Computing Policies
Internet and Computer Network Policies
Definitions
Artificial Intelligence
Artificial Intelligence (AI) refers to computer systems, software, and algorithms capable of performing tasks that typically require human intelligence, such as problem-solving, data analysis, natural language processing, decision-making, and content generation. AI tools may include, but are not limited to, machine learning models, generative AI, chatbots, automated writing assistants, and image or code generation technologies. The College recognizes the growing role of AI in education, research, and administration; however, its use must align with academic integrity, ethical responsibility, and intellectual property standards.
AI-generated content must comply with applicable copyright and intellectual property laws, including fair use principles. Users should ensure that AI tools do not infringe upon proprietary content or violate the rights of content creators. When AI tools contribute to academic or professional work, users must disclose their use and provide appropriate attribution when required. This includes acknowledging AI-generated content in research papers, presentations, or assignments, as per citation guidelines set by the College or relevant academic disciplines. Work submitted for academic credit must primarily reflect the student’s own understanding, analysis, and effort. AI-generated content should supplement, not replace, original thought. Submitting AI-generated work as one’s own without proper acknowledgment constitutes academic misconduct and may result in disciplinary action.
AI must be used responsibly and in ways that align with ethical standards. It should not be employed to fabricate information, mislead others, engage in plagiarism, or circumvent academic requirements. The use of AI tools for assessments, unless explicitly permitted by instructors, is prohibited. Violations of this policy, including plagiarism or misuse of AI-generated content, will be subject to the College’s academic integrity procedures. Faculty and staff are responsible for guiding appropriate AI use within their courses and professional duties. The College reserves the right to update this policy as AI technologies evolve. For questions regarding the ethical use of AI in academic and professional contexts, individuals should consult their instructors, academic advisors, or the Office of Academic Integrity.
Digital Cookies
Cookies are small data files stored by your web browser on behalf of a website and returned to the website upon request. The College’s websites may use cookies to maintain session data, allowing information to persist across multiple pages during a single visit, and to recognize returning users to facilitate site functionality between visits.
If you prefer not to accept cookies, you may disable them in your browser settings or configure your browser to prompt you before accepting new cookies. However, disabling cookies may cause certain website features to function improperly.
Unless explicitly stated otherwise on the College’s websites, cookies are used solely for these purposes. Cookies remain stored on the user’s device; the College does not store cookies on its systems or transmit them to external parties. Additionally, unless otherwise specified, the College’s websites do not utilize cookies to track user activity across different websites or share cookie data with third parties.
Digital and Software Piracy
Engaging in digital and software piracy is strictly prohibited and constitutes a felony. Any individual or organization found guilty of illegally copying, distributing, or otherwise using computer software, or any other copyrighted materials such as music, videos, or games, may face severe consequences. Penalties include imprisonment for up to five years, fines up to $250,000, and potential civil lawsuits for damages and other relief. In particular, unauthorized duplication of software purchased by the College is a violation of copyright law and is subject to these penalties, as well as strict disciplinary action and, where applicable, criminal prosecution.
Network Traffic Monitoring and Logging
In order to ensure network security and maintain consistent service for all users, the College utilizes software programs to monitor network traffic, detect unauthorized access or attempts to access nonpublic information, identify computer viruses and other potentially harmful software, and optimize the performance of the College’s network infrastructure.
During the course of such monitoring, these programs may collect data, including but not limited to email headers, network packet addresses, and other relevant network-related information. The information gathered through these activities is strictly used for the purpose of safeguarding the security and efficiency of the College’s networks and computer systems.
Personally identifiable information obtained through these monitoring activities will not be disclosed to external parties without your consent, except as required by law.
