EvCC Computers and Networks Acceptable Use Policy
The use of Everett Community College (EvCC) computers and network facilities shall be solely for facilitating the processing and exchange of information in furtherance of education and research. Use shall be consistent with the mission, policies, and procedures of EvCC and applicable federal and state law.
Users shall respect the rights and property of others and not improperly access or attempt to access, misuse, or misappropriate information/files. Accounts and passwords are individualized and may not be shared without prior permission from the Vice President of Instruction and Student Services or the Vice President of College Services.
The network is managed by Information Technology. Network users shall not change cabling or add new services. Users will promote efficiency in order to minimize congestion of the networks. Requests for changes should be sent to the Information Technology Department.
EvCC computers and networking facilities shall not be used for commercial purposes or private gain. The expectation of privacy, in relation to what is stored on college computer equipment or carried as network traffic, exists only to protect the confidentiality needed to properly conduct college business.
This policy also applies to the use of other networks accessed through EvCC computers or networks.
Interpretation, application, and modification of this policy shall be within the sole discretion of EvCC. Violations may result in loss of computer and/or network use privileges and other penalties consistent with EvCC policies and procedures. Questions arising under this policy should be directed to the Vice President of College Services.
Guidelines for Determining Acceptable Use
The following examples provide guidelines for determining whether a particular action is deemed acceptable, but are not a complete list of all unacceptable uses.
- Do not obtain, use or share any other users' password.
- Attempt either directly or indirectly through use of any software or equipment to gain access to files, transmissions or other resources to which you have not been granted permission.
- Download, modify, transmit, reproduce, publish or distribute information, software or materials which are protected by copyright without permission of copyright owner.
- Use email, listservs, web sites or other Internet services to transmit any communication where the meaning of the message, its' transmission or distribution is intended to be or is perceived to be abusive, offensive or harassing to the recipient(s).
- Directly or indirectly restrict, inhibit or interfere with the ability of the college, college constituents, employees or students to conduct college business or to access and use the Internet, college servers or services by hosting unauthorized services or transmitting software or information containing a virus, bomb, worm, Trojan or other harmful feature, or otherwise engaging in a DOS (denial of service) attack.
- Use the system for non-academic or commercial purposes.
- Steal, vandalize or obstruct the use of computing equipment, services or documentation.
- Use any software obtained illegally or not properly licensed.
Violations of Acceptable Use Policy
Violators of this policy will be subject to the normal disciplinary procedures of the College, including those described in the Student Handbook in the section titled Student Rights and Responsibilities, and/or those described below. Violations of this policy will be dealt with in a serious and appropriate manner according to one of the four categories described below. Illegal acts involving College computing resources may also be subject to prosecution by local, state or federal authorities.
Category 1 Offense: These offenses generally show a lack of consideration of computing resource and/or other computer users, but do not threaten privacy, computer integrity or violate ethical principles. Violators will be issued a verbal, Email or hardcopy warning regarding their actions. Repeated offense in this category will result in a Category 2 disciplinary action.
Category 2 Offense: These offenses often involve violations of ethical actions, for example, where user privacy or computer integrity was violated. Violators will have their user account and computer access (including access to the computer labs) suspended until a formal session with the Director of Information Technology. A copy of this policy will be provided to the user with the specific area of offense highlighted. Repeated offense in this category will result in a Category 3 disciplinary action.
Category 3 Offense: These offenses generally warrant an investigation and an incident report by the Directory of Security and/or the Vice President of Instruction and Student Services. Violators will have their user account and computer access (including access to the computer labs) suspended. The violator MUST attend a session with the Director of Security and/or the Vice President of Instruction and Student Services. All computer privileges will continue to be suspended until the completion of the investigation and issuance of a report by the Director of Security. In most cases the appropriate College official will make the determination if computer privileges are to be returned to the violator. Repeated offense in this category will result in a Category 4 disciplinary action.
Category 4 Offense: These offenses generally warrant an investigation and an incident report by both the Director of Security and local, state or federal law enforcement. Violators committing a Category Four offense will forfeits all rights to computer privileges. Any and all information requested by the Director of Security, local, state or federal law enforcement will be provided. If the violator is found guilty of the offense under investigation, any future access to College computer resources must be first approved by the appropriate College official, and that official may stipulate usage only under supervised circumstances.
Any computer offense not explicitly classified in this policy will be reviewed on a case-by-case basis. The College reserves the right to stiffen or lessen the penalties based on situations involved in the offense.