Performing any unauthorized, deliberate action that results in damage or disrupts a computing system (i.e. mainframe computers, minicomputers, microcomputers, laptops, mobile devices, networks, software, data, facilities, and related supplies), or alters its normal performance, or causes it to malfunction is prohibited. Internet use is for educational purposes only.
- Information Technology Security:
- Users must read, understand, and adhere to all Central Texas College District policies and exercise good judgment in the protection of information resources. Students and guests will follow the rules posted within computer labs. If computer usage rules are not available, users should follow local, state, and national laws regarding computer and Internet usage. Users shall log off systems when they are finished.
- Central Texas College District is not responsible for privately owned systems (e.g., laptops) or data that becomes compromised due to wireless network usage. Users utilizing the Central Texas College District student/guest wireless network do so at their own risk and are encouraged to transmit sensitive data only when strong encryption becomes available.
- Central Texas College District provides open access to an unencrypted student/guest wireless network. Wireless access points not authorized and not managed by the IT Division are not permitted and will be shut down upon discovery by IT.
- Central Texas College District is not responsible for any illegal content that is received, transmitted, or stored by the user.
- Users gaining access to Central Texas College District resources via a virtual private network (VPN), the wireless network, or Outlook Web Access (OWA) are responsible for ensuring their systems are free of malware.
- Users should exercise caution when opening email and browsing the Internet, and should avoid opening unexpected or suspicious attachments.
- Users shall immediately report any suspected or known information security compromises to the IT Help Desk.
- User Security Violations:
User violations include, but are not limited to:- Interfering with the operation of anti-virus/malware detection software installed by the IT Division.
- Generating malicious or illegal traffic, or attempting to gain access to sensitive or personal data belonging to Central Texas College District or other entities.
- Engaging in any activity that is illegal under local, state, or federal law or laws of the applicable host country while utilizing Central Texas College District owned or leased resources.
- Examining, copying, modifying, or deleting files and/or data belonging to other users without their prior consent.
- Using Central Texas College District computer systems and/or networks to gain unauthorized access to remote systems.
- Making any intentional attempts to obtain unauthorized access to or otherwise interfere with the operation of network systems or programs.
- Willfully introducing computer malware into the Central Texas College District network.
- Intentionally operating any network-intensive application that overloads the network.
- Executing port scans, security scans, or any form of network monitoring which will intercept data not intended for you.
- Forging or attempting to forge electronic mail messages or header information.
- Attempting to read, delete, copy, or modify the electronic mail of other users.
- Sending or attempting to send harassing, obscene, or other threatening e-mail to another user.
- Making illegal copies of software licensed to Central Texas College District.
- Using Central Texas College District-owned computer accounts, computer and communications equipment, software, or networks for commercial purposes.
- Using software and hardware provided by Central Texas College District for work outside the teaching, learning, and professional mission of Central Texas College District.
- Modifying configuration options or installing additional software that may cause increased security vulnerabilities. For example, installing software or devices to allow remote access to a Central Texas College District-owned computer in such a way that would bypass existing security measures.
- Encroaching on others’ use of shared computing resources. Such encroachment shall include, but is not limited to, creating a disturbance, displaying or disseminating offensive material, or otherwise interfering with others’ use of shared computing resources.
- Connecting any wireless access devices to the campus network without prior approval from Information Technology.
- Attempting to decrypt system or user passwords or other encrypted information.
- Attempting to secure a higher level of privilege on network systems, or attempting to subvert the restrictions associated with your use of accounts and/or software.