Office of Information Technology

Information Technology Support

 

Our mission is to service with outstanding technological assistance providing excellent service to our students, staff, and faculty. We will provide the highest quality of technology based services, and the most effective manner. Supporting lifelong learning that will shape our college future. Our motto is to make it happen with technology.

CREATE A TROUBLE TICKET WITH IT SUPPORT

 

Information Technology F.A.Q

Miles College IT Department is here to help students, staff, and faculty navigate the many aspects of state-of the-art technology on campus, including technical support, computer and software guidance, network/internet services, wireless access, multimedia setups and support, teleconference requests, remote access, support of general use, and residential computer labs.

See below for answers to technology related questions.

 

  • A. Call the IT Help Desk at Ext. 1498.

  • A. You can enter a trouble ticket or call ext. 1498.

  • A. Please, contact the Dorm Director

  • A. In the Bruno Lab and Kirkendoll Library Resource Center (LRC)

  • A. Located on the first floor of the LRC.

  • A. To login, you must enter Student as the username. The password is Miles1. If you need any further assistance, please speak with tech on duty.

  • A. Unauthorized peer-to-peer (P2P) file sharing on college and university campuses is receiving increasing attention from the entertainment industry, the media, and the United States Congress. Although P2P file sharing on college networks is not unlawful, such activity is not necessarily harmless [or without harm] especially as it can lead to a violation of the federal copyright law. Indeed, many student using popular software, such as Ares, BitTorrent, Direct Connect, Morpheus, LimeWire, and Gnutella, intentionally or advertently infringe on copyrighted works relating to music, movies, computer software, video games, and photographs. Lawsuit filings indicate copyright owners are taking the offensive against infringements on their protected works. Students need to know their rights and responsibilities, and their potential liability for unlawful P2P activities. Miles College does not promote the downloading of movies or music of any kind on campus.

  • A. For students – Username: (Student ID no.) – Password: (Six number date of birth) for faculty – Username: Employee ID No. – Password: (Six number date of birth).

  • Password is:

    Miles@ and your Student ID#. 

    Example: 

    Student ID: 123456 

    Password: Miles@123456

  • The Family Educational Rights and Privacy Act (FERPA) is a federal law that affords parents the right to have access to their children’s education records, the right to seek to have the records amended, and the right to have some control over the disclosure of personally identifiable information from the education records. When a student turns 18 years old, or enters a postsecondary institution at any age, the rights under FERPA transfer from the parents to the student (“eligible student”).

    Family Educational Rights and Privacy Act (FERPA)

Information Security

Information Security Policy

Miles College Office of Information Technology has security policies in place for safeguarding data and information in its workstations, servers, mobile computing devices, storage devices, network, and communication devices. These policies also ensure that there is no theft of sensitive data, exposure of critical information, and theft or damage to the College’s devices. Any use of Miles College information technology systems contrary to this policy may lead to a withdrawal of access.

Risk Assessment

Miles College Office of Information Technology staff regularly assess unauthorized use of network; risk to network security; unauthorized access to information; unauthorized request for information; and third-party unauthorized transfer of information; systems corruption; a breach of integrity. In addition, these risk assessments are done to ensure the protection of our student information. Risk assessments are conducted consistent with system criticality and are performed by IT staff on a yearly basis. Cybersecurity tests are performed annually and network penetration is tested twice a year to identify breaches in security. 

Password Security

  • Never disclose your password to others, in person, either by phone, or by email.
  • Never leave your password at the default. Change it immediately.
  • Make your password eight or more characters.
  • Use a combination of upper and lower case letters, numbers, and special characters like @!&[*
  • Never use all number or all letters.
  • Never use personal information that someone could easily guess or discover your pet or hometown, etc.
  • Never use any word found in a dictionary or the name of a sports team.
  • If you must write down your password, keep it in a locked location.
  • Change your password frequently, at least every 90 days.
  • Miles College IT staff will never ask for your password via email or telephone.

Desktop Security

  • When you leave your desk, log off or lock your workstation with Ctrl+Alt+Delete or Windows Key + L
  • At the end of day, logoff.
  • Do not download or install a screen saver to your workstation, choose a pre-installed screen saver.
  • Do not install software-commercial, shareware, or freeware-borrowed or purchased from another user.
  • Use of peer-to-peer applications to share copyrighted materials, such as music or movies, is a direct violation of copyright laws. Do not do it!