Prohibited Applications
Section 112.22(1)(f) of the Florida Statutes defines a "prohibited application" as any Internet application created, maintained, or owned by a foreign principal that engages in activities such as collecting sensitive data, compromising email security, conducting cyber-espionage against public employers, tracking individual users, or disseminating disinformation or misinformation through algorithmic modifications. Additionally, it includes any Internet application deemed by the Department of Management Services to present a security risk through unauthorized access to or unavailability of public employer's digital assets, systems, networks, servers, or information.
The College has implemented additional measures to enhance security and integrity by complying with Section 112.22(1)(f) of the Florida Statutes. Users may access the list of prohibited applications maintained by the Florida Department of Managed Services for further guidance on applications that are not permitted within the College’s computing environment.
User-Provided Information
While using the College’s websites, you may choose to voluntarily provide personally identifiable information to facilitate specific services or requests. Examples include submitting electronic mail (via a mailer or web form) to request information, signing up for a mailing list, or providing a mailing address for the receipt of applications or other materials. Any personally identifiable information submitted will be used solely for the stated purpose.
Requests for information will be directed to the appropriate staff for response and may be recorded to improve the website’s functionality and responsiveness to similar inquiries. The College does not sell, exchange, or otherwise distribute personally identifiable information without the individual’s consent, except as required by law. However, the College reserves the right to work with third-party vendors to host and manage this information exclusively for the intended purposes, in compliance with this policy.
Personally identifiable information is retained only for the duration necessary to support normal operations. Each webpage that requests such information will disclose its intended purpose. If you do not wish for your information to be used as described, you are not obligated to provide it. For questions or concerns regarding the use of personally identifiable information, please contact the designated individual listed on the respective webpage or in the contact section below.
Website Visit Logs
The College’s websites routinely collect and store information from online visitors to facilitate site management and enhance user experience. The collected data includes, but is not limited to, pages visited on the site, the date and time of access, the URL or IP address of the referring site, the domain name and IP address from which access occurred, the browser version, browser capabilities, and search terms used within the College’s search engines.
The College does not attempt to identify individual visitors through this information. Any personally identifiable information collected will not be disclosed to external parties without your consent, except as required by law.
Computing Facilities Policies and User Agreement
Please read the following agreement carefully. By accessing or using the College’s computing systems, users agree to comply with the College’s Acceptable Use Policy, its terms and conditions, and all applicable federal and state regulations.
Florida State College at Jacksonville Computing Facilities Policies and User Agreement
Florida State College at Jacksonville (hereafter referred to as “the College”) computing facilities include any computer, network, peripheral, operating system, software, or any combination thereof that is owned, licensed, or otherwise under the control of the College. Employees and students (hereafter referred to as "users") acknowledge and agree to the following terms. The College computing facilities are provided to support the academic mission and administrative functions of the College. Users assume full responsibility for ensuring that their use of these resources is effective, efficient, ethical, lawful, and respectful.
Authorized IT personnel may, while performing routine operations or investigating system issues, access data and software stored within the College computing facilities, including electronic mail. The College is not liable for any data loss, system delays, performance issues, or other damages resulting from the use of its computing resources. Certain systems within the College are operated under specific license agreements, which restrict usage to instructional and research-related purposes. Users agree to comply with the terms of these licenses.
Artificial Intelligence (AI) tools may be used within the College’s computing environment for academic and administrative purposes. However, users must comply with intellectual property laws, fair use principles, and academic integrity policies when utilizing AI-generated content. Users must disclose the use of AI tools in academic work where required and may not employ AI to engage in plagiarism, fabricate information, or violate College policies. AI tools may not be used to misrepresent an individual’s work or to circumvent academic requirements.
The College websites use digital cookies to enhance user experience and optimize system performance. Cookies store session-related data to facilitate website navigation and retain user preferences. Users may choose to disable cookies in their web browsers, but doing so may affect the functionality of certain College web services. The College does not use cookies to track users across external websites or to exchange cookie data with third parties unless explicitly stated in the website’s privacy policy.
