Technology Use Standards

Technology Use Standards

Below is a breakdown of Technology Use Standards for Phoenix College students, faculty, staff, and other authorized users.

Phoenix College Policy for Use of Information Technologies

Phoenix College provides information technologies to support the mission and purposes of the institution. These technologies are intended for the sole use of Phoenix College students, faculty, staff, and other authorized users.

Information technologies include (but are not limited to) client/server computing systems, computers, laptops, tablets, printers, communications servers and networks, wireless networks, computing and communications accounts and files, software, electronic mail, video systems, digital signage, fax machines, telephones and telephone switches, telephone long distance accounts, and voice mail accounts. 

Maricopa Community Colleges — Technology Resource Standards

It is the policy of Phoenix College that these resources be used ethically and legally, in accordance with the policies of the Maricopa Community Colleges.

Services Provided to Students

Students registered in credit courses will be provided with the following computing and communications services at the start of the semester in which they have paid their tuition and fees:

  • Access to networked computers
  • Access to productivity applications (word processing, etc.)
  • Online computer file storage space
  • An email account
  • Wireless internet access

Services Provided to Employees

Full-time faculty and staff will typically be provided with the following computing and communications services:

  • Access to a networked computer
  • Access to productivity applications (word processing, etc.)
  • Online computer file storage space
  • An email account
  • Wireless Internet access
  • A telephone
  • Voicemail
  • Long distance telephone calling access (with supervisor approval)

Responsibilities

The Information Technology (IT) department has responsibility for maintaining, configuring, networking, and managing all information technologies. Hardware, software, network, or security problems should be reported to the IT help desk as soon as possible. Only authorized personnel may deploy, configure, alter, move, remove, or repair information technologies systems/equipment. To ensure adequate network performance, network traffic will be monitored. 

IT will take appropriate action if any computer on the network causes traffic problems that interfere with the business of the College. If in the course of monitoring network traffic, information that may have adverse legal implications for the College is discovered, it will be reported to the district's Legal Services Department. Access to computing and communications systems, including the issuing of passwords, must be approved through IT.

Use of personal software and hardware on College computers is prohibited without authorization from IT. Software is subject to licensing and all license provisions (including copyright, use, duplication, simultaneous use, etc.) must be honored.

Each account owner and computer/laptop/tablet/smartphone user is solely responsible for their account and/or device. Do not share your user account information (MEID/password) with another person. If you do, you will be solely responsible for the actions of the other person. 

Individuals who intentionally misuse account privileges, degrade system performance, misappropriate, or interfere with the operation of information technologies may be subject to disciplinary actions. Use of information technologies is a privilege which may be revoked at any time by:

  • Failing to respect civil standards of communication and compliance with college policies by sending, printing, requesting, displaying, or storing fraudulent, harassing, sexual, racial, obscene or otherwise offensive messages, images, audio files, and/or materials
  • Breaking into another user's electronic mail account or voice mailbox, sending forged electronic mail to intimidate or harass other users, sending chain messages or promotional mