Skip to content

Lansing Community College Policies


"I" Grade
Identity Theft Protection Policy
Information Security Policy
Intellectual Property
Just Cause Policy
Late Enrollment for Face-to-Face Classes
Lobbying Policy
Mobile Computing Device Policy
Naming of Facilities
No Show (NS) Grade Policy
Organ Donor

< Previous Policy Group | Next Policy Group >

"I" Grade

We are committed to student academic success, therefore, LCC instructors may utilize "Incompletes" as temporary placeholders for grades. "Incompletes" will not be counted toward the establishment of an earned grade point average (GPA) or toward graduation from Lansing Community College.

This policy applies to a student who is unable to complete a course for some good and serious reason such as incapacitating illness, legal involvement that cannot be rescheduled, or changing work obligations, and the student has demonstrated successful progress in the class. The final decision for issuing an "I" grade lies with the instructor.

An instructor may approve a student-initiated request for an Incomplete if 80% of the course work is completed and the reason appears sound. It is recognized that the 80% figure is a benchmark since weighing of exams and other work varies among programs and courses. The intent is that only a small portion of the work remains. When an instructor issues an "I" grade, the instructor will also indicate what grade should be assigned if no further work is completed. All incompletes must be made up by the end of the next regular semester (summer semester is excluded) or earlier if an earlier date is established by the instructor or department. An extension may be granted if requested in writing by the student and approved by the instructor and department by the last day of the deadline; otherwise the "I" will be converted to the grade specified if no further work is completed.

LCC instructors are responsible for processing the paperwork for grade changes through his/her divisional or instructional office upon the student's request. The College Registrar is responsible for the issuance of the grade.

Failure to follow this policy may result in disciplinary action up to and including termination.

Top

Identity Theft Protection Policy

  1. Purpose

The purpose of this policy is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection with the opening of a covered account or an existing covered account and to provide for continued administration of the Program. The Program shall include reasonable policies and procedures to:

  1. Identify relevant red flags for covered accounts it offers or maintains and incorporate those red flags into the program;
  2. Detect red flags that have been incorporated into the Program;
  3. Respond appropriately to any red flags that are detected to prevent and mitigate identity theft; and
  4. Ensure the Program is updated periodically to reflect changes in risks to Students and to the safety and soundness of the creditor from identity theft.

The program shall, as appropriate, incorporate existing policies and procedures that control reasonably foreseeable risks.

  1. Definitions

Identify theft means fraud committed or attempted using the identifying information of another person without authority.

Covered account means all student accounts or loans that are administered by the College.

A red flag means a pattern, practice or specific activity that indicates the possible existence of identity theft.

Identifying information means any name or number that may be used, alone or in conjunction with any other information, to identity a specific person, including: name, address, telephone number, social security number, date of birth, government issued driver's license or identification number, alien registration number, government passport number, employer or taxpayer identification number, student identification number, computer's Internet Protocol address, or bank routing code.

  1. Policy/Procedures
  1. Red Flag Detection Procedures
    In order to detect any of the Red Flags associated with the enrollment of a student, College personnel will take the following steps to obtain and verify the identity of the person opening an account:
  1. Require identifying information such as name, date of birth, academic records, home address or other identification
  2. Verify the student's identity at the time of issuance of a student identification card (review of valid driver's license or other government-issued photo identification).
  1. Covered Accounts
    Lansing Community College has identified five types of accounts, four of which are covered accounts administered by the College and one type of account that is administered by a service provider.

College covered accounts:

  1. Refund of credit balances involving Federal PLUS loans
  2. Refund of credit balances involving Federal Stafford loans
  3. Refund of credit balances involving Alternate (Private) loans
  4. Deferment of tuition payments
Service provider covered account:
  1. Tuition payment plan administered by FACTS, refer to "Oversight of Service Provider Arrangements".
  1. Identification of Relevant Red Flags

    The Program considers the following risk factors in identifying relevant red flags for covered accounts:

    1. The types of covered accounts as noted above;
    2. The methods provided to open covered accounts;
  2. Acceptance to the College and enrollment in classes requires the following information:

    1. Common application with personally identifying information high school transcript
    2. Online Free Application for Federal Student Aid (FAFSA) or Private Lender application
    1. The methods provided to access covered accounts:
      Disbursement obtained in person required picture identification.
      Disbursement obtained by mail can only be mailed to an address on file.

    2. The College's previous history of identity theft.
      The Program identifies the following red flags:

    1. Documents provided for identification appear to have been altered or forged;

    2. The photograph or physical description on the identification is not consistent with the appearance of the student presenting the identification;

    3. Inconsistent information from credit checks or enrollment status including recent address changes.

    4. A request made from a non-College issued E-mail account;

    5. A request to mail something to an address not listed on file; and

    6. Notice from customers, victims of identity theft, law enforcement authorities, or other persons regarding possible identity theft in connection with covered accounts.

  3. Detection of Red Flags
    The Program will detect red flags relevant to each type of covered account as follows. Specifics of detection methods and processes will be shared with individuals involved in those processes.

    1. Refund of a credit balance involving a PLUS loan - As directed by federal regulation (U.S. Department of Education) these balance are required to be refunded in the parent's name and mailed to their address on file within the time period specified. No request is required. Red Flag -Parent refund address change with signature or notary seal not appearing authentic. Multiple refunds with the same or similar contact attributes (address, phone, etc.).

    2. Refund of credit balance, non PLUS loan - requests from current students must be made in person by presenting a picture ID or in writing from the student's college issued e-mail account. The refund check can only be mailed to an address on file or picked up in person by showing picture ID. Requests from students not currently enrolled or graduated from the college must be made in writing. Red Flag - Picture ID not appearing to be authentic or not matching the appearance of the student presenting it. Request not coming from a student issued e-mail account. Multiple refunds with the same or similar contact attributes (address, phone, etc.).

    3. Deferment of tuition payment - requests are made in person only and require the student's signature. Red Flag - none.

    4. Tuition payment plan - Students must contact an outside service provider and provide personally identifying information to them. Red Flag - none, see Oversight of Service Provider Arrangements.