Laptop Security

  • Your laptop is an easy access for identify theft. Protect it like your purse or wallet.
  • When traveling, lock your laptop in the trunk of your car.
  • Password protect or encrypt any sensitive information stored on the laptop.
  • When you are away, lock it in a drawer, overhead bin, cabinet, or office.
  • Never leave your laptop unattended in a public place, even for “just a minute”
  • Never check your laptop as luggage when your travel.
  • Never leave your laptop in a car in plain view on the sear or the floor.
  • Never leave your laptop in a car overnight.
  • Never user your business card as a luggage tag to identify your laptop case.
  • Encrypt your hard drive if it is possible to do so.

Spyware

Spyware is used by the advertising industry and by hackers. Spyware and Adware are software that, when installed on your computer, may send you pop-up ads, redirect your browser to certain web sites or monitor web sites you visit. Extremely invasive versions of spyware may track exactly what keys you type to steal username and password information.

  • An anti-spyware/anti-virus package is installed to fight spyware and other malicious software.
  • Other tips to fight malicious software: do not click on links with pop-up windows, choose “no” when you are asked unexpected questions, be wary of free, downloadable software, and never follow email links.
  • If you believe you have spyware on your system, please contact your department’s IT personnel for assistance in having it removed.

Voice Mail

  • The minimum password length is set to four digits.
  • To create a strong voicemail password, use five or more digits.
  • Do not set your password to the same as your phone extension or employee number.

Viruses, Worms and Trojans, Malware

Viruses are computer programs designed to cause trouble to your computer. Worms are programs that replicate themselves and look for holes in networks or send themselves via email to infect as many other computers as they can. Trojans are programs that carry hidden, malicious programs.

  • Fight malicious software by installing an anti-spyware/anti-virus package.
  • Do not open email files from anyone you do not know.
  • Do not open email attachments containing executable or movie files.
  • Some files extensions to avoid include: .EXE .COM .CMD .PIF .SCR .VBS .WMF .ASF

Emails and Spam

  • Always password protect your email account.
  • Do not use your personal email account to send or receive sensitive information (credit card numbers, bank account information, SSNs, etc.)
  • Do not send or forward email messages such as chain letters, jokes, and messages containing lewd, harassing, or offensive information.
  • Be wary of unsolicited attachments, even from people you know. Viruses travel incognito, using legitimate email addresses to trick their way into users’ machines.
  • Do not click a link in an email. Even if the link says one thing, it may send you somewhere else.
  • Report other email abuses by calling 205.929.1498.

Phone / PDA / Mobiles Device Security Tips

  • Set a password or PIN on your phone to prevent unauthorized use and make it more difficult to hack if stolen or lost.
  • If your phone has Bluetooth functions, disable them until they are needed, and then set visibility settings to “hidden” so your device cannot be scanned for other Bluetooth devices.
  • Limit the amount of sensitive or personal information, such as passwords and account information, stored on your mobile device.
  • Consider purchasing anti-virus software for your phone, and make sure it is frequently updated.
  • Download ring tones, games, and other personalized content only from trusted, regulated sites.
  • Treat mobile devices as you would your wallet, keys or laptop. Do not leave them in plain sight and keep them close to you at all times. 
  • USB Drives / Thumb Drives / Jump Drives and other Mass Storage Devices

These drives are a very convenient and commonly used method to hold personal files and schoolwork. Unfortunately, the small physical size of these devices makes them easy to lose or to steal.

  • If you use a mass storage device to store any important or sensitive data-class work, research data, personal files, etc.-make sure that the data is protected.
  • Many modern mass storage devices come with a security utility that can encrypt sensitive files.
  • If you do not have encryption on your mass storage devise, do not keep sensitive information on it.

Response to Incident

Miles College Office of Information Technology necessitates notification of incidents of unauthorized usage, access, and activity.

External Vendors (Formal Process will be Implemented in October 2018)

External vendors providing service to Miles College and those who have access to data information have to maintain the integrity of that data and information and safeguard it against security leaks. Other College units using external vendors for technology needs will forward the contracts to Office of Information Technology for review of the contracts.

Miles College Office of Information Technology offers a wide variety of services. These include:

  • Training and education when requested.
  • Tips on fighting spam & identity theft, protecting your laptop and more.

If you suspect that you have been a victim of a computer crime or abuse while at Miles College, please report the incident by calling the IT help desk 205.929.1498. Give as much details as possible: Who, What, When, and Where.

Questions on the above policy can be sent to it_support@miles.edu or call 205.929.1498.

Contact Information Technology Department

To fulfill our mission, Miles College uses a wide variety of information technologies (IT) to assist in serving the campus. For more information regarding technology services, please contact the IT help desk.

