Georgia Perimeter College | 2015-2016 Student Guidebook - page 41

41
networks for which they are responsible. Examples of behavior disruptive or
destructive to computer resources involve the following:
damaging or stealing college owned equipment or software
unauthorized altering or destruction of college data
causing the display of false system messages
maliciously causing system slow-downs or rendering systems inoperable
gaining or attempting to gain access to accounts or data without proper
authorization
introducing viruses or worms into a system
In support of applicable laws and regulations, all users of Georgia Perimeter College
computing resources are required to comply with approved policies in the areas of
computing resources, copyright materials, and information security. Please refer to
for Information
Technology policies, and
for Information
Security policies. The Georgia Perimeter College Appropriate Use of IT Resources
Policy at
defines
requirements for acceptable use of computing resources.
Copyright Infringement
Georgia Perimeter College students are required to adhere to copyright laws and
regulations. Most software used on Georgia Perimeter College computers is covered
by copyright, license or non-disclosure agreements. Violation of these agreements
puts Georgia Perimeter College and the individual in jeopardy of civil penalties.
Other possible infringements include illegal copying or distribution of copyrighted
digital media, such as music and videos. Examples of copyright violations include,
but are not limited to:
making copies of or distributing copyrighted or licensed software or digital
media without proper authorization
using software in violation of copyright, license or non-disclosure
agreements
using college computers for unauthorized private or commercial purposes
The
Higher Education Opportunity Act
(HEOA) includes provisions to reduce the
illegal downloading and distribution of copyrighted works through peer-to-peer (P2P)
file sharing. In order to comply with HEOA and effectively combat unauthorized
distribution of materials by users of the Georgia Perimeter College network, Georgia
Perimeter College has implemented technologies to identify and/or block many peer-
to-peer protocols primarily associated with copyright infringement. Georgia
Perimeter College also receives Digital Millennium Copyright Act (DMCA) notifications
indicating unauthorized copying of materials. When the college identifies or is
notified of this activity, the network port and/or wireless connection associated with
that user is disabled and the affected user is notified. The user must remove the
offending software in order to re-establish connectivity to the Georgia Perimeter
College network. Repeat offenders are subject to progressive consequences,
including disciplinary actions.
Copyright infringement may include civil and criminal penalties. In general, anyone
found liable for civil copyright infringement may be ordered to pay either actual or
statutory damages affixed at not less than $750 and not more than $30,000 per
I...,31,32,33,34,35,36,37,38,39,40 42,43,44,45,46,47,48,49,50,51,...192
Powered by FlippingBook