PJC’s Internet Use Policy
Published or Revised March 09, 2010
Violation of these procedures may result in suspension of privileges, initiation of formal Paris Junior College (hereafter referred to as “college”) disciplinary procedures or, in extreme cases, criminal prosecution under federal or state law.
Under normal circumstances, college officials will not examine personal information transmitted over the network or stored on college-owned computers. However, the college reserves the right to monitor the system when it has good cause to believe that laws are being violated.
- All users of the college’s Internet services (whether on the internal college network or on the Internet) must abide by the terms and conditions of these procedures.
- The Internet services should be used for purposes that directly, or indirectly, relate to the activities of the college. If a user wishes to make use of these services for other purposes, written permission should be obtained from the college’s senior management.
- Users of the Internet should respect the college’s equal opportunities policy. The college is committed to promoting equality of opportunity for all regardless of race, creed, age, gender, marital status, sexual orientation, disability or learning difficulty.
- Users are not allowed to use the Internet for illegal or offensive activities.
- Information used, or presented, on the Internet should not violate the terms and conditions of the Data Protection Act, or those of copyright law.
- The Internet services should not be used to obtain unauthorized information, or information that is personal or private to another individual or organization. If such material is accidentally received, or obtained, its content should not be discussed or disseminated to any other person or organization, other than the intended recipient.
- If information is downloaded from the Internet, any associated terms and conditions specified by the supplier of that information must be adhered to.
- If views or opinions are openly expressed on the Internet, it should be clearly stated that these do not necessarily represent the views and opinions of the college.
- Our electronic mail and World Wide Web services are not secure (private) from, for instance, hackers. Secure packages and encryption systems do exist on the Internet, but they are not currently used by the college. Therefore, users are advised not to submit personal details or other information that could potentially be misused.
- Care should always be taken on the Internet: the Internet is an international service, so national and international laws may be applicable.
- Information destined for a particular individual or organization should not be deliberately prevented from reaching its intended destination, nor should its content be modified by an unauthorized individual or organization.
- Use of the Internet to transmit threatening, obscene or harassing materials is prohibited.
- Use of the Internet to interfere with or disrupt network users, services, or equipment is prohibited. (Disruptions include, but are not limited to, distribution of unsolicited advertising, propagation of computer worms and viruses, chain mail and using the network to make unauthorized entry to any other machine accessible via the network.)
- The following activities are specifically prohibited:
- Tampering with the physical network (wires, hubs, etc.).
- Defining and/or changing IP addresses on any machine.
- Intercepting or attempting to intercept e-mail and file transfers.
- Originating or attempting to originate mail from someone else and attempting to log on to machines without an account.
- Use of the net for profit-making activities and or the resale of network access is prohibited.
- Do not identify, imply or infer gang affiliation.
- Do clearly and correctly identify yourself in all electronic communications.
- Do not use pseudonyms or anonymous sign-ons (unless that is the protocol, “ftp” for example).
- Respect and adhere to the laws concerning copyright and other intellectual property rights.
- When asked to do so by a faculty or staff member, you must immediately “sign off” from the system.
- Seek assistance from authorized and trained personnel. If there is a problem, never try to “fix,” alter or reconfigure either hardware or software without trained, authorized assistance.
- “Open” labs are for the use of all students in support of their curriculum course content. “Restricted” labs are for use by students with curricular needs specific to the discipline. Users may refer to the Academic Computing Lab Guidelines or check with lab assistants for listings of Open and Restricted labs.
- Use copy machines to make multiple copies; printers are not copiers and should not be used as such.
- Be courteous. Noise is often distracting to others working around you.
- All use of the system must be in support of education and research and consistent with the mission of the college. The college reserves the right to prioritize use and access to the system.
Use of the Internet is a privilege, and all users are expected to act responsibly and to follow the college’s guidelines, policies and procedures in utilizing information technology and electronic networks accessed by such technology. The college’s information technology acceptable use procedures require that each user (anyone using these resources):
- Accept responsibility for learning how to use information technology. The college provides training on the use of information technology. All users are encouraged to learn the proper use of information technology by individual learning, attending training sessions or attending classes. Access to Internet and other resources may be limited to those demonstrating an appropriate skill level. Each user is responsible for checking any software he/she introduces to any computer or the college network for computer viruses.
- Use resources efficiently. Accept limitations or restrictions on computing resources, such as storage space, time limits or amount of resources consumed, when so instructed by the college. Each e-mail user is responsible for managing his/her message storage. Such restrictions are designed to ensure fair access for all users.
- Respect proprietary information of others. A user may, subject to college policies and authorization, upload software files or otherwise distribute to on-line networks only information, software, photographs, videos, graphics, music, sound and other material.
Individual departments/divisions may have additional rules. Please check with each department concerning proper use of equipment.