Location

Brown Hall, first floor (campus map)

Hours

Monday through Friday 8:00 a.m. to 5:00 p.m.

Help Desk

For technical support requests and inquiries:

Email: helpdesk@miles.edu

Phone: (205) 929-1498 Ext. 1498

User Responsibilities

Requesting service for computer related issues

Emergencies – Call the IT Help Desk at 205-929-1498. Leave a message explaining your issue. Include your name, telephone number, and remain at your computer. IT Help Desk calls are answered promptly. If the entire office is down, check with the receptionist at your office to make sure that IT staff has been notified. The IT Help Desk working hours are Monday through Friday, 8am – 5pm CST.

Non-emergencies – Call the IT Help Desk at 205-929-1498. Leave a message explaining your issue. Include your name, telephone number, and remain at your computer. IT Help Desk calls are answered promptly. You may also send an email to helpdesk@miles.edu or log an IT Support Ticket via IT Support Ticket  with a description of the issue you are experiencing.

Tools and Resources

Miles College IT Services is responsible for ensuring that students have access to the computing and technology tools and resources needed to support their general academic efforts. Please use the links on this page to get more information about the tools and resources that are available.

If you have questions about these services or need technical assistance, please contact the Miles IT Service Desk.

 

Avast - is a free antivirus computer program available to Microsoft Windows, Mac OS X and Linux users, with a user interface available in 41 languages. <http://www.avast.com/en-us/index>

Adobe Flash - is the standard for delivering high-impact, rich Web content. Designs, animation, and application user interfaces are deployed immediately across all browsers and platforms, attracting and engaging users with a rich Web experience. <http://get2.adobe.com/flashplayer/>

Adobe Reader - is a program that is intended to give you the capability to read, edit, and print the popular Adobe Portable Document Format (PDF) file type, as well as adding a whole host of functions on top of the basic reader. PDF files are a particularly professional looking file type that enables you to read texts in precisely the way that the original author intended. Both PDF files and Adobe Reader have become industry standards. <http://get.adobe.com/reader/>

Adobe Shockwave - Shockwave Player is the web standard for powerful multimedia playback. The Shockwave Player allows you to view interactive web content like games, business presentations, entertainment, and advertisements from your web browser. The Shockwave Player displays web content created with Adobe Director. <http://get.adobe.com/shockwave/>

Anti-Virus Guard (AVG) Technologies / Free Antivirus / Free Virus Protection - is a family of anti-virus and Internet security software for the Microsoft Windows, Linux, Mac OS X, and FreeBSD computing platforms, developed by AVG Technologies. <http://free.avg.com/us-en/homepage>

Dropbox - is a free service that lets you bring your photos, docs, and videos anywhere and share them easily. <https://www.dropbox.com/business?_tk=adwords&_kw=dropbox|e&_net=g&_ad=32037028902|1t1&_camp=Search%3A%20Brand%20%22Dropbox%22%20-%20US&gclid=CPfLn5n51LgCFWQV7AodKjQAqw>

Eset Online Scanner – is a free online virus scanning software. <http://www.eset.com/us/online-scanner/>

Evernote - is a suite of software and services designed for note taking and archiving. A "note" can be a piece of formatted text, a full webpage or webpage excerpt, a photograph, a voice memo, or a handwritten "ink" note. Notes can also have file attachments. Notes can be sorted into folders, then tagged, annotated, edited, given comments, searched and exported as part of a notebook. <https://evernote.com/>

Ipiccy - Photo editor allows you not only do basic edits: picture crop, rotate and resize but more advanced photo editing like facial touch-up, painting with custom brushes, overlay photos, stickers, add cool frames and apply stunning textures. <http://ipiccy.com/>

Java - The Java Plug-in software is a component of the Java Runtime Environment (JRE). The JRE allows applets written in the Java programming language to run inside various browsers. The Java Plug-in software is not a standalone program and cannot be installed separately. <www.java.com>

K-Lite Codec - is a collection of codecs and related tools. Codecs are required to encode and/or decode (play) audio and video. The K-Lite Codec Pack is designed as a user-friendly solution for playing all your movie files. <http://www.free-codecs.com/k_lite_codec_pack_download.htm>

Office 365 - is a free tool. It's not a trial! Students and teachers are eligible for Office 365 Education, which includes Word, Excel, PowerPoint, OneNote, and now Microsoft Teams, plus additional classroom tools. All you need to get started is to enter a valid school email address below. <https://products.office.com/en-us/student/office-in-education>

