those with an essential need to know, as well as to law enforcement and regulatory
agencies.
Notwithstanding the right of the College to view, retrieve, and read any and all
electronic messages, records, or files within College systems;; electronic messages,
records and files must otherwise be treated as confidential by students and accessed
only by the author or intended recipient. Students may not attempt to gain access to
another person's electronic messages, records, or files without authorization or the
permission of the person.
B. The College reserves the right to limit access to all equipment, networks, and resources when
federal or state laws or College policies are violated, or when College contractual obligations
or College operations may be impeded.
C. The College may authorize confidential passwords or other secure entry identification;; however,
students are to have no expectation of privacy in the material sent or received by them over the
College computing systems or networks. While general content review will ordinarily not be
undertaken, monitoring of this material may occur for the reasons specified above.
Computer passwords are not, and are not intended as a guarantee of confidentiality or privacy.
Students may not use a password, access a file, or retrieve any stored information unless
authorized to do so.
Each individual user is responsible for the proper use of his/her assigned account, including
password security. Users must not share computer accounts or disclose access information to
unauthorized persons.
D. The College has the right to monitor and/or restrict material located on all college owned
computing devices (computer, laptop, tablet PC, Smartphone, etc.) whether or not such
computers are attached or able to connect to campus networks.
The College strictly prohibits
the use of personal computing device on the College's secure network."
E. All material prepared and used for purposes and posted to or sent over College computing and
other telecommunicating equipment, systems or networks must be accurate and must correctly
identify the author and receiver.
F. No person shall make copies or distribute copyrighted material (e.g. software, database files,
documentation, articles, graphic files, music, movies, and downloaded information) through the
email system or by any other means unless you have written permission from the author of
those materials. Illegal copies of software may not be run on any District computer. The
Information Technology staff will take the necessary action to prevent violations of this
requirement. Students are responsible for any and all liability resulting from violation of this
prohibition. Failure to comply with this rule may result in disciplinary action by the college as
well as legal action by the copyright owner
G. The College is not responsible for the loss of data or interference with files which may occur in
the course of maintenance of networks or equipment.
H. The College is not responsible for lost or deleted files which have been saved on any type of
media.
54