Computer Usage Policy


All students and employees, whether part-time or full-time, shall observe the following guidelines regulating use of computers and software owned by the College, any communications hardware and software provided by the College for the purpose of accessing its computers, and any computer network governed in part or whole by the College. Persons who violate this policy may be subject to disciplinary action and possible legal action under the Federal Electronics Communications Privacy Act.  

College computing resources are provided for institutional work-related, educational, and academic purposes, and access to these resources and the facilities housing them is a privilege requiring that users conduct their computing activities in a responsible manner, respecting rights of other users and abiding by all computing license agreements.

Respect for intended purposes of academic computing resources
  • Using the system in a way that deliberately diminishes or interferes with system use by others is not permitted.
  • No user may permit another person to use his/her computer account.
  • Printing of e-mail is limited to one copy of academic or work-related messages.
  • E-mail chain letters may not be sent to other users on or off campus. Sending of such letters is prohibited by federal law.
  • No computer or telecommunications device may be used to transmit obscene, vulgar, profane, lewd, lascivious, or indecent language or image or to make any suggestion or proposal of an obscene nature or to threaten any illegal or immoral act with the intent to coerce, intimidate, or harass any person or persons. Violation of this prohibition may be considered a Class I misdemeanor under Arkansas state law. Use of computing resources for the display or transmittal of sexually explicit or abusive language or images (e.g., any and all items that might be considered offensive by any person receiving or potentially viewing such items) will be handled under the College's sexual harassment policy as found in BPPM 2.48.
  • Development or execution of programs that could harass other users or damage or alter software configurations will not be tolerated.
  • All users of College computing laboratories must abide by any and all posted regulations.
  • Academically-related activity takes precedence over casual use, such as playing games, participating in on-line chats/activities, or sending and receiving e-mail.
  • College computing resources may not be used for private commercial purposes, such as sending e-mail or constructing Web pages to solicit private business.
  • Computers, public terminals, printers, and networks must be shared equitably to make the most efficient and productive use of College resources.

Respect for other persons' privacy
No person may intentionally use another person's account or seek information on, obtain copies of, or modify another person's files, passwords, or any type of data or programs unless specifically authorized to do so by the account owner for a specific purpose.
Ozarka College will make every effort to safeguard the privacy of messages transmitted by the electronic mail system. Users, however, should be aware of the following:
  1. It may be possible for individuals to obtain unauthorized access to the mail gateway or for authorized users to obtain unauthorized access to other users' electronic mail.
  2. Ozarka College may be ordered by a court of law to surrender communications that have been transmitted by electronic mail.
  3. If a user is under investigation for misuse of electronic mail, his/her account may be suspended, and his/her e-mail read as it applies to the alleged offense.
  4. A user's electronic mail may be purged after an appropriate period as determined by Information Systems staff, whether or not the messages have been read by the intended recipient.
Users must change their passwords on a regular basis to help maintain privacy.

Respect for copyright
  1. All members of the College community shall adhere to the provisions of copyright law. Persons wishing to see full text of federal law may consult with library staff.
  2. Persons who willfully disregard copyright law do so at their own risk and assume all liability.
  3. The doctrine of fair use, while not specifically regulated, suggests that materials originally prepared for public consumption are more open to reproduction than materials originally developed for classroom or other more private use. Use of a small portion of a copyrighted text, as in a brief quotation or for purposes of a review, may also be permitted. Any reproduction, however, which has the potential to deprive the item's creator of profit otherwise available from a potential market and sales is unlikely to be found a fair use.
  4. Ozarka College negotiates site licenses with software vendors whenever possible. Copying, therefore, is strictly limited except for backup purposes, with the backup copy not to be used at all as long as the original is functional.
Responsibilities of Information Systems staff
  1. Information Systems staff will provide access to the College's existing software through the general computing labs, computing classrooms, and networks.
  2. Information Systems staff will monitor hardware and software licenses that affect student computing labs and computer classrooms.
  3. Information Systems staff will make every effort to ensure the integrity of all computer resources and information stored on the network file server. Ozarka College, however, is not responsible for any loss of information.
  4. Information Systems staff or their representatives reserve the right to ask users engaged in non-academic activities to logoff the system to allow other users to engage in academic activities.
  5. Information Systems staff will regularly instruct users to change their passwords.
Infractions of computer resource policies
  1. The President will appoint a Computer Ethics Review Board which will review any infraction of computer resource policies and recommend appropriate sanctions to the Administrative Council.
  2. Violators of policies other than those related to copyright law may expect to incur sanctions such as suspension of user's privileges for a specified time in the case of a first offense. Further offenses may result in permanent suspension of privileges. Continued serious offenses may result in further penalties.
  3. Persons violating copyright law may be subject to the full range of legal penalties.
  4. Persons who disagree with actions of the Computer Ethics Review Board may follow normal College grievance procedures, as found in BPPM 2.32 (employees) and BPPM 5.40 (students).





Comments (Comment Moderation is enabled. Your comment will not appear until approved.)
Comments are not allowed for this entry.




fur