Code of Student Conduct

Electronic Communication

Networking Infrastructure

The District desires to ensure that its information technology networking infrastructure is secure, reliable, and efficient. To that end, it is necessary to coordinate this infrastructure with the District's local and wide area networks. The Chancellor is authorized to promulgate regulations to implement this policy.

Purpose Of Computer Use Policy

The District is committed to providing an educational and work climate that is conducive to the personal and professional development of each individual. To fulfill its multiple missions as an institution of higher learning, the District encourages a climate that values and nurtures collegiality, diversity, pluralism, and the uniqueness of the individual within our state, nation, and world. The District also strives to protect the rights and to enhance the self-esteem of all its members. Faculty, staff, and students should be aware that any form of illegal harrassment or discrimination against any individual is inconsistent with the values and ideals of our community.

As an institution of higher education, the District encourages, supports, and protects First Amendment rights and an open environment to pursue scholarly inquiry and to share information. Access to networked computer information in general and to the Internet in particular supports the academic community by providing a link to electronic information in a variety of formats and covering all academic disciplines. As with any resource, it is possible to misuse computing resources and facilities and to abuse access to the Internet. The following statements address, in general terms, the District's policies concerning computer use.

The Chancellor is authorized to promulgate policies and procedures to implement this policy. [Refer to the Business Procedures Manual for additional information.]

Use Of District Resources

Use of District computing resources and facilities requires that individual users act in compliance with District policies and procedures, and failure to comply may result in restriction or revocation of access to District resources. Computing "resources and facilities" include, but are not limited to, District- and College-owned host computer systems, networks, peripheral equipment (such as modems, terminals, and printers), computers and workstations, software, data sets, storage devices (such as CD-ROMS, hard and soft disks, and the like), and all computer communications controlled, administered, or accessed directly or indirectly by the District or by any user.

The District provides users with an account that permits use of the computing resources and facilities within policies and procedures established by the District. Any person who uses District computing resources and facilities through District-owned equipment (such as public access computers at the libraries and computer labs) is also a user and is permitted to use the computing resources and facilities within policies and procedures established by the District.

Users must respect the integrity of computing resources and facilities, respect the rights of other users, and comply with all relevant laws (local, state, federal, and international), District policies and procedures, and contractual agreements. Employees who use District computers or facilities must comply with the Texas Public Information Act and the Local Government Records Act as described in CR(REGULATION). The District reserves the right to limit, restrict, or deny computing resources and facilities for those who violate District policies, procedures, or local, state, or federal laws.

Freedom Of Expression

Censorship is not compatible with the goals of the District. The District shall not limit adult users' voluntary access to any information due to its content when it meets the standard of legality. A minor's parent may permit a minor user to have voluntary access to any information that meets the standard of legality.

Privacy

The general right to privacy is extended to the electronic environment to the extent possible. Users have a lessened expectation of privacy when using computer resources and facilities owned by public institutions such as the District. Issuance of a password or other means of access is to ensure appropriate confidentiality of District files and information. It is not a guarantee of privacy nor a license for abuse or improper use of the District's computing resources and facilities. Privacy is mitigated by the Texas Public Information Act, administrative review, computer system administration, audits, and the nature of the electronic medium itself. Contents of electronic files will be examined or disclosed only when authorized by the user, approved by designated District officials, or required by law.

Intellectual Property

All users should be aware that property laws apply to the electronic environment. Users must abide by all software licenses, District copyright and software policies and procedures, and applicable federal and state law. Users should assume that works communicated through a network are subject to copyright unless specifically stated otherwise. Unless permission of the author is obtained, use of any electronically transmitted information must comply with the "fair use" principle found in federal copyright law and CR(REGULATION).

Criminal and Illegal Acts

Computing resources of the District, which include the hardware, software, and network environment, shall not be used for illegal activities. Any illegal use of these resources will be dealt with by the appropriate District authorities and/or other legal and law enforcement agencies. Criminal and illegal use may involve, but is not limited to: unauthorized access, intentional corruption or misuse of computing resources, theft, defamation, obscenity, child pornography, and harassment based upon race, ethnicity, national origin, disability, age, religion, or sex.

