General Catalog 2013-2014 Updated
General Catalog 2013-2014 Updated > General Policies and Procedures > Student Computer Use Policy
Chattahoochee Technical College provides computer and peripheral systems to facilitate the support of research and education for their students and employees
In making for the use of its computers, Chattahoochee Technical College (CTC) considers its own stated educational mission, goals, and objectives. Electronic information research skills are now fundamental to preparation of citizens and future employees. Students, employees and the general public utilizing CTC provided computers are responsible for good behavior on-line just as they are in a classroom or other areas of the college. Use outside these stated goals will constitute a violation of CTC and Technical College System of Georgia (TCSG) policies, unless prior authorization is granted.
The following uses of CTC provided computers (in accordance with TCSG Policy II. C. 4) networks and Internet access are not permitted:
Georgia State Law
Using a computer without permission is theft of services and is illegal under state and federal laws. Federal law prohibits misuse of computer resources. In addition, the following specific computer crimes are prohibited by state law in Georgia (Code 16-9-90):
Disclaimer and Availability
Use of classroom computers is only available during scheduled classroom periods, and must be monitored by the instructor or designated staff member. Use outside of these times is prohibited.
Access to computers, computer labs, and Success Centers, are provided for students of CTC. Public access to computers is only provided in CTC Libraries, and access is at the discretion of the librarians. All information created, stored or transmitted by CTC computers or networks is subject to monitoring for compliance with applicable laws and policies.
Users should not expect files stored on CTC based computers to be private. Electronic messages and files stored on CTC based computers shall be treated like other premises that are temporarily assigned for individual use. Administrators may review files and messages in an effort to maintain system integrity and in an effort to insure that users are acting responsibly. Moreover, CTC officials shall cooperate with law enforcement officials who are properly authorized to search CTC computers and computer systems.
Occasional personal use of Internet connectivity and e-mail that do not involve any inappropriate use as described above may occur, if permitted by CTC. Any such use should be brief, infrequent, and shall not interfere with User’s performance, duties, coursework and/or responsibilities.
Users of CTC computers and computer systems are subject to the policies on the development of Intellectual Property. Any violation of this policy and rules may result in disciplinary action against the employee or student. When and where applicable, law enforcement agencies may be involved.
The foregoing standards are equally applicable to students and employees of CTC.
Passwords and Complexity
All passwords must be kept as secure as possible. Users must not compromise the privacy of their password by giving it to others or exposing it to public view. Passwords could be used to access other resources on Campus such as Banner, and Windows Accounts.
The use of passwords to gain access to the computer system or to secure specific files does not provide users with an expectation of privacy in the respective system or document.
The complexity and age requirements of passwords are as follows:
Violations of these policies incur the same types of disciplinary measures as violations of other CTC policies or state or federal laws, including criminal prosecution.
General Policies and Procedures
Powered by SmartCatalog IQ