Open Office - is an open-source office productivity software suite. It descends from OpenOffice.org (OOo), which was an open-sourced version of the earlier StarOffice. OpenOffice contains a word processor (Writer), a spreadsheet (Calc), a presentation application (Impress), a drawing application (Draw), a formula editor (Math), and a database management application (Base). OpenOffice's default file format is the OpenDocument Format (ODF), an ISO/IEC standard, which originated with OpenOffice.org. It can also read a wide variety of other file formats, with particular attention to those from Microsoft Office. <http://www.openoffice.org/download/>

Microsoft Security Essentials - is a free product you can download to help defend computers running Windows XP, Windows Vista, and Windows 7 against viruses, spyware, and other malicious software. <http://windows.microsoft.com/en-us/windows/security-essentials-download>

Microsoft SkyDrive - is a file hosting service that allows users to upload and synchronize files to a cloud storage and then access them from a Web browser or their local device. It is part of the Windows Live range of online services and allows users to keep the files private, share them with contacts, or make the files public. Publicly shared files do not require a Microsoft account to access. <http://windows.microsoft.com/en-us/skydrive/download>

Padlet - It is a virtual board with sticky notes that can be easily moved, shared, and embedded. There are several views, including something that looks more like a scrollable blog and it is easy to both personalize the experience and organize notes. The privacy and moderation settings make it easy for students to become members of a board where a teacher can post resources and encourage them to do the same. <http://padlet.com/>

Prezi - is a U.S. software company, producing a cloud-based presentation software and storytelling tool for presenting ideas on a virtual canvas. <http://prezi.com/>

Thinglink - is a web-based software, which allows users to add content to images. <http://www.thinglink.com/>

WeVideo - is a simple web-based video editing tool that turns video projects from a huge time sink to an easy and fun experience. <http://www.wevideo.com/>

WinZip - is a shareware file archiver and compressor for Windows, OS X, iOS and Android developed by WinZip Computing. By default, WinZip creates archives in Zip file format but also has various levels of support for other archive formats. <http://www.winzip.com/win/en/downwz.htm>

Wix - is a cloud-based web development platform that allows users to create professional HTML5 websites and mobile sites, through the use of online "Drag & Drop" tools. <http://www.wix.com>

Social Media Policy

Miles College recognizes that social networking sites and applications are increasingly used to foster the development of the Miles College virtual community. The purpose of these social networking sites should be to foster a virtual community that portrays Miles College in a positive light through information sharing in a community of students, staff, faculty, administrators, and alumni. The evolving nature of social networking sites, however, are  not limited to YouTube, Facebook, iTunes, iTunesU , Ustream, BlogtalkRadio, Twitter, LinkedIn, Twitter, Blogs, MySpace, Wiki, Podcast, Google+ and Flicker. 

While these social platforms are an important part of Miles College’s communication strategy, it is imperative that all users of these sites make the best use of their time and talents towards reaching their educational goals as stated within the student rights and responsibilities (page 11-12 student handbook). It is expected that all members of the Miles College community who are users of social media act with honesty, respect of the rights of others, display ethical values, maintain individual privacy, abide by applicable slander and copyright laws, and adhere to university policies

Scope

This policy applies to allstudents, staff, faculty, administrators, and alumni who use social media in the course of their duties.

Usage

Miles College social media accounts are intended to be used solely for business purposes. Depending on the nature of the employee’s duties, these purposes may be addressed through a variety of services, including but not limited to Facebook, Twitter, LinkedIn, and YouTube.

The following are examples of legitimate business usage of public social media:

  • Building positive brand image: Organizations can use social media to promote a positive brand image. This is particularly important for organizations vulnerable to negative press or consumer discontent.
  • Increasing mind share: Social media can reach large audiences at very low monetary cost, giving organizations another medium for promotion, increasing awareness of your organization/brand.
  • Improving customer satisfaction: Customers that receive more timely and personal service in the medium that they prefer will be more satisfied.
  • Gaining customer insights: Social media can be used to monitor public opinion on a company, its products and services, or its competitors.
  • Increasing customer retention: Using social media builds affinity and loyalty since customers are engaged using a medium they prefer – something the organization needs to offer to remain competitive.
  • Increasing revenue: Use of social media to create custom network applications (a.k.a. plug-ins) for product and brand promotion or integration with a company’s own online services.
  • Customer acquisition: Use of social networks like LinkedIn for professional networking, such as maintaining academic contacts or maintaining contacts with members of professional or standards organizations that can lead to prospecting.
  • Reducing cost of servicing customers: Use of social media to quickly and efficiently respond to customer service issues. The answer to the problem can be public, making it searchable by other customers that have the same request.
  • The use of social networking sites to conduct the College business can only be conducted by authorized personnel. The Office of College Relations  is the authorize arm of official information relating to Miles College. Only authorized personnel can post on a social network profile, the institutions logo or emblems, the institutions name, college email address and telephone number, official calendars, departmental information, and events. 
  • Any group wishing to use Miles College’s name and images must receive written approval from the Office of College Relations.

