Brad Goodman Solutions (BGS) dba iOps360 provides access to its computing, communications and information resources. These resources are the property of BGS and support the delivery of information for the organizations we serve. These resources should be used responsibly. These resources include the physical data communications network and all computers, printers, scanners and other hardware attached to that network, as well as all system software, telephone systems, and means of access to the Internet. With regard to the computing, communications and information technology resources of BGS, all users understand and agree to the following provisions:

  1. The computing, communication and information resources are provided for the support of the BGS customers and the use of such resources for other purposes is prohibited. Use is permissible so long as: (a) it does not violate state or federal law or BGS policy, (b) it does not consume excessing system resources, (c) it does not interfere with productivity of employees, and (d) it does not violate copyright laws. All users of BGS information technology resources and services shall abide by this policy along with any local, state, and federal law that may apply. All users are subject to both the provisions of this policy, as well as any policies specific to the individual systems they use.
     
  2. To protect the integrity of computing resources, passwords, access codes, or account names must not be shared with others. Additionally, passwords will be subject to complexity requirements and users will be required to change their passwords periodically.
     
  3. Most educational materials (both commercial and BGS customer created, including software) are protected under copyright. Any violation of the rights of a person or entity protected by copyright law is prohibited. The unauthorized duplication, installation, or distribution of computer software utilizing the BGS computing, communications and information resources is specifically prohibited. Unauthorized software installed on BGS owned computers will not be supported and may be removed if deemed necessary.
     
  4. Users may not connect any system/equipment or install software which could allow any user to gain access to any BGS system and information without prior approval.
     
  5. Users may not use BGS resources for conducting a private business or for personal financial gain outside of tasks necessary by your agency.
     
  6. Intentionally sending or accessing pornography or patently obscene material is prohibited. The definition of “pornography” and “obscene” shall be as determined by law.
     
  7. Computer and information technology users should consider the open nature of information transferred electronically, and should not assume an absolute degree of privacy or restricted access to such information. BGS provides the highest degree of security possible when transferring data, but disclaims responsibility if these security measures are circumvented and the information is compromised.
     
  8. Authorized BGS personnel may, while performing routine or investigative operations have access to data, including documents, log files, web browser information, live chat information, and any other data stored on BGS computers. Users of BGS are subject to routine monitoring to ensure compliance with acceptable use policies. Neither BGS, nor any employee shall disclose the contents of any observed data to any other person or entity except as required by law.
     
  9. Activities that place excessive strain on network resources should be avoided.
     
  10. The confidentiality of user records information is protected under federal and state law and/or regulations. Any information regarding employees that might be accessed in the course of using BGS resources may only be shared with those who are authorized to have such information. BGS employees may not change, alter, copy, or divulge any such information unless requested by your agency point of contact(s).
     
  11. All users should ensure that they logged off and/or lock their device when not in use.
     

Users found in violation of the BGS computer and information technology use policies, are subject to termination of their BGS accounts as described in the enforcement section of this document.

Selected Examples of Unacceptable Use:

  • Revealing passwords to others, allowing someone else to use your account.
     
  • Using someone else’s account. Utilizing logins, passwords or data that are not assigned for one’s specific use on the designated system.
     
  • Attempting to manipulate, reverse engineer or alter files to obtain access or information not authorized for one’s specific use.
     
  • Not complying with requests from BGS personnel to discontinue activities that threaten the integrity of computing resources.
     
  • Attempting to defeat data protection schemes or to uncover security vulnerabilities.
     
  • Unauthorized network scanning or attempts to intercept network traffic.
     
  • Malicious disruptions such as introducing a malware, computer virus, worms etc. to the network.
     
  • Harassing or threatening other users of the BGS network.
     

To ensure the integrity and reliability of computer and communications resources, all users are encouraged to report improper use and violations of this agreement. Individuals may report suspected violations of this agreement to a BGS employee, your supervisor or your administration as appropriate.
 

Enforcement 

Individuals may report suspected violations of these guidelines to a BGS employee, your supervisor, or your administrator as appropriate. Reports of violations that are received by BGS will also be forwarded to your agency primary contact(s).

Disciplinary action may be taken in accordance with one or more of the following: BGS policies, North Carolina law or the laws of the United States.

Minor infractions of these guidelines or those that appear accidental in nature are typically handled internally by BGS contacting your agency point of contact. In some situations it may be necessary, however, to suspend account or computer access to prevent ongoing misuse while the situation is under investigation. Repeated violations may result in the termination of your agency BGS license.

More serious infractions, such as unauthorized use, attempts to steal passwords or data, unauthorized use or copying of licensed software, violations of college policies or repeated violations of minor infractions may result in the temporary or permanent loss of access to BGS apps, websites and resources.

Offenses that are clearly in violation of local, state or federal laws will result in the immediate loss of access to BGS resources for that user(s) and will be reported to the appropriate law enforcement authorities. In addition, disciplinary action, up to and including dismissal, may be applicable under your agency’s policies, guidelines or collective bargaining agreements.