Policy Number: 8.500
The purpose of this policy is to establish parameters of acceptability for use of
the National Park College computing facilities and resources by College faculty, staff,
students and other NPC network users.
Computing resources (including, but not limited to, desktop computers, printers, computing
facilities, the local area network, Wi-Fi, access to the Internet, electronic mail
and similar electronic information) of National Park College are available only to
authorized users, and any use of those resources is subject to these standards. These
standards do not supersede or replace existing College policies, which will be applied
as the situation warrants. All users of the College’s computing resources are presumed
to have read and understood the following standards.
This section should include and may include reference to regulatory or legal reasons
for the policy.
This section should clearly define any special terms or concepts used in the policy.
A. General Responsibilities
The College’s information technology acceptable use standards require that each user
(anyone using these resources):
- Accept responsibility for learning how to use information technology effectively and
responsibly. The College provides training on the use of information technology. All
users are encouraged to learn the proper use of information technology through individual
learning or by attending training sessions or classes. Each user is responsible for
checking computer software and data files he/she introduces to any computer on the
college network for computer viruses. Each user accepts responsibility for backup
and security of his or her own work. Each user should learn how to make backup copies
of important work and learn and properly use software features for securing or sharing
access to their information.
- Use resources efficiently. Accept limitations or restrictions on computing resources,
such as storage space, time limits or amount of resources consumed, when so instructed
by the College. Each e-mail user is responsible for managing his or her message storage.
Such restrictions are designed to ensure fair access for all users.
- Abide by all security provisions. Distributing or making your password or another
person's password or access code available to unauthorized persons or otherwise attempting
to evade, disable or "crack" passwords or other security provisions, or assisting
others in doing so threatens the work, privacy and well-being of others and is prohibited.
- Respect the rights of others to have freedom from harassment or intimidation. Sending
abusive or unwanted material is a violation of College policies, may violate the law,
and is prohibited. Targeting another person, group or organization to cause distress,
embarrassment, injury, unwanted attention, or other substantial discomfort is harassment
is prohibited. Personal attacks or other actions to threaten, intimidate or embarrass
an individual, group or organization are prohibited. NPC will be the arbiter of what
constitutes proper conduct, consistent with College policies.
- Recognize the College's right to access, review, and monitor the use of computing
resources, including but not limited to equipment and usage, as well as the data that
is stored or transmitted.
- Observe proper online etiquette. Online networks shall be used only as permitted by
the College, only in accordance with applicable College policies, and only for lawful
purposes. Any conduct that in the College's discretion restricts or inhibits others
from using an online network or violates College policies or applicable law is not
permitted. Users are prohibited from posting on or transmitting through any on-line
network any unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar,
obscene, profane, hateful, racially or ethnically demeaning or threatening or otherwise
objectionable material of any kind, including without limitation, any material which
encourages conduct that would constitute a criminal offense, give rise to civil liability
or otherwise violate any applicable law or college policies. Use of any on-line network
to send unsolicited advertising, promotional material or other forms of solicitation
to others is prohibited, except as permitted by law and when not prohibited by College
policies. Downloading and/or manipulation of, or the creation, sending, or forwarding
of messages or other content which pertain to or act on behalf of organizations not
part of the mission of National Park College (such as religious groups, fraternal,
political, private or athletic organizations, etc.) is prohibited. The College reserves
the right to restrict and/or interrupt communications through or by use of any College
computers or information technology services, which the College believes to be harmful
to the College or to others.
- College information technology resources may be used for lawful and permitted purposes
only. Non-compliance with any of the provisions of these standards may subject the
user to sanctions and/or criminal prosecution, as well as personal liability in a
B. Prohibited Conduct
- Unauthorized attempts to monitor another user's password-protected data or electronic
communication, or delete another user's password-protected data, electronic communications
or software, without that person's permission.
- Installing or running on any system a program that is intended to or is likely to
result in eventual damage to a file or computer system.
- Performing acts that would unfairly monopolize computing resources to the exclusion
of other users.
- Use of computing resources for non-National Park College commercial purposes.
- Use of software, graphics, photographs, or any other tangible form of expression that
would violate or infringe any copyright or similar legally recognized protection of
intellectual property rights.
- Activities that would constitute a violation of any policy of National Park College’s
Board of Trustees, including (but not limited to) the College’s non-discrimination
policy and its policy against sexual harassment and sex discrimination.
- Intentionally transmitting, storing, or receiving data, or otherwise using computing
resources in a manner that would constitute a violation of local, state or federal
law, including (but not limited to) obscenity, defamation, threats, harassment, and
- Attempting to gain unauthorized access to a remote (non-NPC) network or remote computer
- Exploiting any NPC computing resources system by attempting to prevent or circumvent
access, or using unauthorized data protection schemes.
- Performing any act that would disrupt normal operations of computers, workstations,
peripherals, or networks.
- Using computing resources in such a way as to wrongfully hide the identity of the
user or pose as another person. 12. Installing any software on College computers without
proper software licenses. Always abide by the terms of all software license agreements.
Unauthorized copying of software is illegal and expressly prohibited.
All users of the College’s computing resources are responsible for reading and understanding