View Site Map!
 AWC INDEX
a b c d e f g h i j k l m
n o p q r s t u v w x y z
Header Photo
Guidelines For Personal Websites
Web Advisor

SECTION LINKS

+ Information Technology 


QUICK LINKS

Icon Web Advisor WebAdvisor/Register
Icon Class Schedule Schedule of Classes
Academic Library Academic Library
Course Catalog Icon Course Catalog
Tuition Icon Tuition & Fees
Blackboard Icon Blackboard
Directory Icon Directory
Webmail Icon Webmail
Webmail Icon Help

AWC Technology Acceptable Use policy

 

PURPOSE

Provide a workplace with modern computing tools and services. Technology use is restricted to purposes consistent with the mission of the College.

PROCEDURE

1. Access

Access to the College’s computer and network systems is limited to current AWC students, faculty, staff, and approved guests who access these resources for legitimate research, teaching, learning, academic support and professional service, and whose use complies with these and other policies of the College. Students, faculty, staff and approved guests are responsible for all use of their accounts and/or equipment.

2. Restrictions

2.1 Federal Copyright Law

Students, faculty, staff and approved guests using the College’s computer and network systems are subject to the United States Copyright Law October 2008, as amended (Title 17, United States Code, the “Copyright Act”). This legislation requires that users adhere to the restrictions that apply to the reproduction of software, as well as limit their copying to the boundaries permissible under the “fair use” doctrine.

2.2 Local, State and Federal Laws

All publications or broadcasts disseminated by the College shall conform to applicable regulations of the Federal Communications Commission and other applicable local, state, and federal laws. Students, faculty, staff, and approved guests are legally responsible for the contents of their communications. College facilities or properties may not be used for personal profit or for the profit of any private enterprise not for the benefit of the College.

2.3 Licensing Regulations

Arizona Western College has an established independent licensing program to regulate and restrict the use of the name, abbreviations, symbols, emblems, logos, mascots, slogans, and other terminology associated with the College. Unauthorized use of any of the forestated representations may constitute trademark infringement.

3. Misuse of Privileges

The State of Arizona, local taxpayers and the U. S. Government provide Arizona Western College with computing and network resources. Misuse of these finite and critical resources threatens their continued availability. Justification for the support of this system suffers when misuse occurs.

3.1 Students, faculty, staff, and approved guests who misuse computer or network privileges are subject to the loss of computer resources and/or network access, and may also be subject to discipline and/or termination through College processes, as well as criminal or civil prosecution under federal and Arizona law. Misuse of computing resources includes, but is not limited to, the following:

Misuse of computing resources includes, but is not limited to, the following:

3.1.1 Using technology resources in a manner that violates the laws of the United States of America and/or the State of Arizona or that violates the policies of Arizona Western College.

3.1.2 Unauthorized access to the resources of the College’s computer systems or network (e.g., trying to log or break into accounts or computers for which you are not authorized).

3.1.3 Disruption or obstruction of authorized use of the network.

3.1.4 Failure to comply with all Technology and Network Services (TANS) Policies and Guidelines.

3.1.5 Knowingly causing excessive and unneeded use of College resources such as staff time, network bandwidth, or computer capacity.

3.1.6 Destroying the integrity of computer-based information or systems.

3.1.7 Unauthorized use, or attempted unauthorized use, of the College's computer systems, computer networks, computer software, data files, or other computing facilities.

3.1.8 Compromising the privacy of users, including but not limited to misrepresenting or forging identities on, or through the use of, the College's network.

3.1.9 Using College computer and networking systems for personal gain or commercial purposes unrelated to activities that support, and are consistent with, the educational purpose and mission of the College.

3.1.10 Using College computer networking systems and resources for obscene purposes or in a pervasively profane manner, including but not limited to use which may bring into public disrepute the College's identity and image.

3.1.11 Theft, distribution, or reproduction without lawful authority of copies or reproductions of property or subject matter of any kind belonging to another, including but not limited to that which is protected by federal, state or international law governing patent, copyright, trademark, trade name, trade secrets, privacy, publicity, unfair competition, or licensing agreements.

3.1.12 Tampering with computer software or data files belonging to others, or using the resources in such a manner that would cause the College reasonably to believe that it would be subject to the risk of suit or regulatory action.

3.1.13 Using resources in a manner that is reasonably likely, or with the intention, to inflict mental harassment, to intimidate, or unreasonably to invade the privacy of any other individual.

3.1.14 Knowingly accessing, downloading, displaying or transmitting sexually explicit images or language, including accessing web sites that display such images or language, unless such action is taken in furtherance of legitimate research or educational purposes.

3.1.15 Accessing, downloading, displaying or transmitting material intended to provide information or instruction regarding how to access information the user is not authorized to access or how to disrupt the functioning of any computer system or network (i.e., “hacker websites”), unless such action is taken in furtherance of legitimate research or educational purposes.

3.1.16 Sharing College account passwords with others, or using networked machines to provide College network access to people or organizations that do not already have such access.

3.1.17 Using technology resources to post material on behalf of other parties, sharing personal access to the College’s resources with others, or using personal computers connected to the College’s network to mirror another site (i.e., to make a copy of someone else’s site).

3.1.18 Unauthorized installation of software on the College’s computers, networks or network devices.

3.1.19 Using technology resources to threaten any particular individual with violence or to engage in any activity that would naturally and directly tend to provoke acts of violence or a breach of the peace by the person to whom the conduct or remarks are addressed.

3.1.20 Using technology resources in a manner that leads the College to reasonably believe that such use may subject it to the risk of suit, regulatory action, or liability of any kind under Federal or state laws forbidding the creation or maintenance of a hostile working or educational environment involving discrimination.

4. Institutional Discipline

Any individual or group that uses technology to:

4.1 participate in conduct that is in violation of this policy,

4.2 adversely affect the College’s pursuit of its educational objectives,

4.3 violate or show disregard for the rights of individuals within the College community, or

4.4 damage property may be subject to institutional discipline. Officials charged with enforcement of these regulations shall have the authority in execution of such duties to immediately perform such acts as are required to maintain the security, well-being, and safety of College resources, the College community or any of its members.

5. Expectation of Privacy

The College’s administrators reserve the right to suspend or examine any account, computer or network access information, including the content of e-mails sent by or to any network user and the websites visited by any user. Users of this system do not have an expectation of privacy in their use of the College’s network or computer system. Any instance of misconduct will be reported to the appropriate College office.

6. Hold Harmless Agreement

The account holder agrees to be responsible for, and to indemnify and hold the Arizona Western College District Governing Board, Arizona Western College, and their officers and employees harmless from any claims, including attorney’s fees, resulting from the account holder’s acts or omissions which cause direct or indirect damage to another party.

Procedure 223.1

Future Students | Current Students | Distance Education | Community Partners | AWC Foundation
About AWC | Admissions | Financial Aid | Online Services | Athletics | Student Life | Employment
 © 2014 Arizona Western College Disclaimers | EEOC | Site Map | Comments