Changes
m
Protected "Network User Agreement" [edit=sysop:move=sysop]
==Application of MCLA policies, and local, state, and federal laws and statutes.==
*Users are subject to sanctions for violating this or any other applicable MCLA policies, which sanctions may include loss of electronic accounts and/or access to MCLA electronic resources. Neither the existence nor the enforcement of this or any other MCLA policies precludes the enforcement of any federal, state or local law or regulation that pertain to the same or related subjects.
*MCLA reserves the right to limit or deny access in response to evidence of violations of federal, state or local laws.
==Use of computing systems and electronic resources==
*Authorized MCLA users will be assigned an account and given a user ID and password to gain individual access to MCLA computing systems, networks, and email.
*This account is not transferable, and may only be used by the individual to whom it has been assigned or, in the case of a system, network, or email special project account, for the purposes for which it was created.
==Responsibility for account security and for control of actions taken on MCLA accounts==
*Authorized MCLA users are responsible for maintaining the privacy of their individual user ID and password and for controlling their use.
*Users are responsible for all actions taken on their system, network, or email account and should take precautions against others obtaining unauthorized access to their individual accounts.
*If a user allows another individual access to his/her account, the user assumes full responsibility for the actions of this individual while logged into his/her account.
*If a user accepts custody of a system, network, or email special project account, he/she is responsible for maintaining and controlling its use as if it were an individual account.
==Intended use of MCLA systems and electronic resources==
*Accounts on MCLA's systems and other electronic resources are intended for academic or administrative purposes pertaining to MCLA.
*College equipment and electronic systems are public assets and are not to be used to support or engage in the private commercial activity of users.
*Use of the systems for game playing or email messaging to friends is permissible but these activities have a low priority and may be curtailed at the College's sole discretion to maintain the functionality of its systems.
*Electronic mail may be sent and received and personal information may be maintained (letters, resumes, etc.) as long as this use adheres to the Electronic Communications Policy.
*When a personal computer or other equipment is connected to the college computer network, all activity and use must be consistent with the College mission and adhere to the standards established in this Acceptable Use Policy.
*MCLA recognizes the evolving role of the internet as a means of access to essential information of all types. Employees are expected to adhere to the guidelines and policies related to their professional roles in gaining access to internet resources.
==Respect and responsibility for rights and security of other users.==
*MCLA electronic resources or electronic communications systems may not be used to harm or threaten to harm the safety or environmental security of any individual or individuals.
*All users must comply with MCLA policies and federal, state and local law regarding discriminatory harassment and the rights of others. Examples of violations include, but are not limited defamation, violation of privacy; intentionally placing a person or persons in reasonable fear of imminent physical harm; giving or causing to be given false reports of fire or other dangerous conditions; and harassment of any kind, including harassment or discrimination based on race, color, religion, sex, sexual orientation, national origin or citizenship status, age, disability, or veteran status.
==Information access and security==
*Users may not access and/or attempt to access computers, computer software, computer data or information, or networks, including files and mail, other than those to which authorized access has been granted without specific permission from the owner.
*When given, such permission shall not include permission to share the account information described in the section above, but may allow for collectively reading e-mail and sharing files using network services.
*Users may not copy the work of another student or user or violate a user's privacy by reading his or her files or gaining access to administrative data files.
*Users may not take advantage of another's inexperience or negligence to gain access to any computer account, data, software, or file for which he or she has not received explicit permission to access.
*Users are prohibited from attempting to circumvent or subvert any system's security through MCLA resources. Abuse of networks or computers at other sites using MCLA resources will be treated as an abuse of computing privileges at MCLA and a violation of this policy.
==System and network integrity and security==
*No user shall attempt to modify MCLA electronic resources, systems or network facilities or to crash systems.
*Users should avoid activities that unreasonably tax systems resources, including, but not limited to sending an excessive number of messages, either locally or over the Internet; participating in electronic chain letters: frivolously printing multiple copies of documents, files or data; excessive game playing; modifying system facilities, operating systems, or disk partitions; or damaging or vandalizing MCLA computing facilities, equipment, software, or computer files.
