Permissible Use
Students are required to adhere to this policy and any related College rules, regulations and procedures for
work produced on computing equipment, systems and networks. Students may access these technologies
for academic, administrative and school related uses, if the following restrictions are followed:
A. The use is lawful under federal or state law.
B. The use is not prohibited by Lakeshore Technical College District Board, College, or institutional
policies.
C. The use does not damage or overload College computing equipment or systems, or otherwise
harm or negatively impact the systems’ performance.
D. The use does not conflict with copyright or trademark law.
E. The use does not result in commercial gain or private profit (other than as allowable under
College intellectual property policies).
F. The use does not state or imply College sponsorship or endorsement.
G. The use does not violate state or federal laws or College policies against race or sex
discrimination, including, but not limited to, racial slurs, gender specific comments, comments
on sexual orientation or sexual harassment.
H. The use does not involve unauthorized passwords, identifying data, or any other action that
attempts to circumvent, disable or overload system security, or in any way attempts to gain
unauthorized access.
I. The use does not involve activities which interfere with or disrupt network users, services or
equipment, to include, but not limited to:
a. Distribution of unsolicited advertising or mass mailings;;
b. Propagation of computer worms or viruses;; and
c. Downloading and/or running any destructive or disruptive programs on College computer
systems.
J. The use does not involve accessing or attempting to access by "hacking" or any other
unauthorized entry, materials, information, resources, communication devices, or the files of
other users, which the student reasonably understands to be restricted to persons other than
the student. Intentional interception of any electronic communication is considered
unauthorized access and may violate the Electronic Communications Privacy Act.
K. The use does not involve in any manner disabling or inactivating virus scanning software or
restrictive filters.
Students are required to adhere to this policy and any related College rules, regulations and procedures
for work produced on computing equipment, systems and networks. Students may access these
technologies for academic, administrative, business and incidental personal uses, if the following
restrictions are followed:
55