Lakeshore Technical College | 2017-2018 Student Handbook - page 54

those with  an  essential  need  to  know,  as well  as  to  law  enforcement  and  regulatory  
agencies.  
Notwithstanding  the  right  of  the College  to  view,  retrieve,  and  read  any  and  all  
electronic messages,  records,  or  files within College  systems;;  electronic messages,  
records  and  files must  otherwise  be  treated  as  confidential  by  students  and  accessed  
only  by  the  author  or  intended  recipient.    Students may  not  attempt  to  gain  access  to  
another  person's  electronic messages,  records,  or  files without  authorization  or  the  
permission  of  the  person.  
B.  The College  reserves  the  right  to  limit  access  to  all  equipment,  networks,  and  resources when  
federal  or  state  laws  or College  policies  are  violated,  or when College  contractual  obligations  
or College  operations may  be  impeded.  
C.  The College may authorize  confidential passwords or other  secure entry  identification;; however,  
students are  to have no expectation of privacy  in  the material  sent or  received by  them over  the  
College  computing  systems or networks. While general  content  review will ordinarily not be  
undertaken, monitoring of  this material may occur  for  the  reasons  specified above.  
Computer  passwords  are  not,  and  are  not  intended  as  a  guarantee  of  confidentiality  or  privacy.    
Students may  not  use  a  password,  access  a  file,  or  retrieve  any  stored  information  unless  
authorized  to  do  so.  
Each  individual  user  is  responsible  for  the  proper  use  of  his/her  assigned  account,  including  
password  security.    Users must  not  share  computer  accounts  or  disclose  access  information  to  
unauthorized  persons.  
D.  The College  has  the  right  to monitor  and/or  restrict material  located  on  all  college  owned  
computing  devices  (computer,  laptop,  tablet PC, Smartphone,  etc.) whether  or  not  such  
computers  are  attached  or  able  to  connect  to  campus  networks.
The College  strictly  prohibits  
the  use  of  personal  computing  device  on  the College's  secure  network."
E.  All material  prepared  and  used  for  purposes  and  posted  to  or  sent  over College  computing  and  
other  telecommunicating  equipment,  systems  or  networks must  be  accurate  and must  correctly  
identify  the  author  and  receiver.  
F.  No  person  shall make  copies  or  distribute  copyrighted material  (e.g.  software,  database  files,  
documentation,  articles,  graphic  files, music, movies,  and  downloaded  information)  through  the  
email  system  or  by  any  other means  unless  you  have written  permission  from  the  author  of  
those materials.  Illegal  copies  of  software may  not  be  run  on  any District  computer. The  
Information Technology  staff will  take  the  necessary  action  to  prevent  violations  of  this  
requirement.    Students  are  responsible  for  any  and  all  liability  resulting  from  violation  of  this  
prohibition.    Failure  to  comply with  this  rule may  result  in  disciplinary  action  by  the  college  as  
well  as  legal  action  by  the  copyright  owner
G.  The College  is  not  responsible  for  the  loss  of  data  or  interference with  files which may  occur  in  
the  course  of maintenance  of  networks  or  equipment.      
H.  The College  is  not  responsible  for  lost  or  deleted  files which  have  been  saved  on  any  type  of  
media.  
54
I...,44,45,46,47,48,49,50,51,52,53 55,56,57,58,59,60,61,62,63,64,...234
Powered by FlippingBook