The following activities are deemed inappropriate uses of social media:

  • Use of social media for illegal or unlawful purposes, including copyright infringement, obscenity, libel, slander, fraud, defamation, plagiarism, harassment, intimidation, forgery, impersonation, soliciting for illegal pyramid schemes, and computer tampering (e.g. spreading of computer viruses).
  • Use of social media that in any way violates the company’s policies, rules, or administrative orders, including, but not limited to, (See Miles College Code of Conduct in Handbook).
  • Opening attachments from unknown or unsigned sources. Attachments are the primary source of computer viruses and should be treated with utmost caution.
  • Sharing social media account passwords with another person, or attempting to obtain another person’s social media account password.
  • Individuals are not permitted to post personal material that is construed to imply that they are the positions of the College or as a representative of Miles College. Therefore, the responsibility of any department or organization decides to use social networking to educate members of the group on privacy and legal policies and Miles College information technology policy.

Terms and Conditions of Use

  1. Use of personal social media accounts and user IDs for company use is prohibited. All process-driven use of social media shall be managed by social media management platforms (SMMPs). Employees will have accounts on the SMMP to access company social media properties and shall not directly access the company’s social media accounts with the social media services themselves.
  2. Use of company social media user IDs for personal use is prohibited. Examples of prohibited use of company User IDs include downloading and installing plug-ins or helper applications such as those that try to access the company email directory, joining groups using a company user ID for personal reasons, or adding friends to an employee’s friends list.
  3. IT will establish access for any applicable apps to the targeted social media site as required for a SMMP to function, making exceptions in firewall, proxy, or web content filter rules.
  4. Social networks normally have open, closed, and limited access. Setting up a privacy guard is critical to monitoring the content on the sites; therefore, it is imperative that individuals developing social networking groups be familiar with privacy guards and options. The group administrator is required to develop close or open access groups and frequently monitor group activities and postings for inappropriate content. Group administrators of Miles College affiliate groups are representing Miles College and will be expected to conduct themselves as representatives of Miles College. They have the responsibility for monitoring postings and comments, deleting posts, and defriending individuals who do not adhere to established policies. They also have the responsibility to ensure that the content is frequently updated and is a good representation of the college.
  5. Miles College recognizes that campus groups will use social media for communicating services and events but in soliciting friends, group administrators must establish participating guidelines for photos, videos, group participation, walls, and discussion boards. Miles College clubs and organizations can only develop official social networking with the consultation of the group faculty or staff advisor. The group description should be visible, the pictures posted must be tasteful, and content must be an appropriate representation of the group. Violators with inappropriate posts must be immediately removed or reported to the Office of the Dean of Student Affairs for disciplinary action.
  6. As it relates to social media, faculty/staff/students understand that they must protect confidential and proprietary information: Do not post confidential and/or proprietary information about Miles College, students, employees, or alumni. Employees must still follow the applicable federal requirements such as FERPA, PCI-DSS and HIPAA, as well as NCAA regulations and adhere to all applicable Miles College privacy and confidentiality policies. Social media shall not be used to harass, intimated, or the like, any Miles College employee, student, or alumni. Worked related issues to included personnel, office projects, assignments, etc. Must not be discussed or included in social media, unless approved in writing beforehand by employee’s supervisor. Employees are responsible for maintaining proper deportment and language on social media sites. Employees who share confidential information and violate social media agreements do so at the risk of disciplinary action or termination.

Security and Risk Mitigation:

IT must assist the business unit in establishing initial account management procedures for use of a SMMP or other social tools that aggregate and centrally manage the company’s social media accounts properties.

Social Media Content Archival:

In compliance with the organization’s record retention policies, social media content may be retained in the organization’s archives, or as back-up copies, even after they are deleted from an employee’s mailbox. The goals of the backup and archiving procedures are to ensure system reliability, prevent document and data loss, comply with regulatory and legal requirements, and supply evidence in the event of litigation.

Backup copies exist primarily to restore service in case of failure. Archival copies are designed for quick and accurate access for a variety of management and legal needs. Both backups and archives are governed by the company’s document retention policies. These policies indicate that email must be kept for up to 5 years. 

