Crosby Hall

Student Computer Security

POLICY OF BOARD OF TRUSTEES OF PEARL RIVER COMMUNITY COLLEGE Tuesday, July 8, 1997 1 Wednesday, June 20, 2001 Student Affairs

Pearl River Community College will provide students with access to computers, computer systems, and computer networks. Each user must agree to the guidelines and rules prior to receiving this access.

  1. Students utilizing the computer system and network must accept the responsibilities and obligations for ethical use that is mandated by Pearl River Community College, state government policies, laws, and other applicable governing policies.
  2. Use of Pearl River Community College’s computer system and network will be subject to monitoring for security and management purposes. Users must be aware of this monitoring and management and agree to this practice.
  3. Users must accept responsibility for their logins, passwords, and user IDs—these must be kept confidential. Each user is responsible for all transactions occurring during the use of his or her login and password.
  4. If any user suspects that his or her login and password have been used by another person, immediately notify the Pearl River Community College Department of Information Technology; they will investigate the problem and decide what course to follow.
  5. The computer network system can be used for official college business only, not for personal gain, commercial purposes, or illegal activity.
  6. Users will not attempt to modify the computer systems in any unauthorized manner.
  7. Copying of copyrighted software or other materials may be a violation of the copyright laws and is not permitted. Users who violate copyright laws are acting outside the scope of Pearl River Community College and will be held personally responsible and liable for these violations. Pearl River Community College accepts no responsibility for such activities.
  8. Files that are owned by someone else should not be accessed without the owner’s permission; viewing or using files that do not belong to you is an invasion of that person’s privacy. Breaking into accounts or bypassing security is not permitted.
  9. If it is determined that a user is in violation of the guidelines, they may be subject to restrictions, banned from use of the network, and/or disciplinary action.
  10. Information describing the use of e-mail and internet software will be provided by Pearl River Community College.
  11. Security infractions with an e-mail account should be reported to the Division of Information Technology immediately.
  12. Student e-mail accounts will be removed when enrollment status is terminated with the College.
  13. It is the responsibility of all e-mail account holders to abide by the Pearl River Community College Computer Security Policy.
  14. Users need to be aware that e-mail is public domain and is not a good way to have a private conversation.
  15. Adherence to these rules and regulations is critical for computer utilization services and information security.

I have read and agree to abide by the procedures that have been established by Pearl River
Community College.