  4. Response
    The Program shall provide for appropriate responses to detected red flags to prevent and mitigate identity theft. The appropriate responses to the relevant red flags are as follows:

    1. Deny access to the covered account until other information is available to eliminate the red flag;

    2. Contact the student;

    3. Change any passwords, security codes or other security devices that permit access to a covered account;

    4. Notify law enforcement and/or Department of Education for Federal Loans; or

    5. Determine no response is warranted under the particular circumstances.
  1. Responsibility

    1. Oversight of the Program
      Responsibility for developing, implementing and updating this Program lies with the Executive Vice President for Operations. The Program Administrator will be responsible for the Program administration, for ensuring appropriate training of College's staff on the Program, for reviewing any staff reports regarding the detection of Red Flags and the steps for preventing and mitigating Identity Theft, determining which steps of prevention and mitigation should be taken in particular circumstances and considering periodic changes to the Program.

    2. Updating the Program
      This Program will be periodically reviewed and updated to reflect changes in risks to students and the soundness of the College from identity theft. At least once per year, the Program Administrator will consider the College's experiences with identity theft, changes in identity theft methods, changes in identity theft detection and prevention methods, changes in types of accounts the College maintains and changes in the College's business arrangements with other entities. After considering these factors, the Program Administrator will determine whether changes to the Program, including the listing of Red Flags, are warranted.

    3. Staff Training
      College staff responsible for implementing the Program shall be trained either by or under the direction of the Program Administrator in the detection of Red Flags, and the responsive steps to be taken when a Red Flag is detected.

    4. Oversight of Service Provider Arrangements
      The College shall take steps to ensure that the activity of a service provider is conducted in accordance with reasonable policies and procedures designed to detect, prevent and mitigate the risk of identity theft whenever the organization engages a service provider to perform an activity in connection with one or more covered accounts. Currently the College uses FACTS to administer the Tuition Payment Plan. Students contact FACTS directly through its website and provide personally identifying information to be matched to the records that the College has provided to FACTS.
ADOPTED: APRIL 20, 2009
Top

Information Security Policy

  1. Purpose

    Lansing Community College regards its information assets as one of its most important assets. Information Security provides protections to ensure the security, integrity and confidentiality of LCC's information assets by identifying the risks of accidental and intentional disclosure of, or damage to, the information and implementing protective measures to manage those risks.

  2. Scope

    This policy covers all information assets, including computers and communication devices used, maintained, owned and/or operated by Lansing Community College as well as LCC owned information stored on a remote system operated by an outside entity. This policy also covers any computer or communications device that is present on Lansing Community College premises and/or use Lansing Community College communication infrastructure, but which may not be owned or operated by Lansing Community College.

    Information that is in the custody of Lansing Community College and entrusted to an entity outside of Lansing Community College by means of a contracted service or partnership must be afforded the same protection as similar LCC owned information. LCC management will provide the outside entity with a copy of this Information Security Policy and the applicable written standards that specify the level of protection that the outside entity is expected to provide. The outside entity must sign-off on those policies as an indication of understanding and acceptance.

  3. Policy/Procedure

    1. Authority

      The Board of Trustees on the recommendation of the President authorizes the "Information Security Policy".

    2. Organization

      Information Security Organization

      The Information Security Management System will be modeled after the ISO 27001:2005 standard and will use its process approach to understanding the College's security requirements and to enact the needed monitoring and controls. A security strategy of Defense in Depth will be employed to manage the risk to information as required by the classification of the information. The ISO 17799:2005 standard will be used as the basis for evaluating the controls for security of the College's information resources. In addition, Lansing Community College will protect its information assets in a legal and ethical manner and in accordance with good business practice.

      Director of Information Security

      This position reports to the Executive Director of Administrative Services and is responsible for ensuring that:

      1. The Lansing Community College Information Security Policy and Standards are reviewed, maintained, and distributed.
      2. Appropriate levels of employee awareness and education on information security are being maintained.
      3. Appropriate security measures are being implemented by staff and operating management throughout Lansing Community College.
      4. Information Security reviews are conducted throughout Lansing Community College and those staff and operating managers correct deviations from Lansing Community College Information Security Policy and Standards in their respective areas of responsibility.

    3. Acceptable Usage

      The acceptable and unacceptable uses of LCC information assets are defined within the College's Acceptable Use Policy located on the College Web Site. Lansing Community College provides access to computer and communication resources to facilitate activities that further the mission of the College. A user is expected to only access applications and information that the user has been authorized to access.

    4. Categories of responsibility for Information Security Managers

      Administrators, faculty leads, or other employees that supervise others as part of their job duties are responsible for all aspects of the use and protection of Lansing Community College information assets within their areas of functional responsibility.

      Owners - All information assets must have an identifiable owner, either a manager or a non-manager representing management, who is responsible for identifying, classifying, authorizing access to and protecting specific information assets.

      Users - Students, faculty, staff, and consultants who possess a Username are responsible for using appropriate security to safe guard information that they are authorized to access.

      Suppliers - Service suppliers of hosting, telecommunications, data storage or operations services have the responsibility for safekeeping and operating functions, in accordance with security measures appropriate for the information assets over which they have custody.

    5. Classification of Information Assets

      Information assets will be identified by the Information owners to classify the asset's value to the College. The Information Owner will identify the Information assets and will classify the information sensitivity as either public, private or confidential (see the LCC Information Sensitivity Policy for additional policies regarding sensitivity classification). The Information assets will also be classified based on availability, i.e., normal, essential, or critical. These classifications will be used by the College to determine the level of risk associated with the operation of each information resource.

      Sensitivity classifications:

      Public - Information that is in the public domain or information intended to be communicated to the general public or community. This classification includes course descriptions or information about services of the College.

      Private - Information that should not be available to a general population. This classification includes employee procedure manuals, department financial records, salaries and date of birth.

      Confidential - This information needs to be safeguarded because of regulation or determination of the College that the loss of this information would cause devastating financial loss or loss of reputation. This classification includes most information about students and employees academic, financial or medical records.

      Availability classifications:

      Normal - Information assets that have a limited impact to the operations of the College as a whole or information that can be unavailable for up to a week or more.

