Example: It is unacceptable to use resources you have not been specifically authorized to use, t o use someone else’s acc ount and password or share your account and password with someone else, to access files, data, or processes without authorization, to access files or data that are not publicly available, to purposely look for or exploit security flaws to gain system or data access, to obstruct the operation of the College’s com puter systems, to insert inappropriate objects into disk drives, to tamper with cables, to add or delete files or software without authorization, to change computer or network settings without authorization, to display or print materials of sexually explicit or discriminatory nature, to use information technology to violate any other college policy or procedure, to use information technology for illegal or criminal purposes that violate federal, state, or local laws.
communications not intended for you, to use computing or network resources for commercial advertising or other commercial purposes, to use computing or network resources for the promotion of other external organizations not related to the mission of the College, to attempt to circumvent security mechanisms, to use privileged access for other than official duties, to use former privileges after graduation, transfer, or termination. Protect the access and integrity of information technology resources and the privacy of others. Example: It is unacceptable to access or attempt to access another individual’s password or data without explicit authorization, to access or copy another user’s electronic mail, data, programs, or other files without permission, to use obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful lan- guage, to use threatening, intimidating or vulgar behavior toward lab assistants, work study students or staff, to continue sending email messages to someone after being told to stop, to post derogatory information or statements about a person. Abide by applicable laws and college policies, and respect the copyrights and intellectual property rights of others, including the legal use of copyrighted software.
Use information technology resources for their intended purpose .
Example: It is unacceptable to send forged email,
to use electronic resources for harassment or stalking other individuals, to send bomb threats or hoax messages, to send chain letters that may interfere with the system’s efficiency, to intercept or monitor any network
292
www.lbwcc.edu
2022-23 College Catalog and Student Handbook
Made with FlippingBook - professional solution for displaying marketing and sales documents online