The policies controlling acceptable behavior at the institution are implicitly
extended to cover the use of the ECF. The impersonal aspect of computers should
be taken as an excuse or reason for people's interactions with others to be
but well‐mannered, ethical and legal.
For example, if it is unacceptable to display a sexually explicit poster in a
room, it is similarly unacceptable to display such an image on a publicly
computer screen. Unsolicited, wide distribution of mail or messages should be
carried out only if there is a reasonable expectation of interest by the
Even in those cases, care must be taken to ensure that the messages do not
The ECF include stand‐alone workstations and network‐attached systems as well as
central servers. This Code also specifically applies to access to ECF via
lines, the internet, or other remote access mechanisms.
Be responsible for using these facilities in an effective, ethical and
This policy states that individual users are responsible for their own
actions. For example, if a user transmits illicit materials or stores
illegal software, that individual user is responsible such actions and
be held accountable for all results and repercussions of such
Be aware that wasteful or inefficient use of resources may incur
expense for the institution or result in a reduction in service to other
Use only those facilities for which they have authorization, whether
facilities are at the institution or at any other location accessible
through a network.
Normally, ECF systems require explicit authorization. Authorization based
the provision of false or misleading information is not valid.
Take all reasonable steps to protect the integrity and privacy of the ECF
including software and data. In particular, users shall not share with
others the access codes, account numbers, passwords or other
which have been assigned to them.
Users are encouraged to report any violations of this policy and any
information relating to a flaw in or bypass of computing facility
to the appropriate Instructor, Campus Director, Department Head or to
Campus Support Information Technology Department. Such security “holes”
not be "tested" without proper authorization. Turning a blind eye to
potential violations or system flaws may allow your privacy or access to
In this and following sections, "access code" represents the username,
account, sign‐on ID, password or whatever system‐dependent mechanisms
used to gain access to particular facilities.
By allowing your access code to be used by others, you risk compromising
security and integrity of the ECF. As described in several later
much software which the institution utilizes requires that all actions
identified and traceable. For these reasons, if you do allow your access
code to be used by others, you are responsible for all usage and
carried out with the code.
Allowing unauthorized access to ECF indirectly is similarly prohibited
as allowing access to a private computer at home, where this computer in
turn provides access to ECF).
A computer or terminal logged on and unattended in an accessible location
Some system management functions require that all those responsible for
functions share a single access code. Similarly, specific access codes
at times allocated to allow several people performing a common function
receive email. The use of such shared codes must be restricted to the
intended purpose. Other usage by the same people should be through
single‐user access codes.
Respect the copyrights of the owners of all software, media and data they
Most of the programs made available on the ECF are copyrighted. Copyright
specifically prohibits copying of any software except as explicitly
in the usage agreement. Copyright law also provides similar protection
data and text.
Unless the software explicitly states otherwise, ALL software is
even those normally referred to as shareware or freeware. Individual
agreements detail the exact rights and limitations.
Media files such as music and video files are also subject to copyright
protection. Unauthorized downloading of such files, including
peer to peer sharing of copyrighted material is specifically
Unauthorized use, sharing or distribution of copyrighted material may
the user to criminal and civil penalties, including fines,
money damages payable to the copyright owners, and attorneys’ fees. In
addition the institution may take disciplinary action against users who
violate these prohibitions which may include suspension or termination
employees, and suspension or disenrollment of students.
Respect the policies established by the administrators of external
such as GAPS, COD, ED Connect, WestLaw, and various virtual library
when using such networks. They shall also respect the policies
by the administrators of local computing facilities at the
The use of networks external to the institution must comply with the
of acceptable use promulgated by the organizations responsible for those
networks. This Code of Conduct hereby specifically incorporates these
external policies. Adherence to this code ensures compliance with the
policies of our associated networks.
Respect the privacy of others. This includes, but is not limited to,
respecting the confidentiality of email, files, data and
Records containing information directly related to a student are
and protected from public disclosure by the Family Educational Rights &
Privacy Act, 20 U.S.C. § 1232g. No one shall access any such records
maintained in an electronic format or disclose or distribute their
in any manner inconsistent with federal and state law and the
The ability to access information does not imply permission to access it.
Specifically, having read‐access to a file does not mean that you may
it. You should not browse, view, print, copy or execute someone else's
directories or files (either manually or program‐assisted) without
permission. This also applies to floppy disks and tapes and similar
There may be cases where supervisors must access an employee’s mail or
to get specific job‐related materials or conduct business. For example,
urgent memo must be sent, but the staff member who typed it is ill. The
to respond to business‐related email is another example. In all cases,
unless prior arrangements have been made, reasonable effort to ask the
employee's permission must be made.
Access codes allocated for specific purposes may be designated as
"non‐private." In such cases, no data stored under the code may be
considered for the private use of the individual to whom the code is
allocated. Prior notice of such designation must be given.
Refrain from using ECF for unauthorized commercial activities.
As with other institution resources, the use of the ECF for private,
commercially oriented applications is forbidden without appropriate
authorization. Use for institution‐related private activities is often
permitted. For example, running an unauthorized business, doing tax
or sending e‐mail soliciting donations for a non-institution‐related
are clearly not allowed. On the other hand, use by a student for writing
resume is quite acceptable. If in doubt, check with the appropriate
Instructor, Campus Director, Department Head, Executive Vice President
Refrain from using ECF for any unauthorized or illegal purposes. Such
purposes might include destruction or alteration of data owned by
interference with legitimate access to computing facilities or
users of such facilities at the institution or elsewhere, unauthorized
disruption of ECF, attempts to discover or alter passwords or to subvert
security systems in ECF or in any other computing or network
The law prohibits unauthorized use of computers; unauthorized access to
information or programs; destruction or alteration of data or
with lawful access to data and the use of a computer system with the
to commit any of the above.
Intentional introduction of any computer virus, Trojan horse, worm or
software is an explicit violation of this principle.
Any unauthorized action which intentionally denies or obstructs access
another legitimate user to ECF is forbidden.
Properly identify themselves in any electronic correspondence and provide
valid, traceable identification if required by applications or servers
within the ECF or in establishing connections from the ECF.
All transmissions must be identifiable by the institutional staff. That
they must include your access code. Similar rules are imposed by many
external networks. You are encouraged to ensure that your name (in
to access code) is also attached to all applicable messages. It is
specifically forbidden to attempt to mask your real identity or
intentionally originate a message masquerading as someone else.
By convention, most systems offering "anonymous FTP" services request
you enter your network address as a password. Users must comply with
Users do not have a right to privacy when using ECF.
Users do not own accounts on the institution computers but are granted
privilege of use of accounts owned by the institution. Users have no
ownership rights or reasonable expectation of privacy right regarding
computer communications and data stored on institution computers or
through institution accounts.
Institution officials have the right to access electronic files,
e‐mail files, for any purpose deemed reasonable by them in their sole