      Essential - Information assets that are used to support operations of the College, but alternate resources can be used or a limited outage of a day or two is acceptable.

      Critical - Information assets that are required for operation of the College divisional processes, both academic and administrative (example: telephones, data network).

    6. Risk Assessment and Risk Management

      Risk Assessment of information assets is a formal process that will describe the risk of the occurrence of threats to LCC and the method chosen to mitigate the threat. This process will result in the creation of a document for review by management that describes the risks, the safeguards that will be employed and the remediation determined to best mitigate any threat or incident involving LCC information assets (see the LCC Risk Assessment Policy and Procedure for additional requirements). An Information Risk Assessment must be performed by each department at least once a year. The management of LCC can choose to:

      Accept the risk - This alternative is taken if the probability of occurrence is very low or the cost of protective measures is too great. This alternative could also be used for low value or easily replaceable information, such as expendable supplies or public domain information.

      Transfer the risk - This alternative is implemented through use of contractual obligations, such as insurance.

      Reduce the risk - This alternative is taken by installing protective measures or by establishing continuity plans.

      Owners of Information are responsible for managing the risks to which such information assets are exposed. Owners must determine the criticality of their information assets and classify them according to the need for their availability and their sensitivity. Owners are also responsible for assuring that users and suppliers of services protect information assets at the level specified by implementing a risk management plan.

      Input to the risk management process will be acquired from all levels of the organization, with the lower levels of the organization reporting to the higher levels the risks that would impact their operation.

    7. Reviewing and Testing

      Lansing Community College will periodically (at least annually) assess if current practices provide the desired protections to achieve the intended security objectives. All departments with owners, users or suppliers of services of Lansing Community College information assets must conduct reviews each year to assure compliance with Lansing Community College Information Security Policy and Standards. Independent reviews performed by personnel assigned to the Information Security function must be conducted. The ISO 17799:2005 "Code of practice for information security management" will provide the control framework that the College will test its systems against.

    8. Destruction and Declassification of Media

      The LCC Information Security Policy requires destruction or declassification of information resources, including waste materials, which were used for recording confidential information when such information is no longer needed. Media that cannot be used again (e.g. paper) must be destroyed and media that can be used again (e.g. magnetic disks) must be either declassified or destroyed beyond recognition and reconstruction. Media declassification means that the critical information recorded on the media is destroyed usually by overwriting or degaussing. The quantity of critical information should be reduced to the minimum necessary.

    9. Incident Response

      The Lansing Community College Information Security Policy requires the reporting of:

      1. Incident of suspected or actual loss or compromise of LCC information, resource or service.
      2. Any violation or suspected violation of LCC Information Security Policy or Standards.
      3. Any violation or suspected violation of departmental Information Security standards, procedures or guidelines.

      The requirements for incident reporting apply to all employees, students, contractors and suppliers of LCC at all times. Such incidents must be reported whether they are intentional or unintentional to abuse@lcc.edu. See the LCC Incident and Response Plan for further requirements regarding incident reporting and response.

    10. Education and Awareness

      It is the responsibility of individual management, with the assistance of Information Security department, to ensure that all employees who use LCC information resources are adequately trained in security procedures and policy. It is the responsibility of the Student and Academic Support division, with the assistance of the Information Security department, to ensure that all students who use LCC information resources are adequately trained in security procedures and policy.

  4. Responsibility

  5. The Direction of Information Security is responsible for preparing procedures to implement this policy.

  6. Enforcement

  7. Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment and possible civil and/or criminal prosecution to the full extent of the law.

  8. Definitions

  9. Information assets can be in many forms including but not limited to verbal, written, or electronic. Information includes data stored on magnetic or other electronic media, data stored in computer memory, data displayed on a monitor, projector system or other output, data being transmitted over communication lines or verbal, written or printed documents.

    Information Security is the protection of information assets regardless of method of storage, presentation or transmission from intentional or accidental disclosure, modification or loss of access.

    Controls are hardware, programs, procedures, policies, and physical safeguards which are put in place to assure the integrity and protection of information and the means of processing it.

    Procedure is a set ordered series of steps developed to accomplish a desired result.

    Standards are minimal requirements that exist for a particular protective control.

    Threats are any activity that represents possible danger to your information. Danger can be thought of as anything that would negatively affect the confidentiality, integrity or availability of your systems or services. (1-9, SANS Security Essentials)

    Risk is the likelihood that a particular threat will take advantage of a particular vulnerability.

  10. Revision History
    Revised 5/21/2007

  11. Failure to follow this policy may result in disciplinary action up to and including termination.

    Top

Intellectual Property Policy

The purpose of this policy is to set forth the rights and obligations of the college, its employees, its students and its contractors with regard to intellectual property.

This policy applies to all full-time and part-time LCC faculty, staff, and administrators including those persons working, with or without monetary compensation, on any project under the direction and control of the College and to anyone using college facilities or conducting activities under the supervision of college personnel ("Members"). Contracts and subcontracts between LCC and persons who are not Members ("Vendors") will generally include language that determines the ownership of intellectual property that is developed under the purpose of the particular contract.

Work that is created, authored, conceived, or invented, in whole or in part, by any Member during the period of employment, attendance or other relationship with LCC. For purposes of this policy intellectual property means patents, trademarks, copyrights, and trade secrets including, but not limited to inventions, books, articles, study guides, syllabi, workbooks, manuals, bibliographies, instructional packages, tests, video or audio recordings, films, slides, transparencies, charts, graphic materials, photographic or similar visual materials, film strips, multi-media materials, three-dimensional materials, exhibits, software, and databases.

A. Disclosure

Each Member who, during the period of employment by or relationship with LCC, solely or jointly, creates, authors, conceives or invents any Intellectual Property, whether or not such Intellectual Property is patentable or copyrightable, should disclose it in writing to the Vice president of Academic Affairs, so that a determination can be made as to whether it is Member Intellectual Property or LCC Intellectual Property.

