Owens FAQ
Search:     Advanced search

What is the Responsible computing policy?

Article ID: 59
Last updated: 19 Nov, 2013
Revision: 2
Views: 2591

Responsible Computing Policy

Owens Community College ("College") provides access to distributed and local networked resources as a service to the campus community. It is the intent of the College that all technology resources will be used in accordance with any and all local, state and federal laws and/or guidelines governing the use of information and technology with this and other policies and procedures of the College, and with standards of professional and personal courtesy and conduct. Implicit in this is the expectation that all students, faculty and staff will utilize the information and technology resources of the College so as not to waste them, abuse them, or interfere with or cause harm to other individuals, institutions or companies. Access to the College's information and technology resources is a privilege that may be wholly or partially restricted by the College without prior notice and without your consent when required by and consistent with law, when there is substantiated reason to believe that violations of policy are taking place, or when required to meet time-dependent critical operational needs.

1. The College's information and technology resources, including all electronic mail addresses and user accounts, are the property of the College. The College does not uniformly or systematically monitor use of email or the Internet. It does, however, maintain the right to do so if in receipt of a court order, public records request, freedom of information request, allegations of harassment, or other similar type of situation.

2. As an account holder, you are responsible for maintaining the confidentiality of your password(s). You must only use your account(s) and not use any other account. The information and technology resources of the College are intended for the use of students, faculty and staff of the College. You may only use accounts, files, software and computer resources that are assigned to you under your user account(s). You are expected to take all reasonable precautions to prevent unauthorized access to files and data and any other unauthorized usage within and outside the College.

3. Both law and College policy prohibit, in general, the theft or other abuse of information and technology resources. Such prohibitions include, but are not limited to, unauthorized entry, use, transferring, tampering with accounts and files of others; interference with the work of others and with other computing facilities. Mischievous abuse of electronic mail and electronic campus information services that interferes with productivity or computer operations may result in suspension of computing privileges. Substantiated complaints regarding your use of profanity, obscenity or offensive material may be cause for suspension of computing privileges.

4. Attempting to circumvent security or administrative controls and/or assisting someone else or requesting someone else to circumvent security or administrative controls is prohibited.

5. The College's information and technology resources are provided to support the teaching, research and public service mission of the College, and the administrative functions that support this mission. The College's information and technology resources must be used appropriately and only after receiving appropriate training. By completing the required training, you acknowledge the security and privacy requirements of the application.

6. Upon termination of employment or job responsibilities and/or as requirements change, access to information resources will be changed or terminated.

7. A person who files a complaint or participates in investigations shall be protected from any form of retaliation arising out of the filing of the complaint or participation in the investigation. A person who impedes an investigation, covers up the truth or retaliates against a complainant shall be subject to disciplinary action.

8. The College may, from time to time, develop and publish procedures and practices that implement this policy.

Penalties for actions, which violate the "Responsible Computing Policy," will be assessed through existing disciplinary channels, up to and including termination.

This article was:  
Prev   Next
What does HTTPS mean?     What does SSL mean?