Authorized Use

Computing resources are provided by the District to accomplish tasks related to the District's mission. Some computers may be dedicated to specific enterprises or teaching missions that limit their use. Incidental personal use of computing resources is acceptable if the use:

  • Imposes no measurable cost on the District;
  • Is not harmful to the District;
  • Is not a hindrance to the daily operations of the District; and
  • Has no adverse effect upon an individual's job or educational performance.

Unauthorized Use

Unauthorized use of the District's computing resources and facilities includes but is not limited to: illegal activities; failure to comply with laws, license agreements, and contracts governing network software and hardware use; abuse of communal resources; use of computing resources for unauthorized commercial purposes or personal gain; failure to protect the user's password or use of the user's account; breach of computer security, harmful access, or invasion of privacy; use of computing resources for anonymous or identity-masked messages to other District users; or unauthorized encryption. [Refer to the Business Procedures Manual for additional information.]

Individual Responsibility For Use Of Computer Resources and Facilities

All users must will use these resources and facilities in accordance with District policies and procedures as well as all laws. Failure to fulfill these responsibilities may lead to the cancellation of computer access, other disciplinary action by the District, and/or referral to legal and law enforcement agencies, in accord with existing District policies and procedures. Individuals using the District's computing resources or facilities shall:

  • Use District computing resources and facilities in accord with this policy, respect the rights of other computer users, by comply with laws, license agreements, and contracts.
  • Use communal resources with respect for others. Disruptive mailings and print jobs, tying up work stations, and other disproportionate use of computing facilities prevent others from using these resources.
  • Use of District computing accounts must be limited to authorized purposes. Use of District-owned resources and facilities shall be limited to District-related business or incidental personal use as defined in this policy. Use of computing resources for unauthorized commercial purposes or personal gain is prohibited.
  • Protect the individual's password and use of the individual's account. The user shall not use another person's identification, account or password without his or her permission. Confidential information contained on various computers shall not be shared with others except when those persons are authorized to receive the information. Users shall not intentionally seek read, provide, remove, reconfigure, or modify information in or obtain copies of any files, accounts, software, hardware, programs, or passwords belonging to other computer users or the District without the permission of those other computer users or the District. A user must obtain written permission from the owner of a file to alter or copy a file if the file does not belong to the user or the file has not been sent to the user by the owner.
  • Report improper use of computer resources and facilities which may include:
    Breach of computer security.
  • Unauthorized access to computing resources.
  • Release of password or other confidential information on computer security.
    Harmful access.
  • Alteration, damage, or destruction of data.
  • Injection of a destructive computer virus.
  • Invasion of privacy.
  • Reading files without authorization.
  • Criminal and illegal acts.
  • Comply with requests concerning computing from the system operator.

Report any incidents of harassment and/or discrimination using District computing resources and facilities in accord with the District's policy. It may be harassment if the behavior:

  • Is unwelcome;
  • Interferes with the user's ability, or the ability of others, to work or study;
  • Creates an intimidating, hostile, or offensive environment.
  • Alternatively, users may file a grievance through appropriate channels.

Respect the forum (talk groups, bulletin boards, public computing facilities) when communicating ideas to others via District computing facilities and resources (includes access to external networks). All communications should reflect high ethical standards and mutual respect and civility. Users may use external network (e.g., BITNET, Internet) links solely for the purposes permitted in these policies and in the external network guidelines. Users are responsible for obtaining and adhering to all of the policies published by the external networks they use. The ability to connect to external systems through the District systems does not imply the right to connect to these systems or to make use of these systems unless properly authorized by the owners of those systems.

Computer Software and Copyright Law

The District respects the copyrights of others. With very few exceptions, all computer software and documentation is protected by federal copyright law. [See CR(REGULATION)] The unauthorized or unlicensed use, duplication, or copying of computer software or documentation is contrary to District policy and is a violation of the law. Violators of any copyright are subject to both civil and criminal penalties and/or disciplinary action. District regulations and procedures will establish guidelines for the use of computer resources and local area networks.


DATE ISSUED: 08/09/2004
LDU-32-04
CR(LOCAL)-X

This online presentation of your college district's policy concerning the stated subject material is an electronic representation of TASB's record of the college district's currently adopted policy manual. It does not reflect updating activities in progress nor is it a legally binding document. Please contact the office of the President or Chancellor for the official, legally binding generation of this and the other policies that pertain to your college district.

Copyright © 2014 Richland College | DCCCD Monday, October 6, 2008
Monday, October 6, 2008