B. Ownership

1. LCC Intellectual Property.

Intellectual Property is owned by LCC when the Member, or Members, who create the Intellectual Property, are required by the terms of employment to create, author, conceive, or invent the Intellectual Property or the Intellectual Property results from substantial LCC support including, but not limited to, use of LCC facilities, equipment, other staff, and computing and graphic services.

2. Member Intellectual Property.

If the Intellectual Property is created, authored, conceived, or invented:

(a) wholly independent of the scope of the Member's employment by or relationship with LCC or

(b) as a consequence of performing the Member's teaching or administrative duties, but is not required by the terms of employment, then the Intellectual Property shall be the property of the Member who has created, conceived, invented or authored the Intellectual Property ("Member Intellectual Property") and the Member is free to exploit such Intellectual Property. Some examples of Member Intellectual Property are books, tests, course-related materials, slides, transparencies, and bibliographies. If the Member Intellectual Property is under B.2.(b) above, the Member shall grant LCC a non-exclusive, irrevocable, royalty free, perpetual license to use the Intellectual Property for educational purposes within LCC.

3. Procedures for Securing Ownership in Intellectual Property.

Upon the disclosure of Intellectual Property by a Member or Members, the Vice President of Academic Affairs shall have the sole discretion to determine the College's position on whether the Intellectual Property is LCC Intellectual Property or Member Intellectual Property. If it is determined that it is Member Intellectual Property, then LCC shall provide a written Waiver of any ownership interest on the part of LCC in the Member Intellectual Property and the Member shall execute a non-exclusive, irrevocable, royalty free, perpetual license to LCC to use the Member Intellectual Property for educational purposes within LCC.

If it is determined that the property is LCC Intellectual Property, then it will further be determined whether LCC (i) will exploit and benefit from the Intellectual Property or (ii) will waive any rights in such Intellectual Property and assign those rights to the Member or Members who have created the LCC Intellectual Property under such conditions, if any, deemed appropriate by LCC. If LCC desires to exploit and benefit from LCC Intellectual Property, then the Member, or Members, who have created LCC Intellectual Property shall, at the request of the Vice President, execute an assignment of any and all right, title, and interest which the Member, or Members, may have or may have had at any time in the LCC Intellectual Property and shall cooperate fully with LCC in its efforts to perfect and protect its ownership in the LCC Intellectual Property, including the execution of any and all papers, applications, and the like in return for a share of the revenues generated from such LCC Intellectual Property.

4. Revenues from Exploitation of LCC Intellectual Property.

In the event that any revenues are received by LCC from the licensing, sale, or grant of other rights associated with any LCC Intellectual Property or any patents or copyrights obtained thereon, except for monies received from an outside sponsor in payment for or in relation to a research or other project conducted by or for LCC, the Member or Members who created such LCC Intellectual Property shall be entitled to receive not less than 50% (unless otherwise negotiated) of the net proceeds of such money royalties received by LCC. The term "net proceeds" as used in this statement of policy shall mean gross money proceeds less the cost of obtaining and protecting the rights to such LCC Intellectual Property including, by way of illustration and not limitation, procuring, renewing, licensing, selling, defending, and enforcing any patents, or copyrights obtained thereon. ("Direct Costs"). Within sixty days after the end of each fiscal year, LCC will provide a statement for each such Member setting forth 1) all revenues received for the fiscal year and associated with the respective LCC Intellectual Property , 2) all Direct Costs incurred for the fiscal year and associated with the respective LCC Intellectual Property, and 3) the net proceeds upon which the Member's share therein is based. If the amount of Direct Costs for any fiscal year exceeds the revenues for the same year, the excess amount will be carried over to the next fiscal year and charged against revenues received in that year.

5. Intellectual Property Developed Under Third Party Contracts.

From time to time LCC enters into contracts with third party vendors ("Vendors") pursuant to which Intellectual Property may be used or developed. If the LCC Member is merely suggesting concepts or ideas regarding the contract project, and is not actually inventing, reducing an invention to practice, or fixing an idea in tangible expression, the LCC Member is likely not contributing to an Intellectual Property. In those contracts where there is no anticipation that any Members of LCC will be creating or contributing to the creation of any Intellectual Property, the Vendor contract should provide:

(1) at a minimum, that LCC has a non-exclusive, fully paid up license to fully utilize any Intellectual Property of the Vendor which is necessary in order for LCC to enjoy the benefits and object of the contract, whether or not the Intellectual Property was developed during the course of the contract project or prior to the contract relationship; or

(2) ideally, that the resulting creation or work is a "work for hire" and all Intellectual Property rights developed during the course of the contract project are owned by LCC and, any pre-existing Intellectual Property rights are the subject of a non-exclusive, fully paid up license in favor of LCC to fully utilize such Intellectual Property to the extent necessary for LCC to enjoy the benefits and object of the contract.

If the LCC Member is closely involved in determinations of specifications, testing, authoring code, authoring works, or any other inventive or creative expression, then the LCC Member may well be a contributing inventor or author. In those contracts where, in the determination of the Vice President of Academic Affairs, Members of LCC may be involved in creating or developing Intellectual Property, LCC's intellectual property counsel should review the contract prior to acceptance by LCC.

If counsel determines that the contract project is likely to involve the LCC Member or Members as contributing inventors or authors, then there are several options for contractual provisions which reflect that fact. If the Vice President of Academic Affairs determines that LCC has no interest in exploiting the invention or work which results from the contract relationship, then LCC can negotiate an assignment of its and its Member's rights in the invention or work in return for consideration. Such consideration may be monetary non-monetary, or a combination of both. An example of a non-monetary consideration would be an exclusive license back to LCC to rights in the invention or work in a specific field of use such as education, or a specific geographic area, such as the Midwest.

If the Vice President of Academic Affairs determines that LCC has an interest in exploiting the invention or work by licensing or assignment of the invention or work to third parties, then LCC's options will depend on whether the Intellectual Property is an invention or a copyrighted work. If it is an invention, both LCC and the Vendor should have the right to exploit the patent without accounting to the other. If the Intellectual Property is a copyrighted work, LCC will have to either obtain an assignment of the Vendor's interest or will have to account to the Vendor for half of the profits from the exploitation of the copyrighted work.

