Page 46 - 2016 Iowa Central Student Handbook
P. 46

Electronic Communications: The servers and accounts, in which the electronic communications of
       employees and students are sent and received, are College property. Appropriate use of electronic
       communications for college related business, activities, and promotion of the College community is
       expected. Being the property of the College, College officials have access to such correspondence.
       All Family Educational Right to Privacy Act (FERPA) Laws and Regulations apply to the dissemination of
       information regarding students via the electronic communication. Electronic Communication regarding
       personnel matters is considered confidential. The College will not be held liable for individual use of
       electronic communications.
       Internet: The World Wide Web (WWW or Web) provides an opportunity for the College to have a
       presence in the Internet community for public relations, to provide information, and for educational
       purposes. The College’s “Home Page” (or pages) on the Web represent the College’s programs,
       policies, and image to the world. The College will recommend standards for College Web pages on
       the Internet, but will not be liable for the content of personal web pages.
       The purpose of allowing or providing internet access through Iowa Central’s computer system is to
       facilitate communications and research in support of the public purpose and mission of the College.
       Users have the responsibility to act consistent with and to enhance the public purpose of Iowa Central
       including the mission and polices of the College.
       Users must comply with the following guidelines for using these resources through the College’s computer system:
         a. Users accessing these resources are representing the College. All communications should be
           for or related to the purposes and mission of Iowa Central;
         b. Users are responsible for ensuring that these resources are used in an effective, ethical, and lawful manner;
         c.  Users are responsible for the content of all text, audio, or images placed or sent over the internet.
           Messages that are inconsistent the Iowa Central Technology Use Policy are prohibited, including
           but not limited to, fraudulent, harassing, or obscene messages;
         d. All messages communicated on the Iowa Central computer system should have the user’s name
           attached. No messages will be transmitted under an assumed name;
         e. Information published on the internet through the Iowa Central computer system should not
           violate or infringe upon the rights of others;
         f.  Unacceptable uses:
            -  Uses that violate any local, state, or federal statute;
            -  Uses that interfere with the user’s duties and responsibilities to the College, including but not
             limited to excessive game playing which impairs the academic work of other students and/
             or employee productivity and excessive web surfing which is not related to course work or
             College business which impairs other persons productivity;
            -  Accessing, uploading, downloading, or distributing any text, graphic, video, or audio clip that
             is obscene, sexually explicit, profane, or harassing in nature;
            -  Using the network to conduct unauthorized business or solicit services, and/or develop,
             introduce, or circulate inflammatory comments or subjects;
            -  Accessing, uploading, downloading, or distributing any text, graphic, video, or audio clip that is for
             personal gain or personal entertainment, including, but not limited to, game playing and gambling;
            -  Attempts or uses that interfere with or disrupt any network services-disruptions include, but
             are not limited to, introducing or launching computer viruses, worms, Trojans, and other rogue
             programs, and unauthorized entry into any other machine or system (hacking);
            -  Responding to solicitations, surveys, or other requests that affect current or future services
             available via electronic media without prior approval from the College’s network administrator;
            -  Attempting or gaining access to information that is private or protected, such as network
             privileges to which the user is not entitled;
            -  Unauthorized software installation on college computers;
            -  Excessive storage of personal documents, pictures, etc. on network servers (web drives/email)—
             excessive storage is defined as storage not in compliance with the College’s technology
             procedures for size limitations;
            -  Network storage of personal media files (mp3, video);
            -  Unauthorized alteration of system configuration, including but not limited to: Interrupting
             programs that protect data or secure systems, BIOS settings, and Operating System settings;
            -  Uses that violate any other provisions of the College’s Technology Use Policy; or
   41   42   43   44   45   46   47   48   49   50   51