Copies of this ÃÈ·­µ¼º½ Computer Usage Policy can be found in the college catalog and the employee's handbook. Each user who uses the ÃÈ·­µ¼º½ computing facilities and resources is bound by this policy.

Violation of these policies will be dealt with in the same manner as violations of other College policies and may result in disciplinary review. In such a review the full range of disciplinary sanctions is available including the loss of computer use privileges, dismissal from the College, and legal action. Violations of some of the policies below may constitute a criminal offense.

 ÃÈ·­µ¼º½ makes computer accounts and resources available for student use in the pursuit of instructional goals, and to faculty and staff to support the institution's mission.

The Computer Usage Policy applies to all users of the ÃÈ·­µ¼º½ computing resources. This includes administrators, faculty, staff, students and guests on District equipment and networks.

Computer accounts and computer access are privileges, and require the individual user to act responsibly. By using the ÃÈ·­µ¼º½ accounts, users have agreed to respect the rights of other users and accounts, to use the account only for school-related purposes, and to safeguard the integrity of the system and its related physical resources. Users have further agreed to observe all relevant laws, regulations, policies and contractual obligations of the College.

Other organizations operating computing and network facilities that are reachable via the City College network may have their own policies governing the use of those resources. When accessing remote resources from City College facilities, users are responsible for obeying both the policies set forth in this document and the policies of the other organizations. It is the user's responsibility to be informed of the policies of other outside organizations to which they establish a computer link.

 ÃÈ·­µ¼º½ does NOT guarantee or warranty the confidentiality of user files, including e-mail, except where legally or contractually protected. It is the practice of Information Technology Services (ITS) to respect the confidential nature of user files, but the ITS Department reserves the right to view or alter user files when it is necessary. Any ITS employee must have permission from the appropriate Vice Chancellor prior to investigating or modifying a user file.

User files may also be subject to search under court order if such files are suspected of containing information that could be used as evidence in a Court of law. Student files as kept on ITS facilities are considered educational records as covered by the Family Educational Rights and Privacy Act of 1974 (Title 20, Section 1232(g) of the United States Code, also referred to as the Buckley Amendment).

In addition, a system administrator may access user files as required to protect the integrity of the computer system. For example, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged.

All existing federal and state laws and College regulations apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct.

Misuse of computing, networking or information resources may result in the loss of computing and/or network privileges without notice. This includes both those that ITS administers, and those that may exist in other departments associated with City College of San Francisco and connected to its network. Deliberate violations of these policies will be dealt with in the same manner as violations of other college policies and may result in disciplinary sanctions including, but not limited to, loss of computer use privileges, dismissal from the college, and/or appropriate legal action.

Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable College or campus policies, procedures, or collective bargaining agreements. Complaints alleging misuse of the College's computing resources will be directed to those responsible for taking appropriate disciplinary action as specified under Enforcement below. Illegal reproduction of software protected by U.S. Copyright Law is subject to civil damages and criminal penalties including fines and imprisonment (See ÃÈ·­µ¼º½ Policy Manual 8.10).

All users must follow all relevant copyright laws. US Copyright law governs printing, scanning, reproduction, and distribution of software and other material in print or online, including text, fonts, graphics, sound, video and others The End User License Agreement (EULA) for a product specifies the conditions under which a user may copy or install the product. The EULA also specifies the number of simultaneous users licensed to use the product.

Computer users must follow Unlawful Discrimination and Harassment Policy including those governing "sexual harassment" & "hostile education environment".

All computer users must follow the Unlawful Discrimination and Harassment Policy as stated in the ÃÈ·­µ¼º½ "Equal Opportunity Statement" listed in the catalog (EDUCATION CODE SECTION 66270-66271.1).

Any user who files a complaint or otherwise protests against discrimination has the right to be free from any retaliatory action because of the complaint or protest. The ÃÈ·­µ¼º½ administrator who receives a complaint of discrimination should inform the complainant of this right and that the complainant may file an additional complaint if he or she experiences retaliatory conduct.

Examples of misuse include, but are not limited to, the following activities:

Breaking into another person's account

  • Using a computer account that you are not authorized to use by the ITS Department. Knowingly or carelessly allowing someone else to use your account.
  • Obtaining a password for a computer account that is not your own account.
  • Using the Campus Network to gain unauthorized access to any computer systems.
  • Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating running and/or distributing programs that are designed to identify security loopholes and/or decrypt intentionally secure data.
  • Masking the identity of an account or machine.

Harassment

  • Using e-mail to harass others.
  • Posting on Internet services information that may be slanderous or defamatory in nature.
  • Displaying sexually explicit, graphically disturbing, or sexually harassing images or text in a public computer facility, or location that can potentially be in view of other individuals, except when directly related to ÃÈ·­µ¼º½ coursework.

Commercial use

  • Using your account for any activity that is commercial in nature. Commercial activities include, but are not limited to, consulting, typing services, and developing software for sale. Account use to purchase textbooks and course materials, etc. is permitted

Copyright

  • Violating terms of applicable software licensing agreements or copyright laws.

Changing files

  • Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner. Files owned by individual users are to be considered private property, whether or not they are accessible by other users.
  • Modifying of another user's files, which is illegal under California Computer Crime Laws.

System misuse

  • Sending mass e-mail to a large number of people on the system. It is acceptable, however, to use organization or department mailing lists, listservs, to send e-mail to groups of people on the system.
  • Knowingly or carelessly performing an act that will interfere with the normal operation of computer systems, including running, or installing, or giving to another user a program intended to damage or to place excessive load on a computer system or network. This includes programs known as computer viruses and worms.
  • Deliberately wasting/overloading system resources, such as:
    • Printing resources - This includes, but is not limited to, printing multiple copies of a document or printing out large documents that may be available online, or that might impact significantly on other users printing resources.
    • System file space - Storing or transferring of large files or using a large amount of file space in the temporary file system area which degrades overall system performance or preclude other users right of access to disk storage also constitute misuse of resources. The ITS staff may remove or compress disk files that are consuming large amounts of disk space, with or without prior notification.
  • Batch jobs or background tasks should be consistent with individual academic goals or institutional academic goals. Jobs that do not coincide with the academic goals of the institution and/or cause IT system problems may be "killed" without warning, and the owner of the job will be notified.
  • Any files stored in the temporary file systems are not backed up and are subject to deletion at any time. Users' file names and directory names starting with a period or another punctuation or special character will be deleted immediately.

After the appropriate investigation and/or hearing procedures have been followed, the penalties below may be imposed under one or more of the following: City College regulations, California law, the laws of the United States.

  • Infractions of the ÃÈ·­µ¼º½ Computer Policy may result in the temporary or permanent loss or modification of computer account and resource access privileges, and may be subject to further disciplinary action.
  • Offenses which may be in violation of local, state or federal laws will result in the immediate loss of all computer account and resource privileges, and will be reported to the appropriate College or institution involved and law enforcement authorities.
  • An individual's computer use privileges may be suspended immediately upon the discovery of a possible violation of these policies. Such suspected violations will be confidentially reported to the appropriate supervisors or instructor and/or department chair.

This document is subject to revision. The Technology Committee (formerly ITAC) approves changes to the guidelines, as needed.