*Users should also be careful in subscribing to lists or downloading files to keep the local network and disk space from becoming choked. The College reserves the right at its discretion, to place limits on or to prohibit the downloading the materials for the purpose of preserving or enhancing the functionality of its systems.
*Each public computer on the system has had its software configured to be most useful for the majority of users. No user shall modify this system software or make the machine less useful to others.
*Theft or damage of computer hardware will be treated like theft or damage of any College-owned equipment.
*In addition to adhering to the general requirements of this policy, users in public laboratories must follow any directions given or procedures established by the lab supervisors when using laboratory facilities. In addition to these points, users in public labs should follow procedures established by the lab supervisors that ensure equitable access and security of the hardware.
==Adherence to copyright restrictions==
*Copyrighted computer software and other media such as films, recordings, CD ROMs and DVDs shall not be copied by any user of the College's electronic communications systems unless explicit permission to do so has been secured.
*The College has the duty to take resonable measures to assure compliance with federal laws that govern copyrights and adherence to license agreements that govern the College's right to use software. No person to whom this policy applies shall copy any college owned or licensed software unless specifically authorized to do soconsistently with applicable provisions fo law and the terms of any applicable license. This prohibition applies to downloading software on the network as well as to make physical disk copies.
*Violations of copyright laws have led to court cases and significant fines at several colleges. If there is any doubt as to the legal status of any software, users should check with the Computer Help Desk or the purchaser of the software to ascertain the legal status of any copyright and the terms of any applicable license.
*All College policies regarding academic dishonesty apply to academic work done electronically just as they do to more traditional papers or assignments. Plagiarism, including the copying and use of another's work without proper acknowledgment, is not permitted, nor is it permissible for anyone to allow another person to copy their work for the purposes of assessment.
==Privacy of Email Accounts and Personal Electronic Files==
*Users may expect to have personal electronic mail on MCLA electronic systems kept reasonably confidential. The College does not, however, guarantee the confidentiality of electronic mail or other documents or records, and some such documents and records, including email, may be public records subject to disclosure under the Public Records Statute: all such documents and records, including email, are subject to disclosure when required by provisions of state or federal law.
*Users should be sensitive to the inherent limitations of shared network resources in protecting privacy. Some examples of the risks to privacy include printing personal messages on a shared printer, leaving a message or account open on a computer in an open office space or public area, administrative review of your email account in the course of technical trouble shooting, and unauthorized access to the system.
*The College will not search specific personal electronic communications and computer files to seek evidence of malfeasance without notifying the user, but it reserves the right to do so and to permit others to do so in the exercise of a lawful authority whenever it judges such a search to be necessary or appropriate to investigate allegations of criminal conduct: to enforce policies regarding harassment and the safety of individuals; to prevent the posting of proprietary software or texts, images, or audio works in disregard of copyright restrictions or contractual obligations; to safeguard the integrity of computers, networks, and data, either at MCLA or elsewhere; to enforce the provisions of this policy; and to protect MCLA from liability for misuse of its electronic communications systems.
==System administrator authority==
*Authorized system administrators will manage network systems in a manner that is consistent with the system's importance for campus communication and the need for privacy of personal electronic mail messages.
*In connection with their role, authorized professional staff members may on occasion need access to or monitor parts of the system and thereby be given access to the contents of certain electronic mail messages.
*System administrators may take any actions they deem reasonably necessary or appropriate to preserve the state of files and other information relevant to an investigation.
*Administrators are not responsible for monitoring user activity or content on any network system. However, when they become aware of violations of this policy or of any applicable provisions of law, either in the normal course of duty or by means of a complaint, it is their responsibility to refer the matter to the appropriate authority for investigation and possible discipline or other action.
*To forestall an immediate threat to the security of a system or its users, system administrators may immediately suspend any person's right of access to any system while the incident is being investigated.
*There may be exceptional circumstances where MCLA may release electronic mail to other parties. These situations may include, but are not limited to the death of the account holder, when an absent or terminated employee has received mail associated with his/her job responsibilities, during the course of a criminal investigation by authorized legal authorities or in response to a civil subpoena.
