Respect for intended purposes of academic computing resources
- Using the system in a way that deliberately diminishes or interferes with system use by others is not permitted.
- No user may permit another person to use his/her computer account.
- Printing of e-mail is limited to one copy of academic or work-related messages.
- E-mail chain letters may not be sent to other users on or off campus. Sending of such letters is prohibited by federal law.
- No computer or telecommunications device may be used to transmit obscene, vulgar, profane, lewd, lascivious, or indecent language or image or to make any suggestion or proposal of an obscene nature or to threaten any illegal or immoral act with the intent to coerce, intimidate, or harass any person or persons. Violation of this prohibition may be considered a Class I misdemeanor under Arkansas state law. Use of computing resources for the display or transmittal of sexually explicit or abusive language or images (e.g., any and all items that might be considered offensive by any person receiving or potentially viewing such items) will be handled under the College's sexual harassment policy as found in BPPM 2.48.
- Development or execution of programs that could harass other users or damage or alter software configurations will not be tolerated.
- All users of College computing laboratories must abide by any and all posted regulations.
- Academically-related activity takes precedence over casual use, such as playing games, participating in on-line chats/activities, or sending and receiving e-mail.
- College computing resources may not be used for private commercial purposes, such as sending e-mail or constructing Web pages to solicit private business.
- Computers, public terminals, printers, and networks must be shared equitably to make the most efficient and productive use of College resources.
Respect for other persons' privacy
- It may be possible for individuals to obtain unauthorized access to the mail gateway or for authorized users to obtain unauthorized access to other users' electronic mail.
- Ozarka College may be ordered by a court of law to surrender communications that have been transmitted by electronic mail.
- If a user is under investigation for misuse of electronic mail, his/her account may be suspended, and his/her e-mail read as it applies to the alleged offense.
- A user's electronic mail may be purged after an appropriate period as determined by Information Systems staff, whether or not the messages have been read by the intended recipient.
Respect for copyright
- All members of the College community shall adhere to the provisions of copyright law. Persons wishing to see full text of federal law may consult with library staff.
- Persons who willfully disregard copyright law do so at their own risk and assume all liability.
- The doctrine of fair use, while not specifically regulated, suggests that materials originally prepared for public consumption are more open to reproduction than materials originally developed for classroom or other more private use. Use of a small portion of a copyrighted text, as in a brief quotation or for purposes of a review, may also be permitted. Any reproduction, however, which has the potential to deprive the item's creator of profit otherwise available from a potential market and sales is unlikely to be found a fair use.
- Ozarka College negotiates site licenses with software vendors whenever possible. Copying, therefore, is strictly limited except for backup purposes, with the backup copy not to be used at all as long as the original is functional.
- Information Systems staff will provide access to the College's existing software through the general computing labs, computing classrooms, and networks.
- Information Systems staff will monitor hardware and software licenses that affect student computing labs and computer classrooms.
- Information Systems staff will make every effort to ensure the integrity of all computer resources and information stored on the network file server. Ozarka College, however, is not responsible for any loss of information.
- Information Systems staff or their representatives reserve the right to ask users engaged in non-academic activities to logoff the system to allow other users to engage in academic activities.
- Information Systems staff will regularly instruct users to change their passwords.
- The President will appoint a Computer Ethics Review Board which will review any infraction of computer resource policies and recommend appropriate sanctions to the Administrative Council.
- Violators of policies other than those related to copyright law may expect to incur sanctions such as suspension of user's privileges for a specified time in the case of a first offense. Further offenses may result in permanent suspension of privileges. Continued serious offenses may result in further penalties.
- Persons violating copyright law may be subject to the full range of legal penalties.
- Persons who disagree with actions of the Computer Ethics Review Board may follow normal College grievance procedures, as found in BPPM 2.32 (employees) and BPPM 5.40 (students).