General Provisions

Damage or destruction of equipment, software, or data belonging to the College or to other users, including the unauthorized adding, altering, or deleting files on College workstations and/or servers.

Altering of system settings or Internet browser settings on college owned computers without express permission of an instructor or a member of the SCC IT Department staff.

Reproduction of materials protected by copyright.

Violating software license agreements.

Violating or attempting to violate computer system or network integrity, including attempts to bypass network security functions, or to obtain restricted passwords for system administration.

Using College technological resources to harass others.

Users are advised not to reveal the address, phone number, or other personal details about themselves or others.

Engaging in unlawful or malicious activities.

Use of social networking sites (Facebook, YouTube, Twitter, etc.) is strictly prohibited.

Sending, receiving, or accessing pornographic materials.

Utilizing the Internet and/or College equipment for unauthorized material/commercial gain or profit.

Using the Internet or any College technological resource for any activity prohibited by Federal, State or International law.

Attempting to utilize computing resources for which you do not have access.

Sharing your personal password with others.

Using another person's password.

Impersonating another user via any form of electronic messaging.

Use proxies or other means to bypass the content filtering systems in place and or defeat any settings that prevent the access of material deemed and flagged as inappropriate by the blocking devices.

The production of and/or intentional dissemination of self-replicating or similar nuisance programs (e.g. virus, Trojan horse), whether or not they are destructive in nature.

Destroying, deleting, erasing, or concealing College files or other College data, or otherwise making such files or data unavailable or inaccessible to the College or to other authorized users of College systems.

Disable or modify any running tasks or services.

Use remote accessing software or hardware to take control of any network attached device or workstation.

Remove License decals or inventory control tags attached to the systems.

Damage caused by the intentional misuse or vandalism of equipment will be charged to the person who committed the act.