Policy Violations and Non-Compliance

  • Non-compliance and violations of this policy will be treated like other allegations of wrongdoing at Miles College. Allegations of misconduct will be investigated according to established procedures. Sanctions for non-compliance or violations of this policy include, but are not limited to, the following:
  • Temporary or permanent revocation of access to some or all computing and networking resources and facilities;
  • Disciplinary action according to applicable organization’s policies, up to and including termination of employment; and/or
  • Legal action according to applicable laws and contractual agreements.

General IT Campus Policy

Computer and Network General Use Policy

To fulfill our mission, Miles College uses a wide variety of information technologies to assist in serving the campus. The Information Technology Policy provides the campus community with guideline for the proper use of the Office of Information Technology (IT) computer hardware, software, email, and Internet service.

Any use of Miles College information technology systems contrary to this policy may lead to a withdrawal of access. Abuses that may result in termination of access rights include, but are not limited to, knowingly downloading illegal software or music, engaging in the abuse of a fellow member of the Miles College community via the Internet or social media outlets, and sending spam to Miles College email addresses.

These guidelines are designed to inform faculty, staff, and students on their responsibilities as it relates to the use of Miles College technology resources. Information technology (IT) resources is interpreted to include all Miles College system computing and telecommunications facilities, equipment, hardware, software, data, systems, networks and services which are used for the support of teaching, research and administrative activities of the College.

It is the responsibility of each faculty, staff, and student to follow the following policies. The responsibilities are shared with them during faculty/staff conferences, divisional meetings, new student orientation, and in the classrooms. This policy is also available online.

  • Understand and follow the IT policies in this document.
  • Use the computer systems properly.
  • Protect the integrity of the systems by treating equipment with care and respecting IT security measures.
  • Call the helpdesk when a problem occurs.

It is the obligation of the IT staff to:

  • Educate the campus community about any IT questions or concerns.
  • Follow a process that addresses IT needs in a timely manner.
  • Provide faculty, staff, and students with working equipment that helps to meet their needs.
  • Respect faculty, staff, and students’ privacy for all information they store in the IT systems.
  • Respond to IT Help Desk calls in a timely manner.

Student Training in Technology

The Miles College Office of Information Technology assists in providing training in the use of technology through the required Computer Literacy Course in which all students must enroll as part of general core requirements. It provides a comprehensive overview of computer technology, familiarizes students with basic terminology, and prepare students to understand and utilize computers in their personal and professional lives.

Faculty Access and Training in Use of Technology

The Miles College faculty has desktop computers and is provided with training in the use of applications. The College maintains technology appropriate to meeting the learning outcomes of its programs as well as to ensure faculty access to technology.

Management and Access Controls

Each IT resource has a designee who is responsible for its security and management. Each authorized user of a system has a unique login ID. Any ID which is used to access a system and does not provide a unique user identification, has access only to specific, restricted system resources. Access to services and/or resources are suspended, and the appropriate account deleted when there is no longer a business or academic need for access. Employees are required to remove any personal data from Miles College computer systems prior to their last day at Miles College. The deprovisioning of the account is performed in a manner proportionate to the level of risk posed by such access, including immediate suspension of access and privileges and deletion of the account if necessary.

When an employee is terminated, that responsibility falls upon the department and the user’s supervisor to report termination. Information Technology, upon an employee’s termination and departmental request, stores files on a network drive and makes it available to the new departmental data owner for a period of one (1) year, unless a request is otherwise made, at the end of which the files are purged from the system. By default, IT will keep email, and user account is disabled. 

Access control procedures is used to authenticate all users who access each system. Such controls include, at a minimum, a login ID and a response mechanism (such as a password) for each user. All user accounts are required to change passwords periodically. The frequency is determined by the enforced length and complexity of the password combined with the sensitivity of the data protected, in accordance with industry standards and guidelines published in the security website.

Access rights and privileges for all authorized users are maintained and managed so as to secure access to data in a manner appropriate to the needs of the user and the value of the data. Confidential data is protected against unauthorized access regardless of form, computing environment or location.

Hardware (Including hardware issued and used offsite)

  • Installing and Removing Hardware – Users are not authorized to attach/detach or install/uninstall any computer components without authorization from their Division Chair and involvement of IT staff. This includes keyboard, mouse, printer, modem, monitor, internal boards, or components. The Office of Information Technology is responsible for assigning computer components to specific computers.
  • Storing Data – Users with the need for an extraordinary amount of data storage should notify their Division Chair who will then work with the IT staff to meet the user’s needs. If portable media containing electronic protected health information is generated, the user must take the responsibility to store the media in a secured, locked location and dispose of the media per the media disposal guidelines when no longer needed.
  • Acquiring and Disposing of Computer Hardware – The purchase of any computer hardware or the disposal of old computer hardware is done only with the approval of the Director of Technology and involvement of IT staff. Please check with the IT staff on proper disposal of removable media (CDs or floppy disks…) containing confidential information.

