AWC Technology Acceptable Use Policy

PURPOSE

The Arizona Western College computer network and technology facilities represent a commitment to provide a workplace with modern computing tools and services. Technology use is restricted to purposes consistent with the mission of the College.

PROCEDURE

1. Access

Access to the College’s computer and network systems is limited to current AWC students, faculty, staff, and approved guests who access these resources for legitimate research, teaching, learning, academic support and professional service, and whose use complies with these and other policies of the College. Students, faculty, staff and guests are responsible for all use of their accounts and/or equipment.

2. Restrictions

2.1 Federal Copyright Law

Students, faculty, staff, and approved guests using the College’s computer and network systems are subject to the United States Copyright Law of 1976, as amended (Title 17, United States Code, the “Copyright Act”). This legislation requires that users adhere to the restrictions that apply to the reproduction of software, as well as limit their copying to the boundaries permissible under the “fair use” doctrine.

2.2 Local, State and Federal Laws

All publications or broadcasts disseminated by the College shall conform to applicable regulations of the Federal Communications Commission and other applicable local, state, and federal laws. Students, faculty, staff, and approved guests are legally responsible for the contents of their communications. College facilities or properties may not be used for personal profit or for the profit of any private enterprise not for the benefit of the College.

2.3 Licensing Regulations

Arizona Western College has an established independent licensing program to regulate and restrict the use of the name, abbreviations, symbols, emblems, logos, mascots, slogans, and other terminology associated with the College. Unauthorized use of any of the fore stated representations may constitute trademark infringement.

3. Misuse of Privileges

The State of Arizona, local taxpayers and the U.S. Government provide Arizona Western College with computing and network resources. Misuse of these finite and critical resources threatens their continued availability. Justification for the support of this system suffers when misuse occurs.

3.1 Students, faculty, staff, and approved guests who misuse computer or network privileges are subject to the loss of computer resources and/or network access, and may also be subject to discipline and/or termination through College processes, as well as criminal or civil prosecution under federal and Arizona law.

Misuse of computing resources includes, but is not limited to, the following:

3.1.1 Using technology resources in a manner that violates the laws of the United States of America and/or the State of Arizona or that violates the policies of Arizona Western College.

3.1.2 Unauthorized access to the resources of the College’s computer systems or network (e.g., trying to log or break into accounts or computers for which you are not authorized).

3.1.3 Disruption or obstruction of authorized use of the network.

3.1.4 Failure to comply with all Computer Information Services Policies and Guidelines.

3.1.5 Knowingly causing excessive and unneeded use of College resources such as staff time, network bandwidth, or computer capacity.

3.1.6 Destroying the integrity of computer-based information or systems.

3.1.7 Unauthorized use, or attempted unauthorized use, of the College’s computer systems, computer networks, computer software, data files, or other computing facilities.

3.1.8 Compromising the privacy of users, including but not limited to misrepresenting or forging identities on, or through the use of, the College’s network.

3.1.9 Using College computer and networking systems for personal gain or commercial purposes unrelated to activities that support, and are consistent with, the educational purpose and mission of the College.

3.1.10 Using College computer networking systems and resources for obscene purposes or in a pervasively profane manner, including but not limited to use which may bring into public disrepute the College’s identity and image.

3.1.11 Theft, distribution, or reproduction without lawful authority of copies or reproductions of property or subject matter of any kind belonging to another, including but not limited to that which is protected by federal, state or international law governing patent, copyright, trademark, trade name, trade secrets, privacy, publicity, unfair competition, or licensing agreements.

3.1.12 Tampering with computer software or data files belonging to others, or using the resources in such a manner that would cause the College reasonably to believe that it would be subject to the risk of suit or regulatory action.

3.1.13 Using resources in a manner that is reasonably likely, or with the intention, to inflict mental harassment, to intimidate, or unreasonably to invade the privacy of any other individual.

3.1.14 Knowingly accessing, downloading, displaying or transmitting sexually explicit images or language, including accessing web sites that display such images or language, unless such action is taken in furtherance of legitimate research or educational purposes.

3.1.15 Accessing, downloading, displaying or transmitting material intended to provide information or instruction regarding how to access information the user is not authorized to access or how to disrupt the functioning of any computer system or network (i.e. “hacker websites”), unless such action is taken in furtherance of legitimate research or educational purposes.

