Phoenix College Policy for Use of Information Technologies
Phoenix College provides information technologies to support the mission and purposes of the institution. These technologies are intended for the sole use of College students, faculty, staff, and other authorized users.
Information technologies include (but are not limited to) client/server computing systems, personal computers, computing workstations, communications servers and networks, computing and communications accounts and files, printers, personal digital assistants, software, electronic mail, video systems, fax machines, telephones and telephone switches, telephone long distance accounts, and voice mail accounts. It is the policy of Phoenix College that these resources be used ethically and legally, in accordance with policies of the Maricopa Community Colleges.
Services Provided to Students
Students registered in credit courses will be provided with the following computing and communications services at the start of the semester in which they have paid their tuition and fees:
- Access to networked computers
- Access to networked productivity applications (word processing, etc.)
- Online computer file storage space
- E-mail accounts
- Wireless Internet access
Services Provided to Employees
Upon request of their supervisor, faculty and staff will be provided with the following computing and communications services:
- Access to a networked computer
- Access to networked-based productivity applications (word processing, etc.)
- Online computer file storage space
- E-mail accounts
- Internet and Intranet access
- Voice mail
- Long distance telephone calling access
The Information Technology (IT) department has responsibility for maintaining, configuring, networking, and managing all information technologies. Hardware, software, network, or security problems should be reported to the Help Desk as soon as possible. Only authorized personnel may configure, alter, or repair information technologies systems/equipment. To ensure adequate network performance, network traffic will be monitored. IT will take appropriate action if any computer on the network causes traffic problems which interferes with the business of the College. If, in the course of monitoring network traffic, information which may have adverse legal implications for the College is discovered, it will be reported to Office of General Legal Counsel. Access to computing and communications systems, including the issuing of passwords, must be approved through IT.
Use of personal software and hardware on College computers is prohibited without authorization from IT. Software is subject to licensing and all license provisions (including) copyright, use, duplication, simultaneous use, etc.) must be honored.
Each account owner and workstation user is solely responsible for their account and/or computer. Do not share your user identification with another person. If you do, you will be solely responsible for the actions of the other person. Individuals who intentionally misuse account privileges, degrade system performance, misappropriate, or interfere with the operation of information technologies may be subject to disciplinary actions. Use of information technologies is a privilege which may be revoked at any time by:
- Failing to respect civil standards of communication and compliance with College policies by sending, printing, requesting, displaying, or storing fraudulent, harassing, sexual, racial, obscene or otherwise offensive messages, images, audio files, and/or materials
- Breaking into another user's electronic mail account or voice mailbox, sending forged electronic mail to intimidate or harass other users, sending chain messages or promotional mail
- Obtaining, possessing, using, or attempting to use passwords or other information, sharing your account and/or assisting others in unauthorized access of campus or remote systems
- Attempting to read, inspect, modify, distribute, delete, or copy data, mail messages, or software without proper authorization
- Tapping phone/data lines or accessing files by circumventing privacy or security restrictions
- Attempting to circumvent or subvert any system security measures or decode passwords
- Introducing computer "viruses" or other disruptive/destructive programs into the College network or into external networks
- Evading or changing a resource quota; damaging or disrupting a computing or communications system, network or program
- Applying for a computing or communications account under false pretense
- Using facilities and/or technologies for commercial purposes
- Using information technologies for recreational game playing, Internet relay chatting, or other types of interactive gaming
- Storing illegal software or copyrighted materials on the network, such as mp3's or pirated software applications.
As a user of information technologies, you are subject to applicable Arizona State and Federal laws. Violations will be referred to the Dean of Information Technology and/or the Dean of Student Services. Phoenix College reserves the right to investigate suspected violations using all appropriate means. Furthermore, the College may terminate or restrict any person's access to its technologies, without prior notice, if such action is necessary to maintain availability, security, and integrity of operations for other users of the technologies. Those who cannot accept these standards of behavior will be denied use of Phoenix College information technologies. The Phoenix College Student Handbook (published annually) and employee policy manuals approved by the Maricopa Community Colleges Governing Board contain processes for addressing violations of these policies.