Georgia Perimeter College | 2015-2016 Student Guidebook - page 40

40
Engaging in retaliatory acts against a person who reports an alleged violation of this
policy or testifies, assists, or participates in a conduct proceeding or investigation is
strictly prohibited.
Sexual misconduct occurring through the use of electronic and/or digital media is
also prohibited. Electronic and digital media includes, but is not limited to:
computers, personal data devices, or other tools that can be used for Internet
Access, E-mail or transmission of messages via various social media (such as Twitter,
Facebook, or any blogs), any type of phone that can transmit calls, text messages,
instant messages or access the Internet, or any other means of electronic
communication.
Under this policy, the College will maintain confidentiality insofar as it does not
interfere with the College’s legal obligation or ability to investigate allegations of
misconduct when brought to its attention and take corrective action when it is found
that misconduct has occurred.
Questions pertaining to this policy may be directed to the Title IX Coordinator,
located in the Office of Human Resources or the U.S. Department of Education’s
Office of Civil Rights.
STANDARDS OF CONDUCT FOR USE OF GEORGIA PERIMETER COLLEGE
COMPUTING RESOURCES
All users of the Georgia Perimeter College computer systems and networks are
subject to state and federal laws involving computer fraud, data theft, privacy,
software piracy, copyright infringement, etc., including the Georgia Computer
Systems Protection Act. They are also prohibited from engaging in (1) academic
dishonesty involving Georgia Perimeter College computer systems, (2) disruption and
destruction of computer facilities and (3) violation of licenses and copyright
agreements, Georgia Perimeter College policies, and state or federal laws.
Academic honesty is defined in the Georgia Perimeter College Student Conduct Code.
Examples of this type of behavior involving computing resources include, but are not
limited to:
submitting the programs, documentation or program results of another
person as your own
obtaining or attempting to obtain unauthorized access to information
stored in electronic form
submitting false results of a program’s output for a class assignment or
falsifying the results of program execution for the purpose of improving a
grade
The Georgia Computer Systems Protection Act outlaws certain accesses, alteration,
damage, or destruction of any computer, computer system, computer network,
computer software program or data. Other laws and regulations specify protection
of personal or otherwise sensitive information. All users of Georgia Perimeter College
computing resources are subject to the terms of applicable laws. It is the
responsibility of the Academic Computing, Administrative Computing, and Network
Services departments to report any violations involving computer systems or
I...,30,31,32,33,34,35,36,37,38,39 41,42,43,44,45,46,47,48,49,50,...192
Powered by FlippingBook