Software

  • Installing Software – It is the responsibility of the Office of Information Technology to install any software on Miles College computers. User must submit a “User Request Form” found on the IT page of the Miles College website, to have any program installed on any Miles College equipment by the IT staff.
  • Unauthorized Downloadable Software – The use of unauthorized downloadable software is prohibited. Downloadable software such as freeware, shareware, program demos, surveys, advertising, training, Internet browsers, copyrighted data, fonts, personal digital images, graphics, and personal photos should not be downloaded without prior approval. 
  • Software Licensing Compliance – Violation of any software licensing agreement, copyright, or other intellectual property rights of third parties is strictly prohibited. This includes, but not limited to, computer software/data or related manuals and materials. Contact the Office of Information Technology for more information about software licensing agreements.

Internet and Email

  • Internet and Email Usage – The computer system, Internet and email system are to be used for college business purpose only; however, the organization realizes that occasionally it is necessary for employees to use the Internet for important personal issues, but such usage must be kept to a minimum and all computer use rules must be followed. Some examples of limited personal use may be to access other email accounts, bank accounts, and to verify travel plans.
  • Your email account is the official means of communication from the College. You are expected to check it regularly.
  • All restricted information must be approved, encrypted, and password protected.
  • Mass emails should only be used for official college events or communications. The mass email system should not be used for private marketing, solicitation, etc. without prior approval.
  • It is prohibited to use the Miles College email system to create, forward, and/or distribute any material that is disparaging or otherwise offensive.
  • Viruses – The IT network or any computer resources cannot be used to download or distribute pirated software or data, or to propagate any virus or variant thereof. Instant messaging/chat rooms and the like are expressly prohibited to all employees unless specifically authorized otherwise.

System Security

  • Shutting Off Computers – Users have the responsibility to sign off the computer after they are done using the computer or whomever they need to leave the computer for an extended period. When leaving a computer unattended, lock/log off the computer.
  • Virus Scan – Disks, removable media, and drives from any outside source have to be scanned for viruses prior to opening the contents on the disk/removable media/drives. 
  • Laptops – Laptops need to have virus software updated regularly. The Office of Information Technology will provide users with practical avenues to accommodate anti-virus software updates.

Harassment

Harassment of any individual or group through email, websites, or any other online means is prohibited. Harassment takes many forms. In general, it creates an uncomfortable or hostile environment for the individual or group who is being harassed. If you send, an email message to another person and make unwanted sexual advances, or if you send unwanted digital messages, or if you send many messages to another person, you are harassing that person.

Monitoring and Enforcement

The Miles College Office of Information Technology actively monitors network and network resources. Most monitoring activities are routine, and allow the IT staff to detect, diagnose, and fix the normal day-to-day problems associated with operating a complex network. Monitoring also ensures that the network is used for is intended purpose-academics and academic support-and safeguards the College against legal risk.

When Miles College believes that technology, resources are being:

  • Misused
  • Inappropriately used
  • Illegally used
  • Used in a way that compromises or threatens the functioning of the system
  • Used in conflict with College policies or local, state, federal, or international law

Miles College reserves the right to instigate, and to take whatever action is necessary to maintain system integrity and security.

Miles College may review individual IT records to the extent necessary to assess the problem and determine responsibility. Miles College also reserves the right to delete files, programs, network connections, and/or user accounts.

Both network and individual user logs may be examined. This includes the logs on personal computers or servers that are attached to the College network, whether they are owned by the College or by other parties.

Abuse of technology privileges may result in appropriate disciplinary action. In many cases, the user is given a warning. Cases involving students may be referred to the Office of the Dean and Vice President of Student Affairs. If the user violates our policies more than once, then this may result into the account or computer losing network privileges.

The College may suspend or revoke user email or network privileges. In cases of illegal activity, the College may refer the matter to law enforcement authorities.

Finally, the College reserves the right to respond to legally mandated requests for technology records. For example, if a law enforcement agency is investigating allegations of copying and distribution of copyrighted material, and serves a court-approved search warrant upon the College, the College is obligated to permit the search.

