2.1 Federal Copyright Law
2.2 Local, State and Federal Laws
2.3 Licensing Regulations
3. Misuse of Privileges
3.1 Students, faculty, staff, and approved guests who misuse computer or network privileges are subject to the loss of computer resources and/or network access, and may also be subject to discipline and/or termination through College processes, as well as criminal or civil prosecution under federal and Arizona law.
Misuse of computing resources includes, but is not limited to, the following:
3.1.1 Using technology resources in a manner that violates the laws of the United States of America and/or the State of Arizona or that violates the policies of Arizona Western College.
3.1.2 Unauthorized access to the resources of the College's computer systems or network (e.g., trying to log or break into accounts or computers for which you are not authorized).
3.1.3 Disruption or obstruction of authorized use of the network.
3.1.4 Failure to comply with all Computer Information Services Policies and Guidelines.
3.1.5 Knowingly causing excessive and unneeded use of College resources such as staff time, network bandwidth, or computer capacity.
3.1.6 Destroying the integrity of computer-based information or systems.
3.1.7 Unauthorized use, or attempted unauthorized use, of the College's computer systems, computer networks, computer software, data files, or other computing facilities.
3.1.8 Compromising the privacy of users, including but not limited to misrepresenting or forging identities on, or through the use of, the College's network.
3.1.9 Using College computer and networking systems for personal gain or commercial purposes unrelated to activities that support, and are consistent with, the educational purpose and mission of the College.
3.1.10 Using College computer networking systems and resources for obscene purposes or in a pervasively profane manner, including but not limited to use which may bring into public disrepute the College's identity and image.
3.1.11 Theft, distribution, or reproduction without lawful authority of copies or reproductions of property or subject matter of any kind belonging to another, including but not limited to that which is protected by federal, state or international law governing patent, copyright, trademark, trade name, trade secrets, privacy, publicity, unfair competition, or licensing agreements.
3.1.12 Tampering with computer software or data files belonging to others, or using the resources in such a manner that would cause the College reasonably to believe that it would be subject to the risk of suit or regulatory action.
3.1.13 Using resources in a manner that is reasonably likely, or with the intention, to inflict mental harassment, to intimidate, or unreasonably to invade the privacy of any other individual.
3.1.14 Knowingly accessing, downloading, displaying or transmitting sexually explicit images or language, including accessing web sites that display such images or language, unless such action is taken in furtherance of legitimate research or educational purposes.
3.1.15 Accessing, downloading, displaying or transmitting material intended to provide information or instruction regarding how to access information the user is not authorized to access or how to disrupt the functioning of any computer system or network (i.e. "hacker websites"), unless such action is taken in furtherance of legitimate research or educational purposes.
3.1.16 Sharing College account passwords with others, or using networked machines to provide College network access to people or organizations that do not already have such access.
3.1.17 Using technology resources to post material on behalf of other parties, sharing personal access to the College's resources with others, or using personal computers connected to the College's network to mirror another site (i.e., to make a copy of someone else's site).
3.1.18 Unauthorized installation of software on the College's computers, networks or network devices.
3.1.19 Using technology resources to threaten any particular individual with violence or to engage in any activity that would naturally and directly tend to provoke acts of violence or a breach of the peace by the person to whom the conduct or remarks are addressed.
3.1.20 Using technology resources in a manner that would lead the College reasonably to believe that such use may subject it to the risk of suit, regulatory action, or liability of any kind under the laws of the United States of America or the State of Arizona forbidding the creation or maintenance of a hostile working or educational environment involving discrimination based on race, color, sex, religion, national origin, age, veterans' status or disability, whether physical or mental, or which would cause the College reasonably to believe that such use of its property and resources may result in a determination that it is in breach of its legal duty to take reasonable steps to eliminate such attributes, conditions, or vestiges of a hostile educational environment and/or of discrimination.
4. Institutional Discipline
5. Expectation of Privacy
6. Hold Harmless Agreement