Page 46 - Lakeshore Technical College Student Planner & Handbook 2022-2023
P. 46

 and accessed only by the author or intended recipient. Students may not attempt to gain access to another person's electronic messages, records, or files without authorization or the permission of the person.
B. The College reserves the right to limit access to all equipment, networks, and resources when federal or state laws or College policies are violated, or when College contractual obligations or College operations may be impeded.
C. The College may authorize confidential passwords or other secure entry identification; however, students are to have no expectation of privacy in the material sent or received by them over the College computing systems or networks. While general content review will ordinarily not be undertaken, monitoring of this material may occur for the reasons specified above. Computer passwords are not and are not intended as a guarantee of confidentiality or privacy. Students may not use a password, access a file, or retrieve any stored information unless authorized to do so.
Each individual user is responsible for the proper use of his/her assigned account, including password security.
Users must not share computer accounts or disclose access information to unauthorized persons.
D. The College has the right to monitor and/or restrict material located on all college owned computing devices
(computer, laptop, tablet PC, Smartphone, etc.) whether or not such computers are attached or able to connect to campus networks. The College strictly prohibits the use of personal computing device on the College's secure network.
E. All material prepared and used for purposes and posted to or sent over College computing and other telecommunicating equipment, systems, or networks must be accurate and must correctly identify the author and receiver.
F. No person shall make copies or distribute copyrighted material (e.g., software, database files, documentation, articles, graphic files, music, movies, and downloaded information) through the email system or by any other means unless you have written permission from the author of those materials. Illegal copies of software may not be run on any District computer. The Technology Services staff will take the necessary action to prevent violations of this requirement. Students are responsible for any and all liability resulting from violation of this prohibition. Failure to comply with this rule may result in disciplinary action by the college as well as legal action by the copyright owner.
G. The College is not responsible for the loss of data or interference with files which may occur in the course of maintenance of networks or equipment.
H. The College is not responsible for lost or deleted files which have been saved on any type of media.
Permissible Use
Students are required to adhere to this policy and any related College rules, regulations, and procedures for work produced on computing equipment, systems, and networks. Students may access these technologies for academic, administrative, and school related uses, if the following restrictions are followed:
A. The use is lawful under federal or state law.
B. The use is not prohibited by the College or institutional policies.
C. The use does not damage or overload College computing equipment or systems, or otherwise harm or
negatively impact the systems’ performance.
D. The use does not conflict with copyright or trademark law.
E. The use does not result in commercial gain or private profit (other than as allowable under College intellectual
property policies).
F. The use does not state or imply College sponsorship or endorsement.
G. The use does not violate state or federal laws or College policies against race or sex discrimination, including, but
not limited to, racial slurs, gender specific comments, comments on sexual orientation, or sexual harassment. H. The use does not involve unauthorized passwords, identifying data, or any other action that attempts to
circumvent, disable, or overload system security, or in any way attempts to gain unauthorized access.
I. The use does not involve activities which interfere with or disrupt network users, services, or equipment, to
include, but not limited to:
1. Distribution of unsolicited advertising or mass mailings;
2. Propagation of computer worms or viruses; and
3. Downloading and/or running any destructive or disruptive programs on College computer systems.
                36





































































   44   45   46   47   48