3.1.16 Sharing College account passwords with others, or using networked machines to provide College network access to people or organizations that do not already have such access.

3.1.17 Using technology resources to post material on behalf of other parties, sharing personal access to the College’s resources with others, or using personal computers connected to the College’s network to mirror another site (i.e., to make a copy of someone else’s site).

3.1.18 Unauthorized installation of software on the College’s computers, networks or network devices.

3.1.19 Using technology resources to threaten any particular individual with violence or to engage in any activity that would naturally and directly tend to provoke acts of violence or a breach of the peace by the person to whom the conduct or remarks are addressed.

3.1.20 Using technology resources in a manner that would lead the College reasonably to believe that such use may subject it to the risk of suit, regulatory action, or liability of any kind under the laws of the United States of America or the State of Arizona forbidding the creation or maintenance of a hostile working or educational environment involving discrimination based on race, color, sex, religion, national origin, age, veterans’ status or disability, whether physical or mental, or which would cause the College reasonably to believe that such use of its property and resources may result in a determination that it is in breach of its legal duty to take reasonable steps to eliminate such attributes, conditions, or vestiges of a hostile educational environment and/or of discrimination.

4. Institutional Discipline

Any individual or group that:

uses technology to participate in conduct that is in violation of this policy,
uses technology to adversely affect the College’s pursuit of its educational objectives,
uses technology to violate or show disregard for the rights of individuals within the College community, or
uses technology to damage property
may be subject to institutional discipline. Officials charged with enforcement of these regulations shall have the authority in execution of such duties to immediately perform such acts as are required to maintain the security, well-being, and safety of College resources, the College community or any of its members.

5. Expectation of Privacy

The College’s administrators reserve the right to suspend or examine any account, computer or network access information, including the content of emails sent by or to any network user and the websites visited by any user. Users of this system do not have an expectation of privacy in their use of the College’s network or computer system. Any instance of misconduct will be reported to the appropriate College office.

6. Hold Harmless Agreement

The account holder agrees to be responsible for, and to indemnify and hold the Arizona Western College District Governing Board, Arizona Western College, and their officers and employees harmless from any claims, including attorney’s fees, resulting from the account holder’s acts or omissions which cause direct or indirect damage to another party.

Procedure 223.1
Policy #223

Knowledge Base Search

Enter your search below and click the apply button.

Title Summary Updated
Multi Factor Authentication  (MFA) What is MFA? Multi-factor authentication (MFA) is used to ensure that digital users are who they say they are by requiring that they provide at least two pieces of evidence to prove their identity.…
CRM Engage CRM Engage Engage for Faculty Refer students to resources. ENGAGE offers faculty members a user-friendly early alert tool that enables them to refer students to various campus resources or…
CRM Engage - Faculty CRM Engage for Faculty Refer students to resources. Open CRM Engage ENGAGE is a Customer Relationship Management (CRM) system designed to …
Voicemail Access your AWC Voicemail while Out of the Office There are two different ways employees can access their AWC voicemail box while away from their phone and/or outside of the campus…
Payment Plan Payment Plan Below are instructions for setting up a payment plan for tuition at Arizona Western College. You can find the payment plan schedule at http://mycollegepaymentplan.com/azwestern…
Technology Acceptable Use Policy AWC Technology Acceptable Use Policy PURPOSE The Arizona Western College computer network and technology facilities represent a commitment to provide a workplace with modern computing tools and…
Equipment Loan Agreement I agree that I am responsible for returning this equipment on time and in the same condition as when I borrowed it. I understand that: When I return the equipment, it will be inspected. If the…
Equipment Loan Agreement - Student Use Equipment Loan Agreement - Student Use I agree that I am responsible for returning this equipment on time and in the same condition as when I borrowed it. I understand that: If, after an ITSS…
Microsoft Outlook Microsoft Outlook What is Focused inbox? One of the new features in Outlook. Focused Inbox separates your inbox into two tabs – Focused and Other. Your most important e-mail messages are on the…
Microsoft OneDrive Microsoft OneDrive Why can I only share my documents with some people? The Office 365 subscription is limited to only share files with other individuals who have an AWC student or employee account…