6. Student Ownership Issues

When Intellectual Property is developed by students, not paid for their work ("Student Intellectual Property"), LCC will not claim ownership rights in that Intellectual Property unless one of the following conditions is met:

(a) there is a signed agreement between the student and LCC which provides that LCC have exclusive or shared rights to the Student Intellectual Property; or

(b) the student's work was part of a larger work for which LCC owns all or part of the Intellectual Property rights and the student was told in writing before he/she began the work that LCC owned the larger work and that the student would not own any Intellectual Property rights in the work.

7. Intellectual Property Use

In the educational setting faculty and staff often have the need to use or incorporate, in whole or in part, existing works, information, or materials in connection with course preparation, course presentation or course materials. The existing works, information or material ("Pre-Existing Works") may or may not be intellectual property, the rights to which belong to others. They may fall outside the scope of works protected under the law or they may be within the public domain. If these Pre-Existing Works are within the scope of works protected under the law and they are not in the public domain, use of them by a faculty or staff member without permission of the owner of the Works may have serious consequences to the individual faculty or staff member and to the College ("LCC"), namely civil and criminal liability. This policy is intended to address the issues that arise, and the guidelines which the faculty and staff should follow when use of another's Pre-Existing Works is desired or required in order to carrying on the business of LCC.

There are very few works of the type which faculty or staff members would want to use or incorporate into works for use in LCC business that are not protected by copyright. An idea is not copyrightable, but the expression of an idea is. Procedures, processes, systems, and methods of operation are not copyrightable. Facts and titles are not copyrightable. LCC assumes that every Pre-Existing Work which is desired or required to be used, in whole or in part, by faculty or staff is a copyrightable work. In order to use such a Pre-Existing Work, in whole or in part, the faculty or staff member must 1) determine if the Work is in the Public Domain, 2) determine if the desired or required use of the Work is a "fair use", or 3) obtain the permission of the owner of the copyright in the Work.

Determination as to whether a work is in the public domain is a very complex and often impossible exercise. Because previous copyright laws in the United States accorded indefinite protection to unpublished works, and because the duration of copyright for published works was different under the previous copyright laws than it is today, figuring out if a work has fallen into the public domain is difficult. Complicating the issue even more is the fact that under the previous copyright law, if the notice of copyright was omitted from a published work and not corrected within a certain time, the work fell into the public domain. Because of the difficulty in determining whether a work is in the public domain, LCC assumes that no Pre-Existing Works are in the public domain. Accordingly, any time a faculty or staff member uses a Pre-Existing Work, either in whole or in part, the use must be a "fair use" or permission must be obtained from the owner of the copyright in the Work.

8. Fair Use of Pre-Existing Works of Others.

The owner of the copyright in a Pre-Existing Work has the exclusive right to 1) copy, 2) distribute, 3) perform, 4) display, and 5) make derivative works from that Work. If anyone, other than the owner of the copyright, does any of those five things, it is an infringement of the copyright owner's rights and the person infringing may be liable for damages to the copyright owner as well as criminal penalties. The copyright laws create an exception for certain uses of copyrighted works which the law calls "fair use". The copyright laws list "criticism, comment, teaching, scholarship and research" as examples of "fair use". To determine whether a particular use of another's Pre-Existing Work is a "fair use", you must consider the character of the use (whether it is commercial or non-profit), the nature of the Pre-Existing Work (whether it is mostly factual or more creative), the amount and importance of the part of the Pre-Existing Work which is used, and the effect of the use on the copyright owner in the marketplace. These determinations are obviously very subjective and it is possible for reasonable persons to arrive at different conclusions. Any fair use analysis should be undertaken in a conservative manner. The following are some illustrations of typical educational uses of Pre-Existing Works which will more likely than not be protected as fair use if the guidelines are followed.

(a) Creating Coursepacks or Research Copies: Limit the coursepack materials to single chapters from multi-chapter books, single articles from magazine or journal publications, and very few graphics from any publication. Use of any coursepack containing Pre-Existing Works should be limited to one or two semesters of any class.

(b) Digitizing and Using Images: Many images are readily available online or for sale or license at a fair price. Images should only be used with permission from the owner of the copyright in the image. The library can request permission from the copyright owner at the time the image is digitized. If you do not have permission from or have not licensed the image from the copyright owner, limit access to all digitized images to students enrolled in the class and terminate access to the images at the end of class.

(c) Digitizing and Using Pre-Existing Works in Multimedia Materials: A faculty or staff member may, for the creation of class assignments, curriculum materials, remote instruction, examinations, student portfolios, or professional symposia, incorporate others' Pre-Existing Works into a multimedia work if the material from any one Pre-Existing Work is a very small amount, if copies of the multimedia work are limited to those required to achieve the educational purpose, and if the multimedia work is used for the purpose for no longer than two years.

(d) Displaying and Performing Pre-Existing Works in Distance Learning: Distance Learning may necessitate making and distributing copies of Pre-Existing Works in which case the policies for coursepacks should be followed. In addition, Distance Learning may often involve the display and performance of others' Pre-Existing Works. If Pre-Existing Works are displayed and performed in live interactive distance learning classes or in delayed transmission of faculty instruction 1) use the rules of thumb for classroom use, small portions, limited time, and limited access, 2) be certain that either the faculty or staff member or LCC owns a legal copy of the work, 3) include any copyright notices on the original or attributions to the source, and 4) include a legend that making a copy of this display or performance may violate copyright laws. Check any licenses acquired with materials specifically purchased for Distance Learning to determine whether the licenses provide authority for use of display and performance of the materials without such restrictions.

(e) Music: For performance purposes, sheet music may be copied in its entirety only for an emergency when purchased copies are not available for an imminent performance provided that purchased replacement copies are substituted in due course. For academic purposes, other than performances, 1) excerpts of musical works may be copied, provided that the number shall not exceed one copy per student and that no more than 10% of the entire work is contained in the excerpt and 2) a single copy of an entire performable unit may be made by a teacher for the purpose of scholarly research or class preparation provided that the unit is a) confirmed by the copyright owner to be out of print or b) unavailable except in a larger work. A performance of a musical work by a student may be recorded only for teaching purposes or for the student's portfolio. One copy of a sound recording of a musical work may be made for classroom or reserve room use.

