Los Angeles Mission College

Acceptable Use of Technology Policy

For Students and Guests of the College

 

 

Purpose

The College views technology and its use in instruction, in service delivery, in advising, and in communications as a strategic asset.� The College�s commitment to academic freedom and appreciation for creating an environment of free inquiry extends to the electronic information environment. To ensure that the College's investment in technology promotes free inquiry, innovation, quality learning environments, and the creative applications that advance the mission of the College, a strong policy infrastructure for technology use is important.� Acceptable use policies preserve the stability and security of our information technology systems, protect the College from inappropriate use, and ensure reasonable accessibility to technology resources for our academic community.� These policies govern desktop, network, e-mail, telephone, internet, data security, and software uses of College-owned information technology equipment and resources.

 

Policy

This policy outlines the acceptable use of Los Angeles Mission College�s computer and network resources by students and guests of the College.� Users of computing resources are expected to take a responsible and professional approach to the use of these resources, as access to these resources is a privilege not a right.� The College�s computing resources and facilities intended for student use cannot be used for commercial purposes without proper written authorization.

 

Members of the user community must use only those resources to which they have been specifically granted access by the College; and by using the College�s technology resources, users assume personal responsibility for their appropriate use and agree to comply with this policy and other applicable College policies, as well as city, state, and federal laws and regulations.

 

In making acceptable use of resources you are expected to:

�        use resources only for authorized purposes;

�        protect your user ID, password,� and system from unauthorized use;

�        access only information that is your own, that is publicly available, or to which you have been given authorized access;

�        be considerate in your use of shared resources;

�        demonstrate respect for principles of open expression;

�        be aware of copyright laws as they apply to computer software and other materials that you may access with College computing resources.


Unacceptable use of resources may include but is not limited to:

�        use of another person�s system, user ID, password, files, or data, or giving the use of one�s system, user ID, password, files, or data;

�        engage in any activity that might be purposefully harmful to systems, resources, or data, such as creating or propagating viruses, disrupting services, or attempting to gain unauthorized access to resources or data;

�        make or use illegal copies of copyrighted materials, software, or music, store such copies on College systems, or transmit them over College networks;

�        creation, display, or distribution of defamatory or harassing material, which is in violation of existing law or College policy;

�        use of College system for any other illegal activity;

�        monopolizing systems, overloading networks with excessive data, or wasting college resources;

�        use the College�s equipment or networks for personal profit;

�        unauthorized installation of hardware or software onto any College owned computer/network� (the Information Technology Department is responsible for all installations, requests for exceptions should be sent to the Information Technology Help Desk).

 

Consequences:

Students or guests of the College who violate this policy are subject to disciplinary action.� The user�s privileges may be suspended or revoked.� If the violations constitute a criminal offence, the College reserves the right to notify appropriate legal authorities.

 

Information Disclaimer:

The College is not responsible for the loss of information or interruption of electronic communications.� The College reserves the right to discard incoming mass mailings (�spam�) without notifying the sender or intended recipient and to block all Internet communications from sites that are involved in extensive spamming or other disruptive practices, even though this may leave the College computer users unable to communicate with those sites.

  

Program-Specific Policies:

Additional procedures may apply to specific labs and equipment within the College.� Consult with the appropriate department to determine availability and proper use.

 

 

 

 



© 2004 | ITC | All rights reserved. | Last revised by Juan Chacon on April 27, 2004