Procedures and Guidelines Summary for Responsible Use of Information Technology
Kirkwood Community College Information Technology facilities and accounts are to be used for college-related activities for which they are intended and authorized.
If you use the College’s information technology resources or facilities, you have the following responsibilities:
· The software made available by the College has been licensed by the College for your use. As a result, its use may be subject to certain limitations.
· Use College owned microcomputers and advanced workstations for College related projects only.
· No food or drink is allowed in the open lab.
Access to the College’s Information Technology facilities is a privilege granted to College students, faculty, and staff. Staffing is provided to help students. The College reserves the right to extend, limit, restrict, or deny computing privileges and access to its information resources.
Misuse of Information Technology and Information Resource Privileges
The College characterizes misuse of information technology and information resources privileges as unethical and unacceptable and as just cause for taking disciplinary action. Misuse of information technology and information resource privileges includes, but is not restricted to, the following:
· Attempting to modify or remove computer equipment or other equipment supporting information technology, software, or peripherals without proper authorization. i.e., The installation or removal of software, peripherals, cables, or any other equipment from the workstation or the network.
· Accessing computers, other equipment supporting information technology, computer software, computer data or information, or networks without proper authorization, regardless of whether the computer is owned by the college. (That is, if you abuse the networks to which the College belongs or the computers at other sites connected to those networks, the College will treat this matter as an abuse of your Kirkwood computing privileges.)
· Circumventing or attempting to circumvent normal resource limits, logon procedures, and security regulations.
· Using computing facilities, computer accounts, computer data, or other information resources for purposes other than those for which they were intended or authorized.
· Using College Information Technology resources for commercial purposes or non-College related activities without written authorization from the College.
· Sending fraudulent computer mail, breaking into another user’s electronic mailbox, or voice mailbox, or reading someone else’s electronic mail without his or her permission.
· Sending any fraudulent electronic transmission, including but not limited to fraudulent requests for confidential information, fraudulent submission of electronic purchase requisitions or journal vouchers, and fraudulent electronic authorization or purchase requisitions or journal vouchers.
· Violating any software license agreement or copyright, including copying or redistributing copyrighted computer software, data, or reports without proper, recorded authorization.
· Violating the property rights of copyright holders who are in possession of computer generated data, reports, or software.
· Using the College’s computing resources, voice mailboxes and telephones to harass or threaten other users.
· Taking advantage of another user’s naiveté or negligence to gain access to any computer account, telephone account, data, software, or file that is not your own and for which you have not received explicit authorization to access.
· Physically interfering with other users’ access to the College’s computing facilities.
· Encroaching on others’ use of the College’s computers (e.g., disrupting others’ computer use by excessive game playing; sending frivolous or excessive messages, either locally or off-campus (including electronic chain letters and unauthorized electronic “bulk” mailings); printing excess copies of documents, files, data, or programs; modifying system facilities, operating systems, or disk partitions; attempting to crash or tie up a College computer; damaging or vandalizing College computing facilities, equipment, software, or computer files) attempting to degrade system performance or capability.
· Using accounts assigned for another’s exclusive use.
· Using Kirkwood’s computing resources to copy, generate or transmit obscene materials, transmit obscene language or making obscene files publicly accessible.
· Disclosing or removing proprietary information, software, printed output or magnetic media without the explicit permission of the owner.
· Posting credit card numbers or passwords in publicly accessible locations on computer systems.
· Reading other users’ data, information, files, or programs on a display screen, as printed output, or via electronic means, without the owner’s explicit permission.
User Confidentiality and System Integrity
The College will keep automatic logs of user activity for accounting, allocation of resources and facility utilization, however, the College will not normally monitor individual usage of any general facility. The College reserves the right to monitor and record the usage of all facilities if threatening or abusive behavior has been reported. The College has the right to use information gained in this way in disciplinary or criminal proceedings, as permitted by Federal and State Law.
*This information is an interpretation; all other information in this document is directed from the Kirkwood Community College Board approved Policy and Procedures manual.