Page 39 - 2016 Iowa Central Student Handbook
P. 39

b. Collaborating on a written assignment without the specific approval of the instructor;
             c. Borrowing materials from any source (professional or amateur) and turning them in as original; or
             d. Failure to acknowledge through appropriate citations any words, ideas, research, graphics,
               etc., produced by someone other than the person claiming authorship.
           2. Cheating - Dishonest acts committed while being tested or evaluated:
             a. Copying from another person’s tests or assignments;
             b. Using unauthorized test aids such as notes, drawings, books, etc., during an examination;
             c. Submitting a paper which was turned in to another instructor in another class to fulfill part of that
               course’s required work-unless agreed upon ahead of time by the instructors of the second course;
             d. Aiding another student in dishonesty such as producing written work or sharing information
               during a test period;
             e. Fabricating research or source materials; or
             f. Stealing, buying or somehow obtaining a test from an instructor’s work or computer files.
       b. Computer Misuse - The following information sets forth the Computer Use Policy for Iowa Central
         Community College. Each individual who obtains a network/email count, or uses the computers and
         network resources made available by Iowa Central Community College, must understand that he/she
         is accountable for the policies set forth in this document. In addition, users assume responsibility for:
            - Protection of his/her passwords;
            - Reporting any breech of system security;
            - Reporting unauthorized use of his/her accounts;
            - Changing his/her passwords on a regular basis;
            - Frequently making backup copies of your work to ensure against loss; and
            - Clearly labeling works and opinions as his/her own before they are widely distributed.
         Iowa Central Community College’s computer facilities and services are offered in support of teaching,
         learning and research. Access to the computer systems and networks owned and operated by Iowa
         Central impose certain responsibilities upon users, in accordance with College policy and local,
         state and federal law. Users accept the responsibility for utilizing services in ways that are ethical,
         that demonstrate academic integrity and respect for others who share this resource. This policy
         is established in an effort to help users understand what is expected of them. It sets guidelines
         regarding the issues of privacy and respect for property, ownership of data, system security, and
         misuse of the system.
         The following constitute violations of the computer conduct policy:
           1. Intentionally disrupting access of other students, faculty, or staff members to College computer
             and other technological resources;
           2. Knowingly obtaining without authorization access to a computer account assigned to another person;
           3. Knowingly using an account belonging to another student, faculty, staff, department, or
             organization for other than its intended purpose without permission from the owner;
           4. Intentionally using any unauthorized account;
           5. Using College computer equipment to interfere with the lawful rights of others by such activities
             as falsifying or altering records, creating fraudulent documents, damaging programs belonging to
             another, sending harassing or threatening material, or duplicating copyrighted software unlawfully;
           6. Using computer or network services for commercial purposes;
           7. Excessive game playing which impairs the academic work of other students;
           8. Excessive WEB surfing not related to College course work and/or assignments;
           9. Sending excessive email or messages locally or over the network such as chain letters,
             advertisements or solicitations;
          10. Knowingly installing or running a program that will damage or place an undue burden on the system;
          11. Knowingly acting in a manner that will disrupt normal operations of computers of the network;
          12. Using computer or network services in a way that violates copyrights, patent protections or
             license agreements;
          13. Unauthorized copying of any software (including operating systems, programs, applications,
             databases, or code) which is licensed or protected by copyright;
          14. Gaining unauthorized access to information that is private or protected, or attempting to do so;
          15. Running programs that attempt to identify passwords or codes;
          16. Interrupting programs that protect data or secure systems, or attempting to do so;
          17. Monitoring or tampering with another person’s email;
          18. Copying, changing, or deleting another person’s work;
          19. Using another person’s password or allowing others to use yours;
   34   35   36   37   38   39   40   41   42   43   44