--> Skip to main content

About

Policies

The JSCC Libraries seek to provide the college community with the best possible environment for research and study. The library's code of conduct was adapted from the JSCC Student Handbook.  Library patrons and staff expect to have:

  • A safe and healthy learning environment free from disruptive activity, harassment, and intimidation.
  • Access to facilities and resources free from damage.

Therefore, all patrons are expected to adhere to the following policies: 

Children: Under the age of 18 must be accompanied by a responsible adult.

Computer Use:  Patrons are expected to use computing resources in a manner consistent with the college’s Policies and Procedures for Information Technology Resources and Systems. Viewing or displaying inappropriate or offensive materials is prohibited.

Criminal Behavior: Campus Police and/or outside law enforcement authorities will be notified to address criminal behavior including but not limited to: assault, verbal threats, possession of weapons [simulated or real], public indecency, sexual harassment, theft of library books or property, vandalism, intoxication, possession of drugs, and viewing child pornography.

Damage to library property: The following behavior which may damage library equipment, collections, or facilities is prohibited: defacing library materials, equipment, furniture or facilities by marking, cutting, underlining, removing pages, or removal of theft devices.

Disruptive behavior: Any behavior that is disruptive to library use is prohibited. This includes but is not limited to:

  • Buying or selling goods or services, or soliciting donations of any kind.
  • Creating excessive noise.
  • Using sound generating devices with or without headphones, at an audible level. 
  • Hostile or rowdy behavior [fighting, threatening, intimidating, using profanity, or verbal abuse].
  • Overt signs of substance abuse including drunkenness.
  • Entering staff offices/areas without authorization.
  • Entering the library without proper attire [shirt or shoes].
  • Refusal to leave the library when asked to do so.

Emergency Procedures: Library patrons must follow JSCC emergency procedures during emergency situations or dangerous weather conditions.

Food and beverages: Food and non-alcoholic beverages in securely covered containers are allowed. Not reporting spills and/or leaving a mess by being careless with food and beverages is prohibited. 

Personal Belongings: Leaving personal belongings unattended for any length of time is prohibited. Items left unattended may be taken to the Campus Security Office.

Tobacco Use: The use of all tobacco products or devices capable of dispensing nicotine [such as electronic cigarettes] is prohibited inside the building.

Enforcement and Consequences

  • Misuse of the library is a violation of the college’s administrative policies and Code of Conduct as set forth in the JSCC Student Handbook.
  • Patrons in violation of the library’s code of conduct will be asked to stop the behavior and may be asked to leave.
  • At the discretion of library staff, the JSCC Campus Police will be contacted to respond and assist.
  • Refusal to comply with these policies may result in restricted or suspended privileges, disciplinary action, suspension or expulsion, prosecution, or restitution. Violations may be referred to the Dean of Students for adjudication and appropriate action.

 

Loan Policies: Regular Circulating Materials to Students 

  • To check out material from the JSCC libraries, students must be currently enrolled.  The student accepts responsibility for any material borrowed from the libraries.
  • A student may not have more than seven books on a subject checked out at any one time.  If the books are on more than one subject, the student may have more than seven, up to a maximum of twenty-one at any one time. 
  • Regular circulating materials may be borrowed for 21 days. 
  • All regular circulating materials may be renewed one time. 
  • Books may be borrowed and returned at any campus regardless of a student’s primary campus location. 
  • Overdue notices are emailed weekly to student email accounts.  
  • The final due date for each semester is determined term by term but generally will fall on the last day of final exams.

Fines

  • The overdue fine for regular circulating materials is 10 cents per day per item with no maximum.  Audio visual materials and software accrue overdue fines at a rate of $1.00 per day with no maximum. 
  • A student with overdue books cannot check out additional materials without approval until those books are returned or paid for if they are lost or damaged.
  •  Banner holds are placed on student accounts for items not returned.  Holds are placed periodically throughout each term and not removed until items are returned or replacement fees are paid. 
  • Individuals must pay replacement cost plus processing fee for any books which have been lost or damaged.  In addition, students must pay any fines which have accumulated.  
  • All library fines and lost book charges are to be paid to the college cashier.  A fine slip is completed in the library when the overdue material is returned.  The student must present this slip in to the cashier when paying fines.  If a Banner hold is present, the cashier will remove the hold once the fine or replacement fees are paid.
  • All refunds for returned books, which have been lost and paid, are handled through the business office.  The student is responsible for returning the materials to the library and requesting a refund.  The student must have the cashier's receipt as proof of payment.  Library staff will complete the required paperwork for submittal by the student to the business office. 

