1. The student must be provided with notice of the computing resources suspension and
the reasons for it.
2. The student must be given an opportunity to meet with the Manager of Student
Services Operations to discuss the suspension if the student requests it.
3. Following the meeting, the student must be notified that the student may appeal to the
Manager of Student Services Operations' immediate supervisor if the student is
dissatisfied with the outcome of the meeting.
B. The Manager of Student Services Operations may refer the matter for action under the student
code of conduct.
Violation of Policy
A. Any violation of this policy will be considered “misconduct” under the College student code of
conduct and the offending student will be subject to the process as outlined. Violations should
be reported as provided under the code.
B. Sanctions for violation of this policy may include a revocation or suspension of access
privileges in addition to the sanction provided under the student code of conduct.
C. Violations of federal or state law may be referred for criminal or civil prosecution.
D. Disciplinary decisions will be based upon, but will not be limited to, the following:
1. The nature of the misconduct, to include the character of materials, files, messages or sites,
created, accessed, sent, viewed, or damaged.
2. The frequency with which unauthorized materials, files, sites or messages were accessed,
downloaded, stored, transmitted, or damaged.
3. The time of day during which the conduct occurred.
4. Whether other persons were involved in any way, either voluntarily or involuntarily.
5. Whether the conduct is subject to criminal prosecution.
6. Whether the conduct has resulted in a complaint by another person.
7. Impact upon other students.
8. Prior disciplinary record.
9. Cost incurred by the College.
E. Unauthorized or improper use of a student account, password, or access information will not
excuse the student from disciplinary action, if the student failed to comply with the requirements
of this policy regarding network security.
Application of Public Records Law
All information created or received for work purposes and contained in College computing equipment
files, servers, or electronic mail (email) depositories are public records owned by the college
and are
available to the public unless an exception to the Wisconsin Public Records Law applies. This
information may be purged and destroyed only in accordance with the College records retention
schedule.
58