Rules for Acceptable Use of Computer, Network, and Communications Technology System

Purpose

San Joaquin Delta College (SJDC) owns and operates a variety of computing, network, and telecommunications systems which are provided for the use of San Joaquin Delta College students, faculty, and staff in support of the programs and business of the college and the use of which are limited to education, research, academic development, and approved public service only. Commercial uses or uses for personal gain are specifically excluded. All students, faculty, and staff are responsible for seeing that all computing, network, and telecommunications facilities are used in an effective, efficient, ethical, and lawful manner. This document establishes rules and prohibitions that define acceptable use of these systems. Unacceptable use is prohibited, and is grounds for loss of computing privileges, as well as discipline or legal sanctions under Federal, State, and local laws.

Audience and Agreement

All users of San Joaquin Delta College computing, network, and telecommunications systems (CNT systems) must read, understand, and comply with the rules and responsibilities in this document, as well as any additional guidelines established in various departments. By using any of these systems, users agree that they will comply with these rules and responsibilities.

Rights

These CNT systems, facilities, and accounts are owned and operated by San Joaquin Delta College. San Joaquin Delta College reserves all rights , including termination of service without notice, to its CNT systems. These procedures shall not be construed as a waiver of any rights of San Joaquin Delta College, nor shall they conflict with applicable acts of law. Users have rights that may be protected by Federal, State, and local laws.

Privileges

Access and privileges on San Joaquin Delta College CNT systems are assigned and managed by the Computer Services Department. Eligible individuals may become authorized users of a system and be granted appropriate access and privileges by following the approval steps prescribed for that system. All access to the College's computer resources, including the issuing of passwords, must be approved by Computer Services or a designee. Users may not, under any circumstances, transfer or confer these privileges to other individuals. Any account assigned to an individual shall not be used by others. The authorized user is responsible for the proper use of the system, including any password protection.

Responsibilities

Users are responsible for maintaining the following:

  1. An environment in which access to all College computing resources are shared equitably among users:
    1. Guidelines within which users must conduct their activities are provided in the Academic Computing Lab and other campus labs. By using these facilities, the user is agreeing to the established guidelines.
  2. An environment conducive to learning:
    1. A user who uses the CNT systems to harass, or make defamatory remarks, shall bear full responsibility for his or her actions. Further, by using these systems, users agree that individuals who transmit such remarks shall bear sole responsibility for their actions. Users agree that San Joaquin Delta College's role in managing these systems is only as an information carrier, and that they will never consider transmission through these systems as an endorsement of said transmission by San Joaquin Delta College.
    2. Some of the San Joaquin Delta College's CNT systems provide access to outside networks, both public and private, which furnish electronic mail, information services, bulletin boards, conferences, etc. Users are advised that they may encounter material which may be considered offensive or objectionable in nature or content. Users are further advised that San Joaquin Delta College does not assume responsibility for the contents of any of these outside networks, nor for what may be displayed on a computer monitor during Internet use.
    3. The user agrees to comply with the acceptable use guidelines for whichever outside networks or services they may access through San Joaquin Delta College's systems.
    4. Further, the user agrees to follow proper etiquette on outside networks. Documents regarding etiquette are available through the Academic Computing Lab and other on-line sources. It is the user's responsibility to learn and use appropriate etiquette.
    5. The user agrees never to attempt to transmit, or cause to be transmitted, any message in which the origination is deliberately misleading (except for those outside services which may conceal identities as part of the service).
    6. The user agrees that, in the unlikely event that someone does transmit, or cause to be transmitted, a message that is inconsistent with an environment conductive to learning or with a misleading origination, the person who performed the transmission will be solely accountable for the message, not San Joaquin Delta College,which is acting solely as the information carrier.
    7. The user agrees to utilize all CNT system resources in a reasonable and equitable manner. Computer Services and other computer lab staff reserve the right to discontinue prolonged computer use by an individual or group, especially of Internet, should other students be waiting for access.
  3. An environment free of illegal or malicious acts:
    1. The user agrees never to use a system to perform an illegal or malicious act. Any attempt to increase the level of access to which (s)he is authorized, or any attempt to deprive other authorized users of resources or access to any San Joaquin Delta College CNT system shall be regarded as malicious, and may be treated as an illegal act.
  4. A secure environment:
    1. Any user who finds a possible security lapse on any system is obliged to report it to computer support technicians or immediate supervisor. The system must not be used until Computer Services personnel have investigated the problem.
    2. Knowledge of passwords or of loopholes in computer security systems shall not be used to damage computing resources, obtain extra resources, take resources from another user, gain unauthorized access to resources or otherwise make use of computing resources for which proper authorization has not been given.
    3. Users are responsible for backup of their own data.
    4. Any account or system access assigned to an individual must not be used by others. The individual is responsible for the proper use of the account and system, including proper password protection.

Confidentiality

Programs and files are confidential unless they have been made available, with written permission, to other authorized individuals. The District reserves the right to access all information stored on District computers. File owners will be notified of file access and/or maintenance, in advance, if such notice is practical. When performing maintenance, every effort is made to insure the privacy of a user's files. However, if rule violations are discovered, they will be reported immediately to the appropriate supervisor or administrator.

System Usage

Electronic communications facilities (such as e-mail) are for college related activities only. Fraudulent, harassing or obscene messages and/or materials are not to be sent or stored. The user is solely responsible for the security of their system and any form of electronic or telephony message services.

System Performance

No one should deliberately attempt to degrade the performance of a computer system or to deprive authorized personnel of resources or access to any college computer system.

Unauthorized Access

Loopholes in computer security systems or knowledge of a special password should not be used to damage the computer system, obtain extra resources take resources from another user, gain access to systems or use systems for which proper authorization has not been given.

Copyright

Computer software protected by copyright is not to be copied from, into, or by using campus computing facilities, except as permitted by law or by the contract with the owner of the copyright. The number of copies and distribution of copies may not be done in such a way that the number of simultaneous users in a department exceeds the number of original copies purchased.

Violations

An individual's computer use privileges may be suspended immediately upon the discovery of a possible violation of these rules. Such suspected violations will be confidentially reported to the appropriate administrator/supervisor. Violations of these rules will be dealt with in the same manner as violations of other college policies and may result in disciplinary review. In such a review, the full range of disciplinary sanctions is available including the loss of computer use privileges, dismissal from the college, and legal action. Violations of some of the above rules may constitute a criminal offense.

Additional Guidelines

Computer Services will establish more detailed guidelines, as needed for optimal use and administration at an enterprise level, for campuswide CNT systems, specific computers and/or computer labs. These guidelines may cover such issues as allowable connect time and disk space, type of services accessed, handling of unretrievable mail, responsibility for account approval and other items related to administering systems.