Skip to main content
Back To Top Top Back To Top
This website publishes administrative rules on their effective dates, as designated by the adopting state agencies, colleges, and universities.

Chapter 3354:1-50 | Policies on Public Affairs, Safety and Security and Technology Resources

 
 
 
Rule
Rule 3354:1-50-03 | Public affairs and information policy.
 

(A) The office of public affairs and information shall be the primary liaison between the college and the community and shall be responsible for supporting the college's mission, programs and image.

(B) The office of public affairs and information shall be responsible for communicating to the public through all available media to ensure that the community has a positive image of the college, and that positions and statements of the college are presented accurately and consistently.

(C) The office of public affairs and information shall maintain a department manual detailing all responsibilities for the development and implementation of their marketing, communication services and public/community relations duties.

(D) The president or the president's designee is hereby directed to take all steps necessary and appropriate for effective implementation of this policy.

Supplemental Information

Authorized By:
Amplifies:
Rule 3354:1-50-04 | Safety and security policy.
 

(A) The department of campus police and security services shall take reasonable steps to maintain a safe and secure environment at college facilities.

(B) Manual of directives. The department shall maintain and operate in accordance with its "Department of Campus Police and Security Services Manual of Directives," in such form as that manual may be updated from time-to-time. (If the manual should happen to conflict with this safety and security policy, now or in the future, the terms of this policy shall govern.)

(C) Firearms and other weapons. Except as set forth in this policy, no person may carry or use weapons on college property. For the purposes of this policy, weapons are defined to be guns, knives, or any other dangerous instrument.

(1) The college's campus police and security services law enforcement officers, acting within the scope of their employment, may carry and use weapons on college property.

(2) Weapons may be used for educational purposes within college-approved curriculum, including without limitation the police and security training academy and criminal justice institute.

(3) Individuals (other than campus police and security services law enforcement officers) who bring weapons onto college property for educational purposes may do so only after first obtaining a permit for each such weapon from the department of campus police and security services. Such permits shall be limited to such times and locations as may be reasonably necessary to support educational purposes.

(D) Traffic and parking. The department of campus police and security services shall establish and enforce traffic and parking regulations for college facilities.

(E) Volunteer auxiliary police. The department of campus police and security services may appoint police academy graduates as volunteer auxiliary police, on an as-needed basis, and subject to the requirements of section 3345.04 of the Revised Code.

(F) The president or the president's designee is hereby directed to take all steps necessary and appropriate for effective implementation of this policy.

Supplemental Information

Authorized By: 3354.09
Amplifies: 3354.09
Prior Effective Dates: 5/13/2005
Rule 3354:1-50-05 | Technology resources policy.
 

(A) The college shall operate and maintain audio-visual, computing, copying, faxing, internet, knowledge management, networking, scanning, software, telecommunications, television, and similar resources to facilitate achievement of the missions and goals of the college. These college-operated and maintained resources, including all files, data and other information they may contain, are often referred to as "Technology Resources" in the policies and procedures of the college.

(B) The college routinely grants faculty, students, staff, and certain guests access to technology resources. Technology resources are generally the property of the college. Access to these resources is a privilege, but is not a right; access may be denied at any time without notice. Every technology resource user (each, a "User") is subject to this policy and to other applicable policies and procedures of the college.

(C) The president or the president's designee is hereby directed to take all steps necessary and appropriate for the effective implementation of this policy.

Supplemental Information

Authorized By:
Amplifies:
Rule 3354:1-50-05.1 | Technology resources procedure.
 

(A) User access.

The college operates and maintains technology resources to facilitate achievement of its missions and goals. Access to technology resources is a privilege granted to users, but is not a right. Access may be denied, and technology resources may be seized, at any time and without notice. Every user is subject to this procedure, and other applicable policies and procedures of the college.

(B) Prohibited user behavior.

(1) Using technology resources to violate, or while violating, any law or college policy or procedure.

(2) Accessing or attempting to access any technology resource without proper authorization from the technology systems and resources ("TSR") department; or using any technology resource to access or attempt to access any other party's technology resource without proper authorization.

(3) Using technology resources to access, display, transmit, or store obscene or pornographic materials or communications.

(4) Interfering or attempting to interfere with the operation of any technology resource, or with any user's use or access.

(5) Sharing without prior TSR authorization any username, password, or other access security method; or using or facilitating the use of any technology resource that is subject to any access restriction without prior TSR authorization.

(6) Using any technology resource to send any communication using a false name, or using any other method that suggests another individual is the sender.

(7) Using any technology resource in a manner inconsistent with contractual obligations or other legal restrictions applicable to the college.

(8) Using technology resources in such a way as to appear to express the views of the college (except to the extent one is properly authorized to do so).