The College strictly prohibits digital and software piracy. Users may not copy, distribute, or use copyrighted software, media, or digital content without proper authorization or licensing. The unauthorized reproduction, downloading, or distribution of software, including peer-to-peer file sharing of copyrighted material, is a violation of College policy and applicable laws. Users found engaging in software piracy may face disciplinary action and legal consequences.
Network traffic monitoring and logging are conducted to maintain the security, performance, and integrity of the College’s computing infrastructure. The College employs monitoring tools to detect unauthorized access, network intrusions, and potentially harmful software. Information such as email headers, network addresses, and access logs may be collected during routine security monitoring. Data obtained through network monitoring is used strictly for maintaining system security and is not shared with external parties unless required by law.
Prohibited applications include any software or tools that compromise network security, interfere with system operations, or violate College policies. Unauthorized applications such as hacking tools, malware, cryptocurrency mining software, and unauthorized remote access utilities are strictly forbidden. The College reserves the right to block, remove, or restrict applications that pose a security risk or degrade system performance.
Users who provide personal information through College websites, email communications, or web forms do so voluntarily. Personal data submitted to the College is used only for the stated purpose, such as responding to inquiries, processing applications, or managing academic records. The College does not sell, exchange, or distribute personal information to external parties without user consent unless required by law. Users who do not wish to provide personal information through College websites may contact the designated College representative for alternative options.
Website visit logs are routinely collected to analyze site usage, improve online services, and manage digital resources. Information collected may include the pages visited, the date and time of access, the referring website, the user’s IP address, browser version, and search terms used within the College’s online platforms. The College does not attempt to identify individual users from visit logs, and personally identifiable information is not shared externally unless legally mandated.
Users must take all necessary steps to protect the integrity of the College computing facilities. This includes safeguarding access credentials such as account numbers, passwords, and authorization codes. Users are responsible for all activities conducted under their assigned credentials. All users must respect intellectual property rights, including software and data copyrights, and take reasonable steps to maintain the integrity and privacy of available software and data. Users must also comply with all College policies, including those governing codes of conduct, academic integrity, and workplace or campus environment standards.
Users must adhere to the policies set by administrators of external networks accessed through the College computing facilities, as well as the policies established by the College’s computing administrators. To maintain and manage the College’s technology infrastructure, the College utilizes management systems and tools that collect information about devices and software used within the College’s computing network. Such information may include user IDs, device models, unique device identifiers, and operating systems. College staff will ensure that data collection is conducted responsibly and in accordance with state and federal laws, solely for the purpose of maintaining and securing the College’s computer and telecommunication network.
Users must respect the privacy of electronic communications and files stored within the College computing facilities or on external networks accessible through the College systems. However, users acknowledge that system administrators may monitor or review transactions and stored data as part of normal operations. The College does not guarantee privacy or confidentiality for data transmitted or stored on its computing systems. User accounts or programs may be terminated or modified if they consume excessive system resources, degrade system performance, or threaten system integrity. Users may only access public domain resources or facilities for which they have received explicit authorization from the College.
Users are strictly prohibited from using the College computing facilities for personal financial gain, unauthorized business activities, or any unlawful purposes. Prohibited activities include, but are not limited to, introducing computer viruses, destroying or altering data, interfering with system access, harassing other users, disrupting College computing resources, or attempting to bypass security controls. Employees are required to complete Information Security Awareness Training and any follow-up training sessions. Employees must adhere to best practices covered in these training programs to ensure compliance with security policies.
Violation of this agreement may result in temporary or permanent loss of access to the College computing facilities and may lead to disciplinary action, including but not limited to suspension, termination, or legal consequences. Users understand that their acceptance of these terms is incorporated into their student admission or employment application. By accessing a College system, users affirm their agreement to abide by this Acceptable Use Policy, all related College policies, and applicable federal and state regulations.
By signing onto a College system, you agree to abide by the College’s Acceptable Use Policy, its terms and conditions as well as federal and state regulations.