Wednesday, November 12, 2008

Acceptable Use of Information Technology Resources

This acceptable use policy governs the use of computers and networks by all persons at Central Oregon Community College (COCC). As a user of these resources, you are responsible for reading and understanding this document. If you have questions, please contact Information Technology Services .Central Oregon Community College encourages the use and application of information technologies to support the research, instruction, and public service mission of the institution. COCC computers and networks provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations.
Term and Conditions of use:
  • The primary purpose of electronic systems and communications resources is for College-related activities.
  • Users do not own accounts on College computers, but are granted the privilege of exclusive use. Users may not share their accounts with others, and must keep account passwords confidential.
  • Each account granted on a COCC system is the responsibility of the individual who applies for the account. Groups seeking accounts must select an individual with responsibility for group accounts.
  • COCC cannot guarantee that messages or files are private or secure.COCC may monitor and record usage to enforce its policies and may use information gained in this way in disciplinary and criminal proceedings.
  • Users must adhere strictly to software licensing agreements and copyright laws.
  • When accessing remote systems from COCC systems, users are responsible for obeying the policies set forth herein as well as the policies of other organizations.
  • Any violation of this policy or local, state, or federal laws may be referred to appropriate COCC offices and/or, as appropriate, law enforcement authorities.
  • Misuses of COCC computing, networking, or information resources may result in the immediate loss of computing and/or network access, and may lead to further disciplinary action as well.

No comments:

Post a Comment

 
Google