Electronic Library Reserves: Since library reserve is an extension of the classroom, the fair use analysis for coursepacks is a safe rule of thumb to apply. Use only materials necessary for the course and limit the amount to single articles or chapters or other small parts of any given work. Include any copyright notice on the materials used, along with appropriate attribution and a notice that copying of the reserve material is prohibited. Limit access to the reserve material to students enrolled in the class and terminate access at the end of the class. Do not use the same reserve materials for more than two semesters of any class.

The College's Vice President of Academic Affairs is responsible for the oversight of this policy.

Revised: March 17, 2003

Failure to follow this policy may result in disciplinary action up to and including termination.

Top

Just Cause Policy

The purpose of this policy is to reduce employment liability, enhance ability to recruit and retain employees, and improve employee morale.

This policy applies only to regular employees who are not covered by any collective bargaining agreement. The policy does not apply to probationary, temporary, casual, part-time, seasonal employees, or to employees funded by external grants whose employment is terminated because of the expiration or discontinuance of the grant. The policy does not apply to individuals whose relationship with the College is characterized by "independent contractor" status. The policy does not apply to the non-renewal of term contract employees unless specifically provided for in the provisions of the term contract. The extent to which any employee covered by a collective bargaining agreement is protected by a "just cause" provision is governed by the terms of the applicable collective bargaining agreement.

All employees covered under this policy shall be evaluated annually in writing by their supervisor.Evaluations shall be done under a standard evaluation format reviewed by the Personnel & Compensation Committee of the Board and approved by the Board.

No employment agreement may be entered in to by an official of the college which grants "just cause" status to any employee who would otherwise be excluded under this policy.

"Just cause" employment is typified by a provision that states: an employee shall not be disciplined or discharged without just cause, except in case of reorganization, down-sizing, elimination of sections, or courses, for which employee was hired, or as part of cost reduction efforts. No employee is guaranteed a position by virtue of this policy.

Regular employees not excluded by Section II above are considered "just cause" employees unless the terms of their individual contract or hire exclude "just cause" status. Such employees who have individual term contracts which do not specify the period of notice for non-renewal will be given notice of non-renewal.

The College's Executive Director of Human Resources and each Dean, Vice- President and the President are responsible for the oversight of this policy.

Revised: May 15, 2006

Failure to follow this policy may result in disciplinary action up to and including termination.

Top

Late Enrollment

In order to maximize student success, the college has created the following Late Enrollment Policy for students who want to enroll in a face-to-face class after the class has started, whether or not there are seats available. 

Students wanting to enroll in a face-to-face class whose first class session has not yet started may enroll in that class as long as they meet the prerequisites or are otherwise qualified to enroll in that class and as long as there are seats available.  Students will use the normal registration process, and no permission is needed by the instructor or an administrator.

The following table indicates the approvals needed for late enrollment:

Length of Class Instructor's
Permission
Instructor and Dean's*
Permission
15 weeks or greater First two weeks Third week and beyond
14 weeks or fewer First week Second week and beyond

*Approvals must be obtained in the order listed (Instructor then Dean).  In addition, given the amount of class time and work missed, late enrollments of this type will be rare and will be granted under exceptional circumstances.

For face-to-face classes with no available seats (that is, closed sections):

Beginning on the first day of instruction, if there are seats available in the section due to registered students' not being present, students will be permitted to enroll in a closed section according to the following procedure.  Students whose names are on the official college waitlist and who are present in class will be added to the class in the order in which the students' name appear on the waitlist.  If additional seats remain available after the waitlisted students have been added to the section, other students who are present in class may be added to the section provided that they are eligible to register for the class.  Faculty will use a randomized procedure to add these students. 

Please note: Waitlisted students who are not present for the class section will be dropped from the waitlist.

Revised: June 16, 2014

Failure to follow this policy may result in disciplinary action up to and including termination.

Top

Lobbying Policy

Lansing Community College is committed to the appropriate use of Federal funds received under The Carl D. Perkins Vocational and Applied Technology Education Act.

This policy outlines the prohibited uses of federal funds for the purpose of lobbying in connection with securing a federal grant, loan, cooperative agreement or contract or an extension, renewal or modification of any of these. In addition, it specifies the proper form to submit when the college uses other than federal funds for the purposes stated above.

No federal appropriated funds have been paid or will be paid by or on behalf of Lansing Community College to any person for lobbying (i.e., influencing or attempting to influence) any member of the Legislative or Executive branches of Government (i.e., a Member of Congress, an employee of any Member of Congress, or any officer or employee of any agency or of Congress) in connection with securing a federal grant, loan, cooperative agreement or contract or an extension, renewal or modification of any of these. Prohibited lobbying includes charging travel expenses to a federal award or being paid from a federal award while attempting to influence the award of federal funds to a specific program.

If any funds other than federal appropriated funds have been paid or will be paid by or on behalf of Lansing Community College to any person for lobbying any member of the Legislative or Executive branches of Government in connection with a federal grant, loan cooperative agreement or contract, the College shall complete and submit Form-LLL, "Disclosure Form to Report Lobbying" in accordance with applicable instructions.

For further information see Education Department General Administrative Regulations (EDGAR) Section 82 - New Restrictions on Lobbying, Subpart A - General.

The College's Associate Vice President of External Affairs and Development is responsible for the monitoring and implementation of this policy.

Adopted: October 15, 2012

Failure to follow this policy may result in disciplinary action up to and including termination.

Top

Mobile Computing Device Policy

  1. Purpose

The purpose of this policy is to set out the permitted manner of use of mobile devices on the College's network by its employees, students, guests and contractors, and the use of College-issued mobile devices in any environment in order to maintain the security and integrity of the College's network and data infrastructure, and maintain the confidentiality of College data which may be accessed or placed on mobile devices.

  1. Scope

This policy applies to any mobile device (College-issued and personal) that can access the College's network via wired or wireless connections.

