity
Unacceptable activity includes, but is not limited to, the following:
1. Deliberately downloading, uploading, creating or transmitting computer viruses or malware;
2. Destroying or modifying directory structures or registries or interfering or tampering with another individual’s data or files;
3. Developing programs that infiltrate a computer or computing system, harass other users and/or damage software;
4. Attempting to obtain unauthorized computer access or privileges or attempting to trespass in another individual’s work;
5. Using hardware or software sniffers to examine network traffic, except by appropriate College personnel, to diagnose the network for bottlenecks or other problems;
6. Using another person’s password or sharing of one’s own password (users should not share their password with anyone and those who choose to do so are responsible for the outcomes resulting from the use of their password);
7. Committing any form of vandalism on equipment, communications lines, manuals or software, or attempting to defeat or circumvent any security measures or controls;
8. Consuming food and/or beverages in computer labs, computer classrooms, library or in any other areas restricted to protect systems;
9. Wastefully using finite resources such as large amounts of bandwidth including but not limited to, downloading music, streaming media, software programs, and/or movies.
10. Connecting personal network devices on the Colleges wired network. Connecting unsanctioned products (software or hardware) to the College network or installing products for personal use. Special provisions may be made for visiting presenters at the discretion of the Vice President for Information Technology. Information Technology support staff can offer assistance in gaining network access under these special circumstances, but the College cannot guarantee functionality and assumes no responsibility for configuration of or damage to non-college equipment;
11. Using the College's computer resources and Network to engage in disruptive, threatening, discriminatory or illegal behavior or behavior that violates the Code of Student Conduct or the College's Policies and Procedures.
12. Disclosing confidential student or Personally Identifiable Information (PII) to unauthorized third parties;
13. Violating copyright laws and/or fair use provisions through: 1) illegal peer-to-peer file trafficking by downloading or uploading pirated or illegal material including, but not limited to, software, video, or music files; and 2) reproducing or disseminating Internet materials, except as permitted bylaw or by written agreement with the owner of the copyright;
14. Other activities that interfere with the effective and efficient operation of the College or its Network or activities that violate the College's Policies and Procedures.
15. Employee viewing pornographic content on an SCC maintained computer network or on a device owned, leased, maintained, or controlled by SCC. Exceptions to this unacceptable activity may be made for employees pursuant to N.C.G.S. § 143-805.
16. Student viewing pornographic content on a device owned, leased, maintained, or controlled by SCC.
II. RESERVATION OF RIGHTS AND LIMITS OF LIABILITY
A. The College reserves all rights in the use and operation of its computer resources, including the right to monitor and inspect computerized files or to terminate service at any time and for any reason without notice.
B. The College makes no guarantees or representations, either explicit or implied, that user files and/or accounts are private and secure. No right of privacy exists in regard to e-mail, chat, files, or Internet sessions.
C. The College is not responsible for the accuracy, content or quality of information obtained through or stored on the College network.
D. The College and its representatives are not liable for any damages and/or losses associated with the use of any of its computer resources or services.
E. The College reserves the right to limit the allocation of computer resources.
F. The College makes efforts to maintain computer resources in good working condition but is not liable for damages incurred by loss of service or damage to an issued device.
G. College funds may not be used to purchase personal network access or products.
H. The College shall not be liable legally, financially or otherwise for the actions of anyone using the Internet through the College’s network or College’s computers.
III. WIRELESS INTERNET ACCESS
The College provides free wireless Internet access through WifiSCC (the only wireless access allowed for students and guests). Users of wireless access must abide by this Policy. Connection to the wireless network at any given time is not guaranteed. The College does not accept liability for any personal equipment that is brought to the College and, therefore, will not assist with configuration, installation, trouble- shooting or support of any personal equipment.
IV. ELECTRONIC MAIL
The College provides free e-mail accounts to certain College personnel based on job responsibilities, as determined by the employee’s appropriate Vice President, and to all students who are enrolled in a curriculum or continuing education program. The use of College-provided e-mail accounts must be related to College business, including academic pursuits. Incidental and occasional personal use of these accounts is acceptable when such use does not generate a direct cost to the College or otherwise violate the provisions within this Policy.
The College will make reasonable efforts to maintain the integrity and effective operation of its electronic mail systems, but users are advised that those systems should in no way be regarded as a secure medium for the communication of sensitive or confidential information. Because of the nature and technology of electronic communication, the College cannot assure the privacy of an individual’s use of the College’s electronic mail resources or the confidentiality of particular messages that may be created, transmitted, received or stored.
The College does not monitor electronic mail routinely but may do so to the extent permitted by law as the College deems necessary. Students and employees should not have any expectation of privacy with their electronic e-mail addresses provided by the College. Any user of the College’s computer resources who makes use of an encryption device shall provide access when requested to do so by the appropriate College authority. The College reserves the right to access and disclose the contents of employees’, students’ and other users’ electronic mail without the consent of the user. The College will do so when it believes it has a legitimate business need including, but not limited to, the following:
A. In the course of an investigation triggered by indications of misconduct or misuse;
B. As needed to protect health and safety of students, employees or the community at large;
C. As needed to prevent interference with the academic mission of the College;
D. As needed to locate substantive information required for College business that is not more readily available;
E. As needed to respond to legal actions; and
F. As needed to fulfill the College’s obligations to third parties.
Electronic mail, including that of students, may constitute "educational records" as defined in the Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99). Electronic mail that meets the definition of educational records issubject to the provisions of FERPA. The College may access, inspect and disclose such records under conditions set forth in FERPA.
North Carolina law provides that communications of College personnel that are sent by electronic mail may constitute “correspondence” and, therefore, may be consideredpublic records subject to public inspection under the North Carolina General Statutes, Chapters 121 and 132.
Electronic files, including electronic mail, that are considered to be public records are to be retained, archived and/or disposed of in accordance with current guidelines established by the North Carolina Department of Cultural Resources or otherwiserequired by College policy.
V. PRIVATE EMPLOYEE WEBSITES AND OTHER INTERNET USE
When creating or posting material to a web page or other Internet site apart from the College's website or approved ancillary external site or page, employees should remember that the content may be viewed by anyone including community members, students and parents.
Employees are to maintain an appropriate relationship with students at all times. Having a public personal website or online networking profile or allowing access to a private website or private online networking profile is considered a form of direct communications with students. Any employee found to have created and/or posted inappropriate content on a website or profile that has a negative impact on the employee's ability to perform his/her job as it relates to working with students and the community will be subject to disciplinary action up to and including dismissal.
VI. VIOLATIONS OF COLLEGE COMPUTER POLICIES AND GUIDELINES
Each individual is ultimately responsible for his/her own actions. Failure to exercise responsible, ethical behavior will result in disciplinary action up to and including dismissal. Students may be sanctioned according to procedures described in the Student Handbook and other users may be barred permanently from using College computers and network access.
Certain activities violate Federal and/or State laws governing use of computer systems and may be classified as misdemeanors or felonies. Those convicted could face fines and/or imprisonment.
LEGAL REFERENCES:
● G.S. 143-805 - Prohibit Viewing of Pornography on Government Networks and Devices
● SCC Policy 8.27 - Pornography Prohibited on College Networks and Devices
● Statewide Information Security Manual, NC Department of Information Technology
● CIS Controls v8, Control 9 (Secure Configuration for Network Devices)
● NIST SP 800-53: Security and Privacy Controls for Information Systems and Organizations
Previously Referenced as: October 2013 (4.05.01), April 2011 (3.11), January 2010 (3.37), July 2009 (3.45)
Adopted: September 2025
Revised: N/A