User Access and Responsibility
Access to the College's computer system will be accomplished through the establishment of the computer use accounts accessed by means of a password. These computer use accounts are issued to the individual (College personnel, students, and other authorized persons) and are intended for the sole use of that individual. These accounts and their passwords are not transferable.
The owner is responsible for all usage on their assigned account.
The following are examples of behavior that is unethical and/or not acceptable, and, in some cases, may violate local, state or federal law:
- altering or damaging system software or hardware configurations
- accessing another individual's account, private files or E-mail without permission of the owner
- accessing or altering College personnel, financial, or student files without appropriate authorization
- misrepresentation of one's identity or password in electronic communication
- violation of copyright and/or software agreements
- violation of rules or codes set by services subscribed to by the College
- using computing resources to threaten or harass others
- using the College systems for commercial or profit-making purposes without written authorization from the College administration
- disobeying lab and/or system policies, procedures and protocol (e.g., time limits on workstation usage)
- plagiarizing of computer programs or parts thereof, or written materials without authorization or proper notation
- copying subroutines or text materials without authorization
- using the network to gain unauthorized access to any other computer system or network
- introducing viruses or other contaminating strategies to the College or other computer systems or networks through the College-wide computer network
- hacking, this includes but is not limited to cracking passwords, intentionally crashing the system, forging E-mail and accessing system files or other people's private files for which the user has not been specifically granted access
- attempting to circumvent data protection schemes or uncovering security loopholes; this includes possessing, creating, and/or running programs designed to identify security loopholes or decrypt security data
- using Carl Sandburg College information technology for any illegal or unlawful purpose
- using profanity obscenity, or fighting words
- accessing pornographic websites
- use of cloud based storage or sites not sanctioned for use by the College
Violations of this policy, including any appendices, shall be cause for discipline. Alleged violations of this policy shall be subject to the College's existing disciplinary procedures. Carl Sandburg College treats access and use violations of computing facilities, equipment, software, information resources, networks, or privileges seriously. Unauthorized or improper use will lead to the possible revocation of their user's access. The College may also require restitution for any use which is in violation of the usage guidelines. Carl Sandburg College will pursue criminal and civil prosecution of violators when appropriate.
Users should recognize the limitation to the privacy of electronic documents. The College cannot guarantee privacy of any accounts. All users should be aware that system operators have access to all accounts. Violation of this policy grants the operator of the system the right to review a user's usage and waives all rights of privacy the user (including students, faculty, staff) may claim or may have. The College retains the right to release the names of users to appropriate authorities in accordance with College procedures.
The College makes no warranties of any kind, expressed or implied, for the service it is providing. The College will not be responsible for any damages you suffer. This includes the loss of data resulting from delays, non-deliveries, or your errors or omissions. Use of any information you obtain over the Internet through the College's computer system is at your own risk. The College specifically denies any responsibility for the accuracy, quality or content of information obtained through the Internet accessed through the College's computer system.
All individuals using the institution's computer system will sign a statement indicating he/she has read, is aware of, and will adhere to the College's Acceptable Use Policy for its computer system.