  1. General

  1. Definitions
    1. Mobile device

      A mobile device is any device that combines telecommunication and computer functions and is easily carried on a person. Examples include, but are not limited to, laptop computers, "smart phones" (e.g., RIM Blackberry, Apple, Android, etc.) and "tablets" (e.g., Apple iPad, Amazon Kindle, etc.).

    2. College-issued mobile device

      A College-issued mobile device is any mobile device owned by the College and distributed by the College's Information Technology Services (ITS) Division. ITS will maintain administrative control of such devices including remote lock and remote wipe functions, which may be used in the event the device is lost or stolen or its security is otherwise compromised.

    3. Personal mobile device

      A personal mobile device is any mobile device that is not a College-issued mobile device.

    4. Encryption

      Encryption means using electronic and physical methods to make clear text information unreadable to unauthorized persons.

  2. College-Issued Mobile Devices

    College-issued mobile devices may use the College's network and network services as needed to perform the College's business and for other College-approved tasks. A signed and approved "Employee Mobile Device User Agreement" is required before a mobile device will be issued to a user.

    Users of College-issued mobile devices may use the device for normal personal use like email, social networking and web browsing, subject to limitations contained in this and other College policies. Excessive personal use or careless actions that lead to the compromise of the device may result revocation of use privileges and/or disciplinary actions.

    Each user is responsible for ensuring that the College-issued mobile device is used only in compliance with the Acceptable Use Policy and College guidance on security procedures, safe user behaviors, etc. The user is responsible for ensuring that personal use does not expose a College-issued mobile device to malware, malicious web sites, or other security risks.

    Each user is responsible for the physical security of the College-issued device assigned to them and must immediately report any theft, loss, damage, or vandalism of the unit to the LCC ITS Help Desk. Immediate notice concerning a lost or stolen mobile device is critical, so that unauthorized and/or inappropriate access can be minimized. The assigned user is responsible for any unauthorized and/or inappropriate access to College information that occurs from the misuse, loss or theft of mobile devices.

    The College may, at its discretion, change the method by which a device connects to the network and change the configuration of the device, without the user's consent or knowledge, to prevent unauthorized use or access to College data. These configuration changes include, but are not limited to, upgrades to the device's operating system and software, locking the device to prevent use, changing the device's access code, and the deletion of all data/files on the device.

    Users of College-issued mobile devices are prohibited from storing information on the device in ways that may violate laws and regulations regarding the security or privacy of health records, student records, credit card and loan information, etc. Accessing such information is prohibited unless accomplished via a secure and encrypted means if the device is not directly connected to the College's network. Also, users are prohibited from using such devices to violate copyrights including, but not limited to, copyrighted music, movies, software and publications.

    The College uses technologies such as encryption, identity management, anti-malware, anti-virus, and remote administration to protect all of the mobile device's data whether that data is at rest, in use, in transit or being destroyed.

  3. Personal Mobile Devices

    The College maintains networks that are based on available business services. Personal mobile devices are normally limited to using a guest network that will provide access only to Internet and printing services. Use of personal mobile devices to access any other College network is permitted only with the written approval of the Director of Information Security. Such approval must be requested in writing, and will be granted only if the user enters a written agreement authorizing the ITS Division to install and maintain software (e.g., remote administration, encryption, etc.) deemed sufficient to meet College standards for security and control. Users of personal mobile devices must comply with all standards that apply to the use of College-issues mobile devices.

  4. Contractors

    Contractor owned equipment will be treated as personal mobile devices. LCC sponsors of contractors are responsible for communicating this policy to them. The Director of Information Security may waive application of portions of this policy to a contractor if the Director determines such waiver is necessary and appropriate to facilitate the completion of any project under the direction and control of the College and under the supervision of College personnel. Such a waiver must be in writing.

  5. Mobile Usage of Mobile Devices

    The use of any mobile device in violation of applicable law or regulation is prohibited. The use of any mobile device other than a hands-free cell phone is prohibited while the user is operating a motor vehicle on College business. The use of any College-issued mobile device other than a hands-free cell phone is prohibited while the user is operating a motor vehicle, whether or not on College business. LCC strongly recommends against use of any mobile device while operating any motor vehicle under any circumstances. Drivers must use their judgment regarding the urgency of the situation and the necessity to use a cell phone while driving, but should generally make every effort to move to a safe place off of the road before using a cell phone.

  1. Responsibility

The Director of Information Security is responsible for educating staff, faculty, students, guests and contractors regarding this policy. The Director of Information Security is responsible for preparing procedures and instructional materials to implement this policy. The Director of Information Security is responsible to report to the Chief Information Officer on the effectiveness of this policy in regards to information security using appropriate metrics.

Any question of interpretation or application of this policy shall be referred to the Chief Information Officer (or designee) for final determination.

This policy shall be reviewed every year under the direction of the Chief Information Officer (or designee).

Adopted: 12/17/12

Failure to follow this policy may result in disciplinary action up to and including termination.

Naming of Facilities Policy

This policy serves as a guideline for the Lansing Community College Trustees, the President, the Directors of the Lansing Community College Foundation, and other staff, volunteers, and outside advisors who assist in the solicitation of gifts. It is established to assure an appropriate reflection of the history of the College as well as consistency, fairness, fitting recognition and good value in exchange for the honor or privilege of name association with a program, fund, or physical aspect of the College. As gifts can encourage others to give or do the opposite, this policy is intended only as a guide and allows for flexibility on a case-by-case basis.

This policy is effective as of the date of approval and will supersede all prior policies relating to this matter.

Philanthropy at Lansing Community College

Lansing Community College (hereafter referred to as "the College") Trustees and President, as well as the Directors of the Lansing Community College Foundation, seek private funds to enhance the College's ability to meet the higher education needs of its community, particularly toward a level of excellence that would otherwise not be possible given state funding levels and restraints on student tuition and fees. To that end, the College seeks to provide appropriate recognition to donors for their generosity. Although such recognition may take many forms (thank you letters, press conferences, etc., this policy seeks to establish guidelines for the naming of facilities, campus spaces and programs as donor recognition.

This policy is to establish the criteria to guide the process for naming facilities at Lansing Community College.