Students, staff, and faculty may borrow materials from the Jefferson State Libraries. Additionally, the libraries have cooperative agreements with the following regional libraries:

  • Bevill State Community College
  • Birmingham Southern
  • Gadsden State Community College
  • Lawson State Community College
  • Pell City Public Library
  • University of Alabama at Birmingham Mervyn H. Sterne Library
Please note that the library does not provide textbooks or other course material unless this material is provided to us by individual instructors.
 
Some instructors provide copies of textbooks and other course related material to the library for student use within the library. Not all instructors provide textbooks to the library for this purpose.
 
Any items provided by instructors are placed ON RESERVE in the library. Students may request this material at the circulation desk whereupon the item will be checked out to the student for USE IN THE LIBRARY ONLY. Reserve materials may not leave the library.
 
Photocopiers are available for student use at 15 cents per copy. [Please note: the libraries do not provide change.]

Responsible Computing and Acceptable Use Policy

The guiding principle of Jefferson State Community College’s Information Technology, consistent with the College’s vision and statement of philosophy and purpose, is to provide:

•     students with the appropriate technology and support to succeed in both learning academic theories and in applying those theories to real-world situations;

•     faculty with the appropriate computing tools to succeed in their teaching and research endeavors; and

•     staff members with a computing environment that fosters productivity and assists in accomplishing job objectives.

In order to achieve these objectives, it is necessary to set forth policy guidelines for all users of the College’s computing resources. This policy is applicable to, but is not limited to, the use of computing resources found in/on student computing labs, desktop workstations, administrative computers and workstations, campus network facilities (such as electronic mail systems, network connections), the World Wide Web, and all other technology-related resources of the College. All users of the computing resources are responsible for reading and understanding this policy.

Rights and Responsibilities

The rights of academic freedom and the freedom of expression apply to the use of Jefferson State Community College’s computing resources. Along with these rights there are associated responsibilities and limitations. The College supports a campus and computing environment open to the free expression of ideas, including unpopular points of view. The use of the College’s computing resources is subject to College policies, and local, state and federal laws. Acceptable use always is ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and freedom from intimidation and harassment.

General Rules

These rules apply to all users of the College’s computing resources, whether affiliated with the College or not, and to all uses of those resources whether on campus or from remote locations. Users do not own accounts on College computers but are granted the privilege of using the College computing resources. All users of the Jefferson State Community College’s Intranet will be authenticated for security and access rights.

1.   Users of College computing resources must comply with federal and state laws, College rules and policies, and the terms of applicable contracts including software licenses while using the college computing resources. Examples of applicable laws, rules, and policies include the laws of libel, privacy, copyrights, trademark, obscenity and child pornography; the Electronics Communi­cations Privacy Act and the Computer Fraud and Abuse Act, which prohibit “hacking,” “cracking,” and similar activities; the Student Code of Conduct; and the college’s Sexual Harassment Policy.

2.   Users are responsible for keeping their accounts and passwords secure. Users are responsible for all activities on their user ID or that originate from their systems. It is important to choose a password that is secure. Under no circumstances should users allow anyone else to use their personal account and password.

3.   Certain limits are in place for the purpose of ensuring the efficient operation of College computing resources. Users of the computing resources may be asked to limit or refrain from specific uses if, in the opinion of the system administrator, such use interferes with the efficient operations of the computer systems.

4.   Users must not use College computing resources to gain unauthorized access to remote computers or to impair or damage the operations of the College’s computers, networks and peripherals. This includes, but is not limited to, blocking communication lines and running, installing or sharing virus programs. Deliberate attempts to circumvent data protection or other security measures are not allowed.

5.   Users must have the appropriate authorization to use College trademarks and logos while using College computing resources.

6.   This policy may be modified as deemed appropriate by the College. Users are responsible for reading and understanding this policy and should periodically review this policy as posted in the College’s Faculty and Staff Handbook.

Enforcement

The college considers violations of the general rules of acceptable use to be a serious offense. Users who violate this policy may be denied access to College computing resources and be subject to other penalties and disciplinary action, both within and outside the College. Alleged violations will be investigated, and appropriate disciplinary action will be taken. However, the College may temporarily suspend, block, or restrict access to an account or computing resource (i.e. network ports, processes) independently of such procedures, as it deems necessary to protect the integrity, security or functionality of College or other computing resources or to protect the College from liability. The College may also refer suspected violations of applicable law to appropriate law enforcement agencies.

