Please enable JavaScript to view this page.

Delta College Access & Use Guidelines

  1. By accessing College electronic resources you assume personal responsibility for their appropriate use and agree to comply with all applicable College policies and procedures as well as external networks' policies and procedures, local, state and federal laws and regulations.
  2. You are solely responsible for your access and use, and may not transfer or share your passwords or account.
  3. Delta College electronic resources are provided to support the college mission. Uses such as private business use or use for personal gain, non-profit activities, advertising and fundraising not related to the college are prohibited. Excessive personal use for activities such as game playing, financial transactions or communicating with family and friends is also prohibited.
  4. Uses that threaten the integrity of any system or its contents, the function of resources accessed through the system, the privacy or safety of anyone, or that are illegal are forbidden.
  5. Misuse can lead to penalties up to and including loss of system access, employment termination, expulsion from classes or from the college, and may also lead to a requirement to repay costs associated with any damages caused to the College or other users. In addition, some activities may lead to risk of personal legal liability, both civil and criminal, under local, state and federal laws and regulations. Use common sense: the same rules of courtesy, ethics, morality and law apply here as elsewhere.
  6. All persons accessing the College's electronic resources are covered by these guidelines, whether faculty, staff, students, trustees, volunteers, emeritus or retired persons, guests, or any other user.
  7. The College is not responsible for personal equipment, software or data including without limitation personal laptops, personal computer peripherals or data on removable media. Users connect to College systems at their own risk.
  8. All electronic resources of the College are covered by these guidelines, including without limitation all networks, network and internet bandwidth (wired or wireless), supporting backbones and links, stand-alone computers, telephones, output devices including printers, shared computers, and connecting resources of any kind (ex. projectors, cameras), including any external networks.
  9. You should not assume that anything received, sent or stored on any of these systems is private. The College generally, and system administrators specifically, will respect the privacy of users. However, these systems are not provided or intended for sending or receiving private or confidential communications. If material is stored electronically rather than in paper files, it must be just as accessible to others who need access to those files as any paper file would be. In addition, system administrators have access to all mail and user access requests and will monitor them as necessary to assure efficient performance and appropriate use. If access discloses improper or illegal use, it may be reported and penalized. Legal process, including requests for information under the Freedom of Information Act, may also compel disclosure.
  10. Each user must respect the privacy of every other user. You may not attempt to access, copy, modify or otherwise view or use the passwords, data, or electronic resources of any other user, except as expressly authorized in writing by the Chief Information Officer (CIO) of the Office of Information Technology (OIT).
  11. You may not represent yourself as someone else, or send messages that appear to originate from someone else ("spoofing").
  12. You have free speech and academic freedom rights in electronic forms of communication as you do in other forms of communication. However, your responsibilities may be somewhat different because of the nature of the medium. Electronic messages may be accessible to unintended audiences. The College will not impose restraints or monitor content of communications except as required by applicable law and system administration requirements. Your communications are subject to such laws, including those regarding others' rights to privacy, licensing or copyright, prohibition of defamation, or prohibition of harassment or stalking, and the consequences of violations can be severe.
  13. Your access to resources of the College, including access to electronic resources, is a privilege and not a right. Access to the College's electronic resources must be authorized. Unauthorized access may be subject to penalties assessed by the College and by outside legal authority.
  14. You must observe classroom and computer lab policies and procedures, and comply with instructions of support staff in the computer labs and OIT staff. In particular, you will vacate workstations or the facility and will surrender other resources (such as printers and software) promptly when asked to do so both at closing times and when necessary to permit access by others.
  15. You should assume that anything you access may be copyrighted. Absence of a © notice does not mean that the material is not copyrighted. For example, before you download a document, an image, or any other media to your web page, you should ask the author's permission.
  16. You have full responsibility for statements made via the electronic resources of the College, including statements on any personal Web pages. Such statements do not represent the opinions of the College or any other member of the College community. Your personal Web page should include the following disclaimer at the bottom of the first page: "This space is provided as a service by Delta College . Views and content expressed do not necessarily reflect those of the College."
  17. The following list is provided as an illustration, but not an exhaustive list, of the kinds of uses that could subject you to penalties by the College or by outside authority:
      • Harassment, such as repeated unwanted communication or communication that threatens;
      • Violation of others' privacy;
      • Destruction or damage to equipment, software or data of the College or others;
      • Violation of computer system security;
      • Use of computer accounts or access codes without permission, or permitting another unauthorized person to use accounts or access codes;
      • Violation of copyright or software license agreements;
      • Negligent or deliberate inappropriate use of the resource in ways that degrades service for other users, including viruses, Trojan Horses, worms and the like;
      • Academic dishonesty;
      • Violation of College policy or local, state or federal law;
      • Using computer resources for any purpose which is criminal, unethical, dishonest, damaging to the reputation of the College, or likely to subject the College to liability;
      • Unauthorized access to College bandwidth (wired or wireless);
      • "Spamming" or the non-commercial equivalent, defined as sending a large volume of unsolicited e-mail which is irrelevant to most if not all recipients.
  18. Consequences and process will depend on the violation. When required to protect others or system integrity, immediate termination, removal of pages or other materials, suspension of user privileges, or other actions may occur. Otherwise, the user will normally be notified of the alleged infraction and will have an opportunity to respond to a person or body separate from system administration, and will have an opportunity to appeal. The process used will depend on the nature of the alleged infraction, and could be heard under the Judicial Process, Senate Policy 2.065; Student Violation of College Rules and Regulations, Senate Policy 8.045; Disciplinary Action, Support Staff Policies and Procedures 1.12; the Grievance/Complaint Procedures for Equal Opportunity/ Equity Concerns, or other appropriate college policies, procedures, or guidelines, or could be referred to outside legal authorities where violations of local, state or federal law are involved. Penalties imposed may range from warnings to suspension of privileges for a temporary, definite, or indefinite period, to termination of employment or expulsion from classes or from the College, to civil suit or criminal prosecution and the penalties resulting from those actions.
  19. Delta College reserves the right to monitor, manage, and control the usage of these resources and to make changes in these guidelines without prior notice.

Last Revision 09/07/2006