Purpose
The
College views technology and its use in instruction, in service
delivery, in advising, and in communications as a strategic asset.�
The College�s commitment to academic freedom and appreciation
for creating an environment of free inquiry extends to the electronic
information environment. To ensure that the College's investment
in technology promotes free inquiry, innovation, quality learning
environments, and the creative applications that advance the mission
of the College, a strong policy infrastructure for technology use
is important.� Acceptable
use policies preserve the stability and security of our information
technology systems, protect the College from inappropriate use,
and ensure reasonable accessibility to technology resources for
our academic community.� These policies govern desktop, network, e-mail, telephone, internet,
data security, and software uses of College-owned information technology
equipment and resources.
Policy
This
policy outlines the acceptable use of Los Angeles Mission College�s
computer and network resources by students and guests of the College.�
Users of computing resources are expected to take a responsible
and professional approach to the use of these resources, as access
to these resources is a privilege not a right.�
The College�s computing resources and facilities intended
for student use cannot be used for commercial purposes without proper
written authorization.
Members
of the user community must use only those resources to which they
have been specifically granted access by the College; and by using
the College�s technology resources, users assume personal responsibility
for their appropriate use and agree to comply with this policy and
other applicable College policies, as well as city, state, and federal
laws and regulations.
In making acceptable use of resources you
are expected to:
�
use resources only for authorized purposes;
�
protect your user ID, password,� and system from unauthorized use;
�
access only information that is your own,
that is publicly available, or to which you have been given authorized
access;
�
be considerate in your use of shared resources;
�
demonstrate respect for principles of open
expression;
�
be aware of copyright laws as they apply
to computer software and other materials that you may access with
College computing resources.
Unacceptable
use of resources may include but is not limited to:
�
use of another person�s system, user ID,
password, files, or data, or giving the use of one�s system, user
ID, password, files, or data;
�
engage in any activity that might be purposefully
harmful to systems, resources, or data, such as creating or propagating
viruses, disrupting services, or attempting to gain unauthorized
access to resources or data;
�
make or use illegal copies of copyrighted
materials, software, or music, store such copies on College systems,
or transmit them over College networks;
�
creation, display, or distribution of defamatory
or harassing material, which is in violation of existing law or
College policy;
�
use of College system for any other illegal
activity;
�
monopolizing systems, overloading networks
with excessive data, or wasting college resources;
�
use the College�s equipment or networks
for personal profit;
�
unauthorized installation of hardware or
software onto any College owned computer/network�
(the Information Technology Department is responsible for
all installations, requests for exceptions should be sent to the
Information Technology Help Desk).
Consequences:
Students
or guests of the College who violate this policy are subject to
disciplinary action.� The user�s privileges may be suspended or revoked.�
If the violations constitute a criminal offence, the College
reserves the right to notify appropriate legal authorities.
Information Disclaimer:
The
College is not responsible for the loss of information or interruption
of electronic communications.� The College reserves the right to discard incoming
mass mailings (�spam�) without notifying the sender or intended
recipient and to block all Internet communications from sites that
are involved in extensive spamming or other disruptive practices,
even though this may leave the College computer users unable to
communicate with those sites.
Program-Specific
Policies:
Additional
procedures may apply to specific labs and equipment within the College.� Consult with the appropriate department to determine availability
and proper use.