Information Privacy and Security

1.   Under the Electronic Communications Privacy Act of 1986 (Title 18 U.S.C. section 2510 et. Seq.), users are entitled to privacy regarding information contained in their accounts. This act, however, allows system administrators or other College employees to access user files in the normal course of system management when necessary to protect the integrity of computer systems or the rights or property of the College. At times, system administrators may also need to access files to ensure compliance with College policy. User files may be subject to search by law enforcement agencies under court order if such files contain information that may be used as evidence in a court of law. System administrators are obligated professionally and morally to maintain the confidentiality of user files, email and activity logs. The College may also specifically monitor the activity and accounts of individual users of computing resources, including individual login sessions and the content of individual files, without notice, when the College determines that:

      A.   It is necessary to protect the integrity, security and functionality of College or other computing resources or to protect the College from liability;

      B.   There is reasonable cause to believe the user has violated or is violating this policy;

      C.   An account appears to be engaged in unusual or unusually excessive activity; or

      D.  The law otherwise permits it.

2.   Although the College considers email to be private, it also recognizes that email facilities are supported on the computing networks, hardware, and software, which are the property and responsibility of Jefferson State Community College. Therefore, as indicated above, the College reserves the right to access and examine email messages in accord with technical support, system maintenance needs, and college policy.

3.   The College employs various measures to protect the information of its computing resources and its user’s accounts. Users should be aware that the College cannot guarantee security and confidentiality. Users should engage in safe computing practices by establishing appropriate access restrictions for their accounts, making frequent back-up of critical files, and guarding their passwords.

Commercial and Personal Use

College computing resources are not to be used for personal commercial purposes or for personal financial or other gain. Limits may be imposed upon personal use in accordance with normal supervisory procedures concerning the use of college equipment.

Internet Use Policy

Introduction and Statement of Mission for the Jefferson State Community College Web

Jefferson State Community College’s Internet use is a continuation of the College itself, as a comprehensive, public, two-year, community college that exists to provide an educational environment in which the needs of the individual student, the community, and other target audiences can be met. Consistent with the College vision, Internet use and Web-page development at Jefferson State Community College is intended to put the learner’s needs first by being responsive and innovative, as well as being a catalyst for life-long learning. In addition to facilitating the education process for students, Internet use is intended to support administrative efforts in research, to enhance course delivery and the teaching process for faculty, and to make available more resources for the staff.

The use of information technology must be consistent with the philosophy and purpose of the College. Those who access the Internet with College resources are required to conduct themselves in an ethical and legal manner, and to adhere to the conditions of use set forth in this document.

Eligibility for access and use is a privilege granted by Jefferson State Community College to the students, faculty, staff, and others permitted by the College. The College reserves the right to extend, limit, restrict or deny privileges and access to its information resources. The College recognizes that local, state and federal laws relating to copyrights, security, and other statutes regarding Internet use bind all members of the College.

General Guidelines for Web Pages

All Web pages must bear a direct relationship to the mission and purpose of the College and will conform to all College policies. Responsibility for the content, accuracy, and maintenance of a Web page rests with the developer/author of the page. The Institution reserves the right to periodically review the appropriateness of any Web pages associated with the College.

Responsibilities of Users

Users of the College’s Internet resources are expected to comply with the following criteria for responsible usage:

1.   The use of Internet resources should be consistent with the College’s mission to further the educational process by facilitating the acquisition and exchange of knowledge, by encouraging collaborative projects, and by supporting research and instruction by administration, faculty, staff and students.

2.   The use of Internet resources should conform to any regulations, policies, and procedures established in the College’s Student Handbook.

3.   Individuals must take all reasonable precautions to prevent unauthorized access to Internet accounts or any other unauthorized usage and are expected to report any violations of this policy and/or security problems to appropriate personnel.

4.   The use of Internet resources should comply with ethical and legal standards. The following would be considered unethical or illegal:

      A.   Using the Internet resources in a manner that creates a hostile environment, which may include but is not limited to harassing, threatening, stalking, libeling, or slandering other persons, or in any way that damages community relations.

      B.   Using the Internet resources in a manner that violates the privacy of other users or persons.

      C.   Copyright infringement.

      D.  Using the Internet resources to knowingly upload or download pornography.

      E.   Using the Internet resources to operate or engage in scams, pyramid schemes, or in any commercial venture.

5.   Individuals shall refrain from the intentional waste of limited computer resources by engaging in such activities as downloading non-college-related programs or applications.

Sanctions

Use of the College’s Internet resources is a privilege, not a right. The College reserves the right to do the following:

1.   Alter the provisions of this policy as needed.

2.   Change the conditions of use of its Internet resources.

3.   Terminate or change, without notice, the nature of access to these resources.

Users who violate College policy or the standards for legal and ethical usage may have the privilege of use revoked without notice. Violators may be reported to appropriate personnel. Those using these resources for illegal acts are subject to prosecution by local, state, or federal authorities.