*Users are subject to sanctions for violating this or any other applicable MCLA policies, which sanctions may include loss of electronic accounts and/or access to MCLA electronic resources. Neither the existence nor the enforcement of this or any other MCLA policies precludes the enforcement of any federal, state or local law or regulation that pertain to the same or related subjects.
*MCLA reserves the right to limit or deny access in response to evidence of violations of federal, state or local laws.
==Use of computing systems and electronic resources==
*Authorized MCLA users will be assigned an account and given a user ID and password to gain individual access to MCLA computing systems, networks, and email.
*This account is not transferable, and may only be used by the individual to whom it has been assigned or, in the case of a system, network, or email special project account, for the purposes for which it was created.
==Responsibility for account security and for control of actions taken on MCLA accounts==
*Authorized MCLA users are responsible for maintaining the privacy of their individual user ID and password and for controlling their use.
*Users are responsible for all actions taken on their system, network, or email account and should take precautions against others obtaining unauthorized access to their individual accounts.
*If a user allows another individual access to his/her account, the user assumes full responsibility for the actions of this individual while logged into his/her account.
*If a user accepts custody of a system, network, or email special project account, he/she is responsible for maintaining and controlling its use as if it were an individual account.
==Intended use of MCLA systems and electronic resources==
*Accounts on MCLA's systems and other electronic resources are intended for academic or administrative purposes pertaining to MCLA.
*College equipment and electronic systems are public assets and are not to be used to support or engage in the private commercial activity of users.
*Use of the systems for game playing or email messaging to friends is permissible but these activities have a low priority and may be curtailed at the College's sole discretion to maintain the functionality of its systems.
*Electronic mail may be sent and received and personal information may be maintained (letters, resumes, etc.) as long as this use adheres to the Electronic Communications Policy.
*When a personal computer or other equipment is connected to the college computer network, all activity and use must be consistent with the College mission and adhere to the standards established in this Acceptable Use Policy.
*MCLA recognizes the evolving role of the internet as a means of access to essential information of all types. Employees are expected to adhere to the guidelines and policies related to their professional roles in gaining access to internet resources.
==Respect and responsibility for rights and security of other users.==
*MCLA electronic resources or electronic communications systems may not be used to harm or threaten to harm the safety or environmental security of any individual or individuals.
*All users must comply with MCLA policies and federal, state and local law regarding discriminatory harassment and the rights of others. Examples of violations include, but are not limited defamation, violation of privacy; intentionally placing a person or persons in reasonable fear of imminent physical harm; giving or causing to be given false reports of fire or other dangerous conditions; and harassment of any kind, including harassment or discrimination based on race, color, religion, sex, sexual orientation, national origin or citizenship status, age, disability, or veteran status.
==Information access and security==
*Users may not access and/or attempt to access computers, computer software, computer data or information, or networks, including files and mail, other than those to which authorized access has been granted without specific permission from the owner.
*When given, such permission shall not include permission to share the account information described in the section above, but may allow for collectively reading e-mail and sharing files using network services.
*Users may not copy the work of another student or user or violate a user's privacy by reading his or her files or gaining access to administrative data files.
*Users may not take advantage of another's inexperience or negligence to gain access to any computer account, data, software, or file for which he or she has not received explicit permission to access.
*Users are prohibited from attempting to circumvent or subvert any system's security through MCLA resources. Abuse of networks or computers at other sites using MCLA resources will be treated as an abuse of computing privileges at MCLA and a violation of this policy.
==System and network integrity and security==
*No user shall attempt to modify MCLA electronic resources, systems or network facilities or to crash systems.
*Users should avoid activities that unreasonably tax systems resources, including, but not limited to sending an excessive number of messages, either locally or over the Internet; participating in electronic chain letters: frivolously printing multiple copies of documents, files or data; excessive game playing; modifying system facilities, operating systems, or disk partitions; or damaging or vandalizing MCLA computing facilities, equipment, software, or computer files.