(9) Knowingly or intentionally introducing any bugs, viruses, worms, or other "malicious software" to technology resources; or knowingly or intentionally using technology resources to propagate any bugs, viruses, worms, or other "malicious software."

(C) No expectation of privacy.

Users should not have an expectation of privacy in anything they create, store, send, or receive using technology resources. Users should be aware that communications and other information sent or received through technology resources may not remain confidential while in transit or while stored on the sending or receiving technology resources. The college reserves the right, with or without notice, to monitor, access, and record all user activities involving technology resources.

The college monitors and records all user internet activity. Periodically, this activity is analyzed for individuals' violations of college policies and procedures. (At any time, users may obtain a list of internet activity associated with their account by submitting a request to the vice president of TSR.) The normal operation and maintenance of technology resources generally includes the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, and other activities.

The college may also specifically monitor and record the activity and accounts of individual users of technology resources, including individual login sessions, communications, and any other activities, without notice, when (1) the user has voluntarily made them accessible to the public, as by posting to usenet or a web page; (2) it reasonably appears necessary to do so to protect the integrity, security, or functionality of college or other technology resources or to protect the college from liability; (3) reasonable cause exists supporting the belief that the user has violated, or is violating, college policy or procedure; (4) a user account appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns; or (5) when such monitoring or recording is otherwise required or permitted by law. Individually-targeted monitoring described in this paragraph must be authorized in advance by the vice president of TSR, vice president of human resources, or the college president.

The college, in its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, to appropriate college personnel or law enforcement agencies and may use those results in appropriate college disciplinary proceedings. Communications and other information transmitted or stored using technology resources may also be subject to disclosure under Ohio's public records laws.

(D) Installation of software and connection of devices.

Only TSR may install software on technology resources, or connect any device to technology resources. Any user who connects a device or installs software in violation of the foregoing does so at the user's own risk, and the college may hold such users responsible for any associated costs, claims, losses, or liabilities. Devices connected or software installed by anyone other than TSR will not be supported by the college, and may be removed by the college at any time without notice and without any liability for any damages whatsoever to any party.

(E) Violations.

Violation of this procedure may result in sanctions up to and including: immediate and permanent termination of access privileges; and civil or criminal legal action by the college, law enforcement organizations, and injured third parties. In addition, students, faculty, and staff may be subject to disciplinary actions described in other applicable College policies and procedures.

(F) Notices and disclaimers.

(1) The college may restrict or terminate user access at any time, without notice, and with or without any reason.

(2) Users are solely responsible for backing up their own files. Failure to do so may result in damage or complete loss of files and all associated information.

(3) The college disclaims any and all representations or warranties, expressed or implied, about the technology resources' quality; effectiveness; safety; fitness for any purpose; and lack of errors, viruses, worms, or other "malicious software."

(4) The college is not responsible for offensive or illegal material which may be accidentally or intentionally sent, received, or displayed while using computers or networks belonging to the institution.

(5) The college is not responsible for damaged, lost, unavailable or stolen data, intellectual property, or other real property resulting from or occurring while using technology resources.

(6) The availability of technology resources is not guaranteed to any extent whatsoever.

(7) Technology resources sometimes link to or contain materials generated or posted by college departments, organizations, students, employees, or others. Such materials do not necessarily represent the official views of the college.

(8) The college does not assume any responsibility or risk for user's use of the internet. The college does not operate, control or endorse any information, products or services on the internet in any way.

(9) Users should avoid personal uses of technology resources that result in any charge to the college. Users must promptly identify all such charges to the college, and promptly provide full reimbursement.

(G) Capitalized terms not defined in this procedure shall have the meaning given to them in the technology resource policy.

(H) The college president hereby designates the executive vice president of Administration or that person's designee to take all steps necessary and appropriate for implementing this procedure.

Supplemental Information

Authorized By:
Amplifies:
Rule 3354:1-50-06 | Youth Protection Policy.
 

(A) The college recognizes the critical importance of protecting young people who participate in its programs. The college shall:

(1) Establish and implement detailed procedures to screen all faculty, staff, volunteers, and subcontractors who are involved in programs involving youth.

(2) Provide training to all faculty, staff, volunteers, and subcontractors who are involved in programs involving youth including, but not limited to, college code of conduct, recognizing signs of suspected child abuse, and bullying prevention.

(3) Carefully supervise staff, young participants, programs/activities, and facilities in order to foster a safe environment.

(4) Develop and implement rules and regulations surrounding out-of-program contact that support the safety of the youth.

(5) Report suspected abuse in accordance with state and federal regulations.

(B) The president or the president's designee is hereby directed to take all steps necessary and appropriate for the implementation of this policy.

Supplemental Information

Authorized By: 3354.09
Amplifies: 3354.09