Limitations of Liability

1.   Access

            The Internet World Wide Web is a global network unregulated by local, state, federal, or international authority. Materials on the Internet may be controversial, offensive, disturbing, erroneous, or illegal. Because the College has no control over nor does it monitor materials on the Internet, it can not be held responsible for such material, for controlling access to it, or for protecting patrons from offensive material. The College disclaims any warranty for the accuracy, timeliness, authoritativeness, or usefulness of such materials and shall have no liability for any direct or indirect damages resulting from the use of Internet material. Access to, or use of, the Internet by minor children is solely the responsibility of the parent or legal guardian.

2.   Links to Internet Sites

            The College, through its home page, provides links to helpful sites that are consistent with the mission and purpose of the college. However, because of the unregulated nature of the Internet, the College cannot monitor nor be responsible for the content or availability of the sites to which it links, nor for any subsequent links.

3.   Violation of Privacy

            The College disclaims any liability or responsibility for the violation of privacy of any individual by a user. Such responsibility shall lie solely with the user.

4.   Use of Copyrighted Materials

            The College disclaims any liability or responsibility for copyright infringement by a user. Such responsibility shall lie solely with the user.

5.   Computer Viruses

            Because the Internet is unregulated, viruses that are potentially harmful to the user’s computer system may be downloaded from the World Wide Web. Respon­sibility for identifying and eliminating such viruses downloaded in data or files rests with the user. The College disclaims any responsibility for damages resulting from viruses transmitted through data or files obtained through the use of the College’s electronic information systems.

Email Policies and Guidelines

Purpose

Email is Jefferson State’s official means of communicating with students. Each JSCC student has a Jefferson State email account. Students can access their JSCC email 24 hours a day, 7 days a week from any Internet connection by clicking the “myJSCC” link on the Jefferson State home page  (www.jeffersonstate.edu). Students are responsible for checking their Jefferson State email on a regular basis and for deleting out-dated emails so that the email account does not fill up (over-quota) thus preventing new mail from being delivered.

Email access helps faculty and staff be more effective in performing their work-related duties and helps students in achieving their educational goals. The goal of the college email system is to facilitate faster and more efficient communications both internally and externally.

General Guidelines

Users are permitted to use college email for personal correspondence, provided that it is used in a reasonable manner and is not abused.

Users should:

1.   Be mindful that any email sent using the College’s email system contains the College’s domain name and is therefore a reflection of the College as well as the individual sending the email.

2.   Send, copy or forward email only to people when reasonably sure that the recipient(s) has/have a need or desire to read it.

3.   Be aware before forwarding an email message that the original sender may have considered that email a private communication. Users should forward an email only when they are certain that they have the original sender’s approval.

4.   Verify the validity of any email that comes with instructions to forward. Many of the mass emails, warning of some threat such as new virus, offering some incentive for forwarding the email, or requesting help for someone in need, are hoaxes. There are many Internet sites, such as www.urbanlegends.com, that have archives where these can be verified.

5.   Scan all attachments for viruses before sending or downloading.

Policies

Users must:

1.   Obtain approval from the appropriate dean, associate dean or director before sending any college-wide, mass email, i.e. mail that is not targeted to members of a specific, college-defined organizational unit. Examples of a college-defined organizational unit include, but are not limited to, college departments, committees, clubs, and unit heads. A mass- distribution email must contain the author’s name and title, name of the person authorizing the distribution, and the sender’s initials.

2.   Refrain from using the college’s email system to transmit anything that the recipient might consider obscene, pornographic, threatening, harassing, or otherwise offensive.

3.   Adhere to all other college policies pertaining to general computer and Internet usage, in addition to the specific policies stated above.

 

Jefferson State Community College Libraries/Learning Resource Centers comply with the rights and restrictions provided by the Copyright Law for the provision of resource materials, reserves, and electronic reserves services. The following policies and statements address the copyright issues related to library reserves.

 


Policy for Access to Copyright-Protected Materials:

The libraries' policies for providing access to copyright-protected materials are derived from the fair use provisions of United States Copyright Act of 1976 (Title 17 of the United States Code). Section 107 of the Copyright Act expressly permits the fair use of copyrighted materials for teaching (including multiple copies for classroom use), scholarship, and research. Such educational copying does not require the payment of a royalty or the permission of the copyright owners, provided that the circumstances of the use are fair use as determined by a consideration of four factors specified in section 107.


 

Reserve Service - Print and Electronic

The libraries accept materials for inclusion in the reserve service based upon the statement reviewed and endorsed by the Association of Research Libraries, the Association of College; Research Libraries of the American Library Association, the American Association of Law Libraries, the Special Libraries Association, and the Medical Library Association.

 

Loading