*Users should also be careful in subscribing to lists or downloading files to keep the local network and disk space from becoming choked. The College reserves the right at its discretion, to place limits on or to prohibit the downloading the materials for the purpose of preserving or enhancing the functionality of its systems.
*Each public computer on the system has had its software configured to be most useful for the majority of users. No user shall modify this system software or make the machine less useful to others.
*Theft or damage of computer hardware will be treated like theft or damage of any College-owned equipment.
*In addition to adhering to the general requirements of this policy, users in public laboratories must follow any directions given or procedures established by the lab supervisors when using laboratory facilities. In addition to these points, users in public labs should follow procedures established by the lab supervisors that ensure equitable access and security of the hardware.
==Adherence to copyright restrictions==
*Copyrighted computer software and other media such as films, recordings, CD ROMs and DVDs shall not be copied by any user of the College's electronic communications systems unless explicit permission to do so has been secured.
*The College has the duty to take resonable measures to assure compliance with federal laws that govern copyrights and adherence to license agreements that govern the College's right to use software. No person to whom this policy applies shall copy any college owned or licensed software unless specifically authorized to do soconsistently with applicable provisions fo law and the terms of any applicable license. This prohibition applies to downloading software on the network as well as to make physical disk copies.
*Violations of copyright laws have led to court cases and significant fines at several colleges. If there is any doubt as to the legal status of any software, users should check with the Computer Help Desk or the purchaser of the software to ascertain the legal status of any copyright and the terms of any applicable license.
*All College policies regarding academic dishonesty apply to academic work done electronically just as they do to more traditional papers or assignments. Plagiarism, including the copying and use of another's work without proper acknowledgment, is not permitted, nor is it permissible for anyone to allow another person to copy their work for the purposes of assessment.
==Privacy of Email Accounts and Personal Electronic Files==
*Users may expect to have personal electronic mail on MCLA electronic systems kept reasonably confidential. The College does not, however, guarantee the confidentiality of electronic mail or other documents or records, and some such documents and records, including email, may be public records subject to disclosure under the Public Records Statute: all such documents and records, including email, are subject to disclosure when required by provisions of state or federal law.
*Users should be sensitive to the inherent limitations of shared network resources in protecting privacy. Some examples of the risks to privacy include printing personal messages on a shared printer, leaving a message or account open on a computer in an open office space or public area, administrative review of your email account in the course of technical trouble shooting, and unauthorized access to the system.
*The College will not search specific personal electronic communications and computer files to seek evidence of malfeasance without notifying the user, but it reserves the right to do so and to permit others to do so in the exercise of a lawful authority whenever it judges such a search to be necessary or appropriate to investigate allegations of criminal conduct: to enforce policies regarding harassment and the safety of individuals; to prevent the posting of proprietary software or texts, images, or audio works in disregard of copyright restrictions or contractual obligations; to safeguard the integrity of computers, networks, and data, either at MCLA or elsewhere; to enforce the provisions of this policy; and to protect MCLA from liability for misuse of its electronic communications systems.
==System administrator authority==
*Authorized system administrators will manage network systems in a manner that is consistent with the system's importance for campus communication and the need for privacy of personal electronic mail messages.
*In connection with their role, authorized professional staff members may on occasion need access to or monitor parts of the system and thereby be given access to the contents of certain electronic mail messages.
*System administrators may take any actions they deem reasonably necessary or appropriate to preserve the state of files and other information relevant to an investigation.
*Administrators are not responsible for monitoring user activity or content on any network system. However, when they become aware of violations of this policy or of any applicable provisions of law, either in the normal course of duty or by means of a complaint, it is their responsibility to refer the matter to the appropriate authority for investigation and possible discipline or other action.
*To forestall an immediate threat to the security of a system or its users, system administrators may immediately suspend any person's right of access to any system while the incident is being investigated.
*There may be exceptional circumstances where MCLA may release electronic mail to other parties. These situations may include, but are not limited to the death of the account holder, when an absent or terminated employee has received mail associated with his/her job responsibilities, during the course of a criminal investigation by authorized legal authorities or in response to a civil subpoena.