Computing resources are defined as computer hardware, computer software, computer peripherals, devices, and networks operated by or for the benefit of the students, faculty and staff of the College. The use of these resources is a privilege, not a right. It is the user's responsibility to use these resources in a manner that is efficient, ethical and legal. All users shall strictly adhere to both the letter and spirit of this policy, which is provided to insure a reliable, secure computing environment to all users. Failure to comply with any of the regulations set forth in this policy may result in sanctions as stated in number ten, Sanctions.
You may use College computing resources only for authorized purposes. It is the obligation of College employees to be aware of the governing law, rules, and guidelines set forth in Chapter 42.52 RCW, Ethics in Public Service Act; WAC 292-110-010, Use of state resources; and South Puget Sound Community College Policies and Procedures. It is the obligation of students to be aware of the governing law, rules, and guidelines set forth in WAC 132X-60-090 Student Rights and Responsibilities and Student handbook.
All authorized users will be provided a network account.
You may use only those computing resources that you have been authorized to use. If your access to computer resources is protected by a personal password, you must not make this password available to others or use passwords not assigned to you. You may not allow someone else to give his/her password to you, or attempt to find out the password of another user, or aid such attempt by any other person. In some instances, shared accounts may be established by the System Administrator, in which case a password may be utilized by multiple users.
You may not copy, rename, alter, examine, or delete the files or programs of another user without the user's permission. System administrators may, as a requirement of system maintenance, delete files that are determined to be non-essential after proper notification. Such deletions shall be made in accordance with the College's retention schedule. You may not interfere with the use of computing resources by any other authorized user, or compromise the confidentiality of the College's internal business practices or records.
You must be aware of copyright laws as they apply to computer software and other materials that you may access with College computing resources. If you copy any material that is protected by copyright without proper authorization, you may be subject to criminal and/or civil penalties and/or further discipline by the College. A formal copyright declaration need not be in evidence for legal copyright protection to be in force.
You may not use the College's computing resources to send, receive, or display information including text, images, or voice that is sexually explicit, or constitutes discrimination or harassment. "Sexually explicit material" is defined in RCW 9.68.130, but exempts authorized education and research.
You may not subvert (known as hacking), or attempt to subvert or assist others to subvert, the security of any computing resources. The use of software or hardware devices designed to capture or examine network data (protocol analyzer or sniffer) is restricted to authorized College staff for the purpose of network maintenance and instruction. Unauthorized use of such software or hardware devices is expressly forbidden. You may not use College resources to create, disseminate or execute self-replicating or similar nuisance programs (e.g. virus, Trojan horse), whether or not they are destructive in nature.
You many not connect a personal computer or any other device to the College network without prior approval of IT Services. Wireless access is available throughout the campus, but direct network connections must be approved.
Network users shall promote efficiency in order to minimize network congestion and interference with other network users. Sending inappropriate mail to large distribution lists, downloading large files or purposely engaging in activities which overload the College computing resources is forbidden.
You may make limited personal use of College computing resources that support organizational effectiveness and enhance job-related skills. You may make limited personal use of College computing resources to access the Internet and email, assuming little or no expense to the college, brief duration and infrequent use that does not interfere with performance of official duties. Extensive personal use of college provided email or Internet access is not permitted. See WAC 292-110-010(4).
Pursuant to the Electronics and Communications Privacy Act of 1989, Title 18, United States Code, Sections 2510, notice is hereby given that there are no facilities provided by South Puget Sound Community College for sending or receiving confidential messages. Users must be aware that electronic messaging systems may not be secure from unauthorized access and should not be used to deliver confidential information.While performing normal maintenance activities, messages may be monitored. The college president or the designated representative may authorize college staff, with due regard for the right of privacy of users and the confidentiality of their data, to have the right to suspend or modify information access privileges, monitor messages, examine files, passwords, printouts, and any other material which may aid in the investigation of possible abuse. Whenever appropriate, the cooperation and agreement of the user will be sought in advance. Users are expected to cooperate in such investigations when requested to do so. Education records of students attending the college are confidential and can be released only in accordance with the Family Education Rights and Privacy Act of 1974 and the administrative rules of the college. Electronic Personal Health Information (ePHI) is protected under the Health Information Portability and Accountability Act of 1996 (HIPAA) and is handled using only secure and encrypted systems for storage and transport. See the College's Data Security Policy.