the integrity, risk, and compliance 1. Accessing, retrieving, viewing 10. Connecting unauthorized aspects of each email system. Because or disseminating obscene, devices on the wired or email accounts are assigned based indecent, sexually explicit or wireless network, including but on student and employee personally vulgar materials or messages not limited to, wireless signal identifiable information, use of unrelated to the educational boosters. College email systems is the only mission of the college. manner in which the College and 11. Circumventing or attempt to others can reasonably assume that it 2. Retrieving, viewing or circumvent system security is communicating with the correct disseminating any material measures through the use of individual. in violation of any federal or software or other measures. state regulation/law or College Students and employees who policy. This includes, but is 12. Gaining access without communicate via email to conduct not limited to, improper use permission to the files of College-related business must utilize of copyrighted material or others, or vandalize another their College provided email accounts intellectual property. user’s data or files. upon enrollment or employment. Prospective students or employees may 3. Intentionally manipulate 13. Gaining unauthorized access to temporarily use personal email accounts information on any sensitive College electronic resources or during the application for enrollment applications such as other entities using a College or employment process. Personal accounting, student, employee, computer and/or network. email accounts may also be used on and business records, or a limited basis for password resets tamper and/or attempt to gain 14. Improperly forge or alter when other information is provided to unwarranted access to student electronic mail messages, identify the individual. For their own or employee personal network or use an account owned by personal protection, faculty and staff are files. Sensitive files should be another user. discouraged from using their College stored in a secure place. email account for personal use. 15. Invading another person’s 4. Engaging in for-profit privacy. This includes, but Efficient Use of Resources commercial activities, is not limited to, improperly including but not limited to, disclosing personally Users must accept limitations or crypto-mining, advertising or identifiable information such as restrictions on computing resources, sales for personal gain. name, social security number, such as storage space, time limits or address, phone number, or user amounts of resources consumed. Users 5. Sending of SPAM or a chain name and password. should not engage in any activity letter. detrimentally affecting other users of 16. Using the System or any the System. 6. Soliciting money for religious system resources to send or political causes unless it unsolicited commercial email. User Identification is an approved fundraising activity for a student 17. Violating any software license Concealing or misrepresenting one’s organization. agreement. identity is a violation of College policies, and is subject to disciplinary 7. Harassing, threatening, 18. Downloading, copying, action. intimidating, or demeaning any printing or otherwise storing person or group of people for or possessing any data, in Vandalism any reason, including but not violation of these rules and/or limited to race, color, religion, College policy. Any type of vandalism or attempted gender, age, national origin, vandalism (physical or electronic) citizenship status, ancestry, 19. Any attempt to hide or conceal to any part of the System, a College marital status, parental activity of a prohibited use. computer, computer peripherals, the status, pregnancy, family College network, or files of others is status, military status, sexual 20. Use of tools designed to prohibited and may result in disciplinary orientation, disability, source perform, including but not action. Vandalism includes, but is of income, housing status, or limited to, vulnerability and not limited to, malicious destruction any other category protected port scanning, penetration or deletion of college information, by law. testing, packet sniffing, downloading, uploading, or creation of password cracking, encryption computer viruses or malware. 8. Disrupting the educational circumvention and collection process or interfere with the of network information of any Specific Prohibited Uses rights of others. kind without the expressed written consent of the College In addition to the other prohibitions 9. Disrupting information IT Office. contained in this policy, the following network traffic or interfere activities which are unacceptable with the network or connected 21. Engaging in any unlawful use and may result in disciplinary action, systems. of the system. include, but are not limited to: 40