2005-2006 Catalog and Student Handbook 
    
    Dec 22, 2024  
2005-2006 Catalog and Student Handbook [ARCHIVED CATALOG]

Computer Resource Guidelines


Click on a link to be taken to the entry below.

   


Computer Resource Guidelines

  ^ TOP

Computer resources at Northeast State are available to all students, faculty, and staff for authorized use in a responsible, ethical, and equitable manner. It is the responsibility of the Office of Information Technology personnel to maintain a stable operational environment for all users and institutional programs. Cooperation of all users in the form of ethical and responsible behavior is required at all times so that all may share resources freely and equitably.

The following lists of user responsibilities are intended to be illustrative, and not exhaustive. Subject to conformance with Federal and State of Tennessee law and with State of Tennessee and Tennessee Board of Regents policies, Northeast State is authorized to supplement the user responsibilities listed below.

Access

  1. Users shall obtain proper authorization before using TBR or Northeast State information technology resources.
  2. Users shall not use TBR or Northeast State information technology resources for purposes beyond those for which they are authorized.
  3. Users shall not share access privileges (account numbers and passwords) with persons who are not authorized to use them.
  4. Users shall not use TBR or Northeast State information technology resources in an attempt to access or to actually access computers external to the TBR or Northeast State system when that access is not authorized by the computer’s owner (no “hacking” allowed).

Respect for Others

  1. A user shall not attempt to obstruct usage or deny access to other users.
  2. Users shall not transmit or distribute material that would be in violation of existing TBR or Northeast State policies or guidelines using Northeast State information technology resources.
  3. Users shall respect the privacy of other users, and specifically shall not read, delete, copy, or modify another user’s data, information, files, e-mail or programs (collectively, “electronic files”) without the other user’s permission. Users should note that there should be no expectation of privacy in electronic files stored on the resident memory of a computer available for general public access, and such files are subject to unannounced deletion.
  4. Users shall not intentionally introduce any program or data intended to disrupt normal operations (e.g. a “computer virus” or “worm”) into Northeast State information technology resources.
  5. Forgery or attempted forgery of e-mail messages is prohibited.
  6. Sending or attempts to send unsolicited junk mail or chain letters is prohibited.
  7. Flooding or attempts to flood a user’s mailbox is prohibited.

Respect for State-owned property

  1. A user shall not intentionally, recklessly or negligently misuse, damage or vandalize Northeast State information technology resources.
  2. A user shall not attempt to modify Northeast State information technology resources without authorization.
  3. A user shall not circumvent or attempt to circumvent normal resource limits, logon procedures or security regulations.
  4. A user shall not use Northeast State information technology resources for purposes other than those for which they were intended or authorized.
  5. A user shall not use Northeast State information technology resources for any private or personal for-profit activity.
  6. Except for those not-for-profit business activities which are directly related to an employee’s job responsibilities or which are directly related to an organization which is affiliated with Northeast State, a user shall not use Northeast State information technology resources for any not-for-profit business activities, unless authorized by the President (or his designee).
  7. Users shall at all times endeavor to use Northeast State information technology resources in an efficient and productive manner, and shall specifically avoid excessive game playing, printing excessive copies of document files, data, or programs; or attempting to crash or tie-up computer resources.

Additional Responsibilities of Employees and Independent Contractors

  1. Users who are Employees and Independent Contractors shall not make use of Northeast State information technology resources for purposes which do not conform to the purposes goals, and mission of Northeast State and to the user’s job duties and responsibilities.
  2. Users shall not use Northeast State information technology resources for solicitation for religious or political causes.

No unlawful uses permitted

Users shall not engage in unlawful uses of the information technology system resources of the TBR or Northeast State. Unlawful activities are violative of this policy and may also subject persons engaging in these activities to civil and/or criminal penalties. This list of unlawful activities is illustrative and not intended to be exhaustive. Questions concerning potential unlawful use of information technology may be directed to the Assistant Vice President of Information Technology.

Obscene materials

The distribution and display of obscene materials is prohibited by the laws of Tennessee (see Tenn. Code Ann. § 39-17-902). Obscene materials are defined under Tennessee law (see T.C.S. § 39-17-901(10)) as those materials which:

  1. The average person applying contemporary community standards would find that the work, taken as a whole, appeals to the prurient interest;
  2. The average person applying contemporary community standards would find that the work depicts or describes, in a patently offensive way, sexual conduct; and;
  3. The work, taken as a whole lacks serious literary, artistic, political, or scientific value.
    Federal law (18 U.S.C. 2252) prohibits sexual exploitation of a minor, including knowingly possessing materials implying minors engaging in sexual activity. The violation of this section is a Class E felony.

Defamation

Defamation is a civil tort that occurs when one, without privilege, publishes a false and defamatory statement, which damages the reputation of another.

Violation of Copyright

Federal law gives the holder of copyright five exclusive rights, including the right to exclude others from reproducing the copyrighted work. Sanctions for violation of copyright can be very substantial. Beyond the threat of legally imposed sanctions, violation of copyright is unethical appropriation of the fruits of another’s labor.

Pursuant to the Digital Millennium Copyright Act of 1998, the TBR designated agent for receipt of complaints of copyright infringement occurring with the use of Northeast State information technology resources is the Tennessee Board of Regents Assistant Vice Chancellor for Information Technology. Northeast State has designated the Dean for Institutional Effectiveness as Northeast State’s campus agent regarding complaints of copyright infringement.

Gambling

Gambling, including that performed with the aid of the Internet, is prohibited under Tennessee law (see Tenn, Code Ann. § 39-17-502).

Sanctions

Users not following these guidelines or who violate policies of Northeast State and the Tennessee Board of Regents may have their user accounts disabled and be denied access to information technology resources.

Computer Accounts

  ^ TOP

All Northeast State employees and students are eligible for an account on the computer systems. Administrative computer user accounts will be established upon the request of a vice president, dean, division chair or director. All requests for the establishment of user accounts shall be submitted on a Computer Account Request form. Users needing access to administrative databases are also required to complete an Administrative Database Authorization Request form. The original request forms are kept on file in the office of Information Technology.

Student accounts are established on the network server at the beginning of each semester. Student e-mail accounts are active for the semester in which the student is enrolled and are automatically renewed for subsequent semesters. When a student has not been enrolled in the college for two consecutive semesters, their e-mail account is removed from the system.

Privacy Considerations, Electronic Mail and/or Data Files

  ^ TOP

In an operational sense, electronic mail and files in accounts and on the network are regarded as private; that is, employees of Northeast State do not routinely look at this information. However, Northeast State reserves the right to view or scan any file or software stored on the college system or transmitted over the college network, and may do so periodically to verify that software and hardware are working correctly, to look for particular types of data or software (such as computer viruses), or to audit the use of resources. Electronic mail and data on college computing systems or transmitted over the college network may be periodically copied to backup tapes. Material of questionable content that may come to the attention of the college personnel during these and other activities may be acted upon. Faculty, staff, and students of the college are encouraged to exercise good judgment in the use of computing resources, data, and electronic mail.

Northeast State makes reasonable efforts to maintain confidentiality and, when sources outside the college request an inspection and/or examination of any college owned or operated communications system, computing resource, and/or files or information contained therein, Northeast State will treat files and information as confidential unless any one or more of the following conditions exist:

  • when approved by the President of Northeast State Technical Community College
  • when authorized by the owner(s) of the information
  • when required by federal, state or local law
  • when required by a valid subpoena or court order

When notice is required by law, court order or subpoena, computer users will receive prior notice of such disclosures (viewing information in the course of normal system testing or maintenance does not constitute disclosure).

  ^ TOP