AWC Technology Acceptable Use Policy
The Arizona Western College computer network and technology facilities represent a commitment to provide a workplace with modern computing tools and services. Technology use is restricted to purposes consistent with the mission of the College.
Access to the College's computer and network systems is limited to current AWC students, faculty, staff, and approved guests who access these resources for legitimate research, teaching, learning, academic support and professional service, and whose use complies with these and other policies of the College. Students, faculty, staff and guests are responsible for all use of their accounts and/or equipment.
2.1. Federal Copyright Law
2.2. Local, State and Federal Laws
2.3. Licensing Regulations
3. Misuse of Privileges
The State of Arizona, local taxpayers and the U.S. Government provide Arizona Western College with computing and network resources. Misuse of these finite and critical resources threatens their continued availability. Justification for the support of this system suffers when misuse occurs.
3.1. Students, faculty, staff, and approved guests who misuse computer or network privileges are subject to the loss of computer resources and/or network access, and may also be subject to discipline and/or termination through College processes, as well as criminal or civil prosecution under federal and Arizona law.
Misuse of computing resources includes, but is not limited to, the following:
3.1.1. Using technology resources in a manner that violates the laws of the United States of America and/or the State of Arizona or that violates the policies of Arizona Western College.
3.1.2. Unauthorized access to the resources of the College's computer systems or network (e.g., trying to log or break into accounts or computers for which you are not authorized).
3.1.3. Disruption or obstruction of authorized use of the network.
3.1.4. Failure to comply with all Computer Information Services Policies and Guidelines.
3.1.5. Knowingly causing excessive and unneeded use of College resources such as staff time, network bandwidth, or computer capacity.
3.1.6. Destroying the integrity of computer-based information or systems.
3.1.7. Unauthorized use, or attempted unauthorized use, of the College's computer systems, computer networks, computer software, data files, or other computing facilities.
3.1.8. Compromising the privacy of users, including but not limited to misrepresenting or forging identities on, or through the use of, the College's network.
3.1.9. Using College computer and networking systems for personal gain or commercial purposes unrelated to activities that support, and are consistent with, the educational purpose and mission of the College.
3.1.10. Using College computer networking systems and resources for obscene purposes or in a pervasively profane manner, including but not limited to use which may bring into public disrepute the College's identity and image.
3.1.11. Theft, distribution, or reproduction without lawful authority of copies or reproductions of property or subject matter of any kind belonging to another, including but not limited to that which is protected by federal, state or international law governing patent, copyright, trademark, trade name, trade secrets, privacy, publicity, unfair competition, or licensing agreements.
3.1.12. Tampering with computer software or data files belonging to others, or using the resources in such a manner that would cause the College reasonably to believe that it would be subject to the risk of suit or regulatory action.
3.1.13. Using resources in a manner that is reasonably likely, or with the intention, to inflict mental harassment, to intimidate, or unreasonably to invade the privacy of any other individual.
3.1.14. Knowingly accessing, downloading, displaying or transmitting sexually explicit images or language, including accessing web sites that display such images or language, unless such action is taken in furtherance of legitimate research or educational purposes.
3.1.15. Accessing, downloading, displaying or transmitting material intended to provide information or instruction regarding how to access information the user is not authorized to access or how to disrupt the functioning of any computer system or network (i.e. "hacker websites"), unless such action is taken in furtherance of legitimate research or educational purposes.
3.1.16. Sharing College account passwords with others, or using networked machines to provide College network access to people or organizations that do not already have such access.
3.1.17. Using technology resources to post material on behalf of other parties, sharing personal access to the College's resources with others, or using personal computers connected to the College's network to mirror another site (i.e., to make a copy of someone else's site).
3.1.18. Unauthorized installation of software on the College's computers, networks or network devices.
3.1.19. Using technology resources to threaten any particular individual with violence or to engage in any activity that would naturally and directly tend to provoke acts of violence or a breach of the peace by the person to whom the conduct or remarks are addressed.
3.1.20. Using technology resources in a manner that would lead the College reasonably to believe that such use may subject it to the risk of suit, regulatory action, or liability of any kind under the laws of the United States of America or the State of Arizona forbidding the creation or maintenance of a hostile working or educational environment involving discrimination based on race, color, sex, religion, national origin, age, veterans' status or disability, whether physical or mental, or which would cause the College reasonably to believe that such use of its property and resources may result in a determination that it is in breach of its legal duty to take reasonable steps to eliminate such attributes, conditions, or vestiges of a hostile educational environment and/or of discrimination.
4. Institutional Discipline
Any individual or group that:
5. Expectation of Privacy
The College's administrators reserve the right to suspend or examine any account, computer or network access information, including the content of emails sent by or to any network user and the websites visited by any user. Users of this system do not have an expectation of privacy in their use of the College's network or computer system. Any instance of misconduct will be reported to the appropriate College office.
6. Hold Harmless Agreement
The account holder agrees to be responsible for, and to indemnify and hold the Arizona Western College District Governing Board, Arizona Western College, and their officers and employees harmless from any claims, including attorney's fees, resulting from the account holder's acts or omissions which cause direct or indirect damage to another party.