Prohibited Uses of Miles Computers

  • Do not use the video feature on your PC unless you are using it for web cast based training/teleconferencing that is relevant to your work.
  • Offensive or Inappropriate Information – Preparing, displaying, or transmitting messages, pictures, or information consideration offensive or inappropriate including, but not limited to, content pertaining to race, ethnicity, religion, age, gender, veteran status, sexual orientation, or sex.
  • Copyright – Copying, replicating, or transmitting documentation, software, or other information in violation of copyright laws.
  • Network – Disabling or overloading any computer network or circumventing any system designed to protect the privacy or security of another user.
  • Unauthorized Persons – Providing IT systems access to unauthorized persons. 
  • Unauthorized Access – Gaining unauthorized access to electronic information and communication systems.
  • Inappropriate Websites – Accessing websites including but not limited to pornography, gambling, gaming, dating, shopping, music file downloading, job searching, chain letters, and etc.

Peer-to-Peer File Sharing (P2P)

  • Unauthorized peer-to-peer (P2P) file sharing on college campus is receiving increasing attention from the entertainment industry, the media, and the United States Congress. Although P2P file sharing on college networks is not unlawful, such activity is not necessarily harmless [or without harm] especially as it can lead to a violation of the federal copyright law. Indeed, many student using popular software, such as Ares, Direct Connect, Morpheus, LimeWire, and Gnutella, intentionally or advertently infringe on copyrighted works relating to music, movies, computer software, video games, and photographs. Lawsuit filings indicate copyright owners are taking the offensive against infringements on their protected works. Students need to know their rights and responsibilities, and their potential liability for unlawful P2P activities.
  • Miles College does not actively monitor illicit or inappropriate activities, nor is it under obligation to defend or accept responsibility for its students’ illegal actions in the P2P context. Miles College expects our user’s community to act in a proper and responsible computing manner and to the extent possible attempts to thwart illegal file sharing. However, if illegal or inappropriate activities are brought to our attention, the College takes all reasonable and appropriate actions.
  • Avoid downloading, distributing or possessing copyrighter material over the Internet and the College internal network unless you have received explicit permission from the owner or their official representative, or have paid an access or license fee to obtain the material. If you are using a peer-to-peer application, you should remove it from your system prior to connecting the College’s network. If you do not remove the application, you should ensure your system is set to prevent the application from acting as a provider or unlicensed materials to other users. Failure to restrict the application, whether you are aware of the violation or not, result in the College’s information technology unit removing your machine from the network until the copyright violation is rectified.

Spam Prevention

  • It is the responsibility of each computer user to take steps to safeguard against increasing the amount of spam that comes into the College.

Connection from On-Campus

  • Computer network access is provided to students across the campus. The whole campus, including the residence halls is equipped with 802.11 b/g/n wireless network coverage.
  • To access the Miles/Miles Student wireless network, your computer must be equipped with a wireless network interface card (NIC) and configured for support WPA2 certification. The wireless key is provided by the Office of Information Technology.
  • Personal Hubs, routers, or wireless access points are not allowed.

Disclaimer

No responsibility is accepted for any damages, direct or indirect, howsoever caused, arising from any user’s use of Library computers or associated Internet access.

 

Questions on the above policy can be sent to it_support@miles.edu or call 205.929.1498.

Blackboard Student

Click Here for Blackboard Learn Videos: For Instructors

 Blackboard Faculty Login Instructions 

1. Go to the Miles College Home page and click on the Blackboard link in the upper, left corner. You can also use the direct link of miles.blackboard.com. 

2. Your login is your email address. For example, my email is jdoe@miles.edu, so my login name is jdoe@miles.edu

3. Your password is the letter ‘m’ (lowercase) + your Employee ID. For example, if myemployee ID is 1234567, my password is m1234567. 

Entering A Course 

1. Once you have logged into Blackboard. locate the ‘My Courses’ area (upper, right corner). 

2. All courses in which you are enrolled will be listed in this area. 

3. To enter a course, click on the course’s title  listed in the ‘My Courses’ area. 

For Help 

1. For 24/7 Blackboard Help, including “how-to” and login assistance, call or click the Miles College Blackboard Helpdesk: a. Portal: http://miles.edusupportcenter.com/ 

b. Phone: 1-(844) 897-9160 

Bear Safe APP

Miles College Launched a Campus Saftey Application called "Bear Safe" on IOS and Android mobile application stores FREE to download. Miles is moving Technology forward to the 21st Century in aloowing out Students, Faculty and Staff to have access to a mobile Applicaiton that allows someone to notify the Authorities instantly with GPS location, Video and Voice recordings. Please see below for our Privacy Policy and the Safe Terms Of Service.

Bear Safe Privacy Policy

Bear Safe Terms Of Service