Board of Trustees Manual

regarding time, place, and manner. E. Students have the right to inquire about and to propose improvements in policies, regulations, and procedures affecting the welfare of students through establishedstudent government procedures, campus committees, and College staff. F Students shall have access to their educational records and the College will protect student educational records from dissemination or transferability without astudent’s consent. In this regard, it is College policy to comply fully with the provision and regulations of the Family Educational Rights and Privacy Act (FERPA) of 1974. G. Students have the right to an impartial hearing and the right of appeal. 3. Prohibited Conduct Academic integrity violations include but are not limited to the following types of conduct: A. Cheating on placement tests, exams, tests, and quizzes. Examples of cheating include but are not limited to: 1) giving or accepting unauthorized exam material or using illegitimate sources of information, 2) dishonestly obtaining copies of an exam or providing or receiving information about an exam, 3) exchanging information during an exam or copying from another’s paper, 4) using “crib sheets” or any other unauthorized aids including all electronic retrieval devices or materials during an exam, and 5) taking an exam in the name of someone else B. Plagiarism is the use of ideas or work of another without sufficient acknowledgment that the material is not one’s own. Examples of plagiarism include 1) submitting material created by another as one’s own work or including passages of another author without giving due credit and 2) submitting purchased material, in any form of communication, as one’s own work. C. Computers should be used for academic purposes only. Examples of misuse of computers include: 1) illegal copying of commercial software or data protected by copyright orspecial license, 2) unauthorized access to computer files, 3) copying/pasting, in any form,another student’s exam or homework files and submitting as one’s own, 4) planting viruses on local or network drives, and 3) sharing one’s own or using the account number of another to access the system. D. Unauthorized collaboration with other individuals in the completion ofcourse assignments. E. Using fraudulent methods in laboratory, studio, special projects, or field work.

Made with FlippingBook - Online catalogs