Northeast Alabama Community College provides students with computer workstations in laboratories and in the library, and provides faculty and staff with computer access in offices. These workstations, software, and storage device contents are the property of Northeast Alabama Community College. As part of campus resources, computers are connected to and have access to the Internet. Each user is responsible for his or her activities on computers and on the Internet. Activities which are illegal, harass others, and offend those working around one are not permitted and will result in loss of privileges.
Campus workstations and the resources they access are provided for course-related assignments, scholarly research, college business, and other activities directly related to the mission of Northeast Alabama Community College. At the discretion of college personnel, resources may be used for recreational and casual use when they are not otherwise in use. In all cases, computer use in support of the college’s mission will take precedence over recreational and casual use.
Access is a privilege, not a right: Northeast Alabama Community College reserves the right to deny the privilege of the use of any or all types of computer technology to individuals who violate the Acceptable Use Policy.
Definitions and Application
This Acceptable Use Policy applies to all persons who use or attempt to use computer resources owned by Northeast Alabama Community College. Computer resources include computers, networks, software, data, and other information technologies, whether located on campus or at an off-campus activity sponsored by the College. These resources are to be used in a manner that supports the institutional mission of Northeast Alabama Community College.
Northeast Alabama Community College provides Internet access on selected computers available to its students, faculty, and staff by participating in the Alabama Research and Educational Network (AREN), which is administered by the Alabama Supercomputer Authority in order to provide Internet access for academic, educational, and research purposes only. The College abides by the Acceptable Use Policy of AREN, which is available for view in the Office of Technology.
All Northeast Alabama Community College regulations and existing state and federal laws apply, including not only those regulations and laws that are specific to computers and networks but also those that may apply generally to personal conduct and state-owned property.
Users of computing resources belonging to Northeast Alabama Community College will be held accountable for their conduct under this policy statement, any other applicable policies or procedures of Northeast Alabama Community College, and/or state or federal laws and regulations. Use of computer information technology that is unacceptable includes but is not limited to the following examples:
- acceptable includes but is not limited to the following examples:
- Violating or attempting to violate copyright laws governing software and materials accessed by means of computer technology.
- Violating or attempting to violate license agreements, including but not limited to making unauthorized copies of software or data owned by or licensed to Northeast Alabama Community College.
- Using software or data obtained by means that are illegal or contrary to the policies of Northeast Alabama Community College.
- Violating or attempting to violate Northeast Alabama Community College security, including but not limited to circumventing data protection schemes, gaining unauthorized access, or decrypting secure data.
- Accessing or attempting to access information belonging to another individual or Northeast Alabama Community College office; or
- misrepresenting one’s identity, including but not limited to using another’s password.
- Allowing an unauthorized individual to access an account or information, including but not limited to divulging a password or other sign-on information.
- Intentionally executing, transmitting, or installing any program designed to damage or to place excessive load on a computer system or network, including but not limited to computer viruses, Trojan Horses and worms.
- Creating, reproducing, or transmitting materials that are slanderous or defamatory in nature, that threaten violence, or that otherwise violate existing laws or regulations.
- Displaying text or images that might be found offensive in a location that can be seen or read by others, including but not limited to text or images that are obscene or harassing in any way.
- Using or attempting to use computer resources to harass others, to monitor others, or to disrupt their work.
- Failing to abide by the provisions of this statement that give priority to educational uses of computer resources, including but not limited to using computers for commercial purposes or for recreational purposes while others need access for educational purposes.
- Failing to abide by the policies, procedures, and regulations of the lab, library, classroom, office, or other facility in which the computer equipment is located.
- Using or installing any software that has not been authorized by Northeast Alabama Community College.
- Overusing or overloading computer resources, including computer memory as well as paper and other supplies. Northeast Alabama Community College reserves the right to periodically purge excessively large files and email files.
- Damaging, destroying, defacing, or removing hardware, software, data, or supplies that belong to others or to Northeast Alabama Community College.
Because access to information technology resources at Northeast Alabama Community College is a privilege, abuse of this privilege is subject to campus disciplinary procedures and possibly legal action.
If the initial violation is minor or accidental, the situation will be resolved informally with the purpose of educating the violator. If the violation is repeated or is more serious in nature, Northeast Alabama Community College may rescind or modify computer access privileges. Violations of local, state, or federal laws will result in the immediate loss of all Northeast Alabama Community College computing privileges and will be referred to appropriate Northeast Alabama Community College officials and/or law enforcement authorities.
Northeast Alabama Community College has the responsibility of administering, protecting, and monitoring all computers, software, and networks owned or licensed by the college whether on or off campus, with the exception of privately owned computers in the possession of individuals for their personal use. Authorized personnel may monitor computer activity, including electronic mail, for the purpose of maintaining system performance and security. Users are expected to cooperate with investigations of violation of college policy.
Northeast Alabama Community College reserves the right to require users to refrain from using any program or property of the college.
Northeast Alabama Community College accepts no responsibility for damage to personal property or data caused by any Northeast Alabama Community College computer system or connections including, but not limited to, malfunctions of hardware and software, computer viruses, Trojan Horses, and worms.
Northeast Alabama Community College will not be liable for the actions of anyone, including students and employees, connected to the Internet through the college Internet access.
Using or attempting to use any computer or information technology resource of Northeast Alabama Community College signifies the following:
The user agrees to comply with the provisions of this Acceptable Use Policy:
- The user accepts responsibility for knowing the contents of this policy statement. Failure to read or acknowledge this statement will not be an excuse for noncompliance.
- The user accepts that failure to comply with this policy may result in temporary or permanent denial of access to computer or information technologies, or in some cases may result in college disciplinary action or legal action.
Copies of the Acceptable Use Policy are available in the College Catalog, on the College website, and in facilities where computer resources are used. A summary of this policy is posted on or near computer equipment.