  1. Guidelines for naming tributes

    1. Naming in recognition of distinguished service may honor a gift of time or talent that has had a significant positive impact on the institution over an extended period of years. This honor is usually reserved for a College President or member of the College Board of Trustees.

      1. A period of not less than one year shall lapse between the end of the individual's service to Lansing Community College and consideration by the Board.

      2. The President of the College, or a committee appointed by the President, is charged with determining whether the person proposed is worthy of the honor, as well as the degree of internal and external support for the proposed naming, prior to submitting to the Board of Trustees for approval.

      3. The Board will generally not name buildings for living political figures or for current employees of the College.

    2. A significant monetary contribution to the actual construction cost, if for new construction; a major portion of the replacement or major renovation cost, if for an existing building or facility; or the fundraising goal.

      1. The donation may be made in cash or a legally binding pledge and should be paid within five years of naming the facility, unless other arrangements are made.

      2. A portion of the gift may be in the form of an irrevocable trust or a contractual bequest.

      3. The Board reserves the right to remove names from facilities when the gift remains unpaid beyond the five-year limit or the agreed upon date. Should this occur the Board may seek a naming opportunity that would be proportionate to the value of the gift received.

      4. The Board requires that the following information be submitted:

        1. Donor name and amount of gift.

        2. Current and proposed name of facility or room.

        3. Justification, including the nature and duration of the individual's affiliation with the College.

        4. If the naming is a stipulation of the gift, the request must explain the proposed arrangement.

    3. Specific contribution levels may be established with either fixed or minimum dollar amounts for sponsorship of other physical property on campus.

      1. Such property may include, but is not limited to pavers, benches, planters, fountains, gardens, equipment, musical instruments, artwork, and outdoor plazas.

      2. Amounts for these naming opportunities shall be reviewed periodically by the Lansing Community College Foundation and the College Board of Trustees.

  2. Guidelines for naming based on monetary contributions

Facility Commemoration Opportunities Gift Minimums and Ranges
New Building 51% of cost of construction
Existing Building $2,000,000 minimum
Classroom or Laboratory $50,000 to $250,000, a range of options is available
Entrance hall, lobby, student lounge, staff or faculty office $100,000 to $250,000, a range of options is available
Athletic facility (or parts of) $50,000 to $500,000, a range of options is available
Endowed Chair or Faculty member $500,000
Endowed Scholarship $25,000 minimum
Conference Room, Divisional offices or departments $25,000 to $100,000, a range of options is available
Outdoor area, bench, commemorative tree $500 to $25,000, a range of options is available

*This list will be reviewed for currency periodically.

  1. Permanency of Names

    1. When a gift from an individual or family is involved, a facility receives a designation that shall last the lifetime of the facility, subject to paragraph 4 of this rule.

      1. Demolition or significant renovation shall terminate the designation.

      2. The individual or family involved in the initial naming may be offered an opportunity to retain the naming before any other naming gifts are considered.

    2. When a gift from a corporation is involved, the corporation shall be given the opportunity to purchase a naming license with a name subject to approval by the Board for a period of time to be negotiated between the College and the Donor.

    3. When a name is to be removed from an existing facility, approval shall be sought through the same procedures as are required for naming a facility.

    4. Any legal impropriety or other act which brings dishonor to the College on the part of the donor or a corporate donor who is no longer in existence shall make the gift and naming subject to reconsideration by the College.

  1. Prior to approval, the College Board shall have reasonable assurance that:

    1. The proposed name shall bring additional honor and distinction to the College.

    2. Any philanthropic commitments connected with the naming shall be realized.

  2. The College President, upon advice and consent from the College Board of Trustees, may require that a background check is performed on a donor (living or deceased) or designee based upon particular facts and circumstances.

    1. The donor, donor's executor, or designee shall be required to sign an authorization allowing the background check, if a background check is determined to be necessary.

  3. The College President, in collaboration with the LCC Foundation has the right to:

    1. Determine content, timing, location and frequency of any public announcements associated with the gift.

    2. Approve the color, design, and size of any physical marker that provides information about the designee or donor and/or the nature of the gift or honor.

    3. Determine and carry out the exact nature of any ongoing care and maintenance of any memorial or tribute gifts or their physical markers.

  4. The final authority of any naming, memorial or tribute decision rests with the President and the College Board of Trustees.

  5. The Guidelines set forth in this policy statement shall not be deemed all-inclusive.

  6. The College President and the College Board of Trustees reserve the right to consider any and all factors regarding the privilege of name association with the program, fund or physical aspect of Lansing Community College as particular acts and circumstances warrant. Decisions will be made consistent with the stated mission of Lansing Community College.

Adopted: January 16, 2007

Failure to follow this policy may result in disciplinary action up to and including termination.

Top

No Show (NS) Grade

This policy will enable more accurate tracking of student-success progress, as well as accountability in financial aid-related matters.

This policy applies to all students

A student who attends no class sessions during the entire course meeting dates will receive a grade of “NS” for the course.  This grade will not be noted on the student’s transcript but could be used for advising and/or financial aid purposes.

  1. Responsibility  
LCC instructors are responsible for processing the paperwork for NS grade.

ADOPTED: 11/17/2014

Organ Donor

Lansing Community College desires to encourage voluntary organ donation from its staff and faculty so that the health and quality of life of others may be benefited.

This policy applies to all LCC employees with one year of current service.

The employee must submit medical certification to support the use and expected duration of the leave. Up to thirty work days will be granted for the organ donation and recuperation time. The employee may use his/her existing paid leave days. If necessary, an unpaid status will be made available.

Leave used for organ donation will not be considered Family and Medical Leave. However, if more than thirty days is required, the provision of the Family Medical Leave Act may apply.

This policy covers donation of bone marrow or major organs only.

The College's Executive Director of Human Resources is responsible for the oversight of this policy.

Adopted: January 21, 2003

Failure to follow this policy may result in disciplinary action up to and including termination.


Top | < Previous Policy Group | Next Policy Group >

Lansing Community College Policies

Welcome Center
Gannon Bldg, Room 221
Phone: 1-800-644-4522
Additional contact information »