Lakeshore Technical College | 2017-2018 Student Handbook - page 55

Permissible Use  
Students are  required  to adhere  to  this policy and any  related College  rules,  regulations and procedures  for  
work produced on  computing equipment,  systems and networks. Students may access  these  technologies  
for academic, administrative and  school  related uses,  if  the  following  restrictions are  followed:  
A.  The  use  is  lawful  under  federal  or  state  law.  
B.  The  use  is  not  prohibited  by  Lakeshore Technical College District Board, College,  or  institutional  
policies.  
C.  The  use  does  not  damage  or  overload College  computing  equipment  or  systems,  or  otherwise  
harm  or  negatively  impact  the  systems’  performance.  
D.  The  use  does  not  conflict with  copyright  or  trademark  law.  
E.  The  use  does  not  result  in  commercial  gain  or  private  profit  (other  than  as  allowable  under  
College  intellectual  property  policies).  
F.  The  use  does  not  state  or  imply College  sponsorship  or  endorsement.  
G.  The  use  does  not  violate  state  or  federal  laws  or College  policies  against  race  or  sex  
discrimination,  including,  but  not  limited  to,  racial  slurs,  gender  specific  comments,  comments  
on  sexual  orientation  or  sexual  harassment.  
H.  The  use  does  not  involve  unauthorized  passwords,  identifying  data,  or  any  other  action  that  
attempts  to  circumvent,  disable  or  overload  system  security,  or  in  any way  attempts  to  gain  
unauthorized  access.  
I.  The  use  does  not  involve  activities which  interfere with  or  disrupt  network  users,  services  or  
equipment,  to  include,  but  not  limited  to:  
a.  Distribution  of  unsolicited  advertising  or mass mailings;;  
b.  Propagation  of  computer worms  or  viruses;;  and  
c.  Downloading  and/or  running  any  destructive  or  disruptive  programs  on College  computer  
systems.  
J.  The  use  does  not  involve  accessing  or  attempting  to  access  by  "hacking"  or  any  other  
unauthorized  entry, materials,  information,  resources,  communication  devices,  or  the  files  of  
other  users, which  the  student  reasonably  understands  to  be  restricted  to  persons  other  than  
the  student.    Intentional  interception  of  any  electronic  communication  is  considered  
unauthorized  access  and may  violate  the Electronic Communications Privacy Act.  
K.  The  use  does  not  involve  in  any manner  disabling  or  inactivating  virus  scanning  software  or  
restrictive  filters.  
Students  are  required  to  adhere  to  this  policy  and  any  related College  rules,  regulations  and  procedures  
for work  produced  on  computing  equipment,  systems  and  networks. Students may  access  these  
technologies  for  academic,  administrative,  business  and  incidental  personal  uses,  if  the  following  
restrictions  are  followed:  
55
I...,45,46,47,48,49,50,51,52,53,54 56,57,58,59,60,61,62,63,64,65,...234
Powered by FlippingBook