Information Security Standard Practices
Acceptable Use Agreement — Students
Mt. San Antonio College provides broad access to its computing, communications and information resources. These resources support the delivery of the college's academic mission and, accordingly, they must be used responsibly. These resources include, but are not limited to, the physical data communications network and all computers, printers, scanners and other hardware attached to that network, as well as all system software, access to the Internet and other communication tools.
As a user of the computing, communications and information resources of Mt. San Antonio College, I understand and agree that:
- Mt. San Antonio College's computing, communication and information resources are provided for the support of its educational and service goals and the use of such resources for any other purpose is prohibited.
- Students are to abide by this and all campus-wide computer use policies, along with any local, state, and federal law that may apply. College divisions or departments can enact additional policies specific to their need. All users are subject to both the provisions of this policy, as well as any policies specific to the individual systems they use.
- Students must not share their passwords, access codes or account names with others and will comply with any applicable password complexity requirement.
- Most software is operated under copyright from various software developers. This software is only to be used on campus for school related business. Any violation of the rights of a person or entity protected by copyright law, including, but not limited to, the unauthorized duplication of copyrighted software, is prohibited.
- Students are not allowed to install any software on any campus computer.
- Sending or accessing pornography or patently obscene material other than for authorized research or instructional purposes is prohibited.
- Student workstations are subject to monitoring. Computer screens, particularly those accessing the Internet, may be periodically viewed to monitor compliance with policy.
- Students found in violation of the college's computer use policies, including, but not limited to, the use of its resources for any unauthorized or illegal activity, such as the destruction or alteration of data, attempts to bypass security systems or obtain or alter passwords, disruption of service or any form of harassment of users, malicious introduction of a computer virus or any disrupting activity, are subject to proper disciplinary action, including, as required by law, the reporting of such activity to the appropriate authorities.
- Authorized college personnel may, while performing routine or investigative operations have access to data, including electronic mail, web browser information and any other personal or class data stored on College computers.
- Activities that place excessive strain on network resources, i.e. net radio or any other similar streaming media, along with online gaming are not allowed. Students may not use Mt. San Antonio College resources for conducting a private business or for personal financial gain. Paying college fees and making purchases from the SacBookRac are examples of acceptable use. Students are encouraged to review all Mt. San Antonio College's computer policies at our web site http://infosecurity.mtsac.edu. Access to our web site is available to all students at the Library in the Learning Technology Center, Building 6 and via the Internet.
- To ensure the integrity and reliability of computer and communications resources, students are encouraged to report improper use and violations of this policy.
Selected Examples of Unacceptable Use:
- Revealing passwords to others, allowing someone else to use your account, or using someone else's account to access resources.
- Unauthorized attempts to delete or alter others files or systems.
- Not complying with requests from designated personnel to discontinue activities that threaten the integrity of computing resources.
- Attempting to defeat data protection schemes or to uncover security vulnerabilities.
- Connecting unauthorized equipment to the campus network.
By accessing Mt. San Antonio College computing, communication, and information resources, you agree to be bound by these terms. These terms are subject to change. Updated versions of this and other related documents will be made available at /it/infosecurity. If you do not agree with these terms, or with future changes to these terms, you must discontinue all use of applicable College resources. A violation of these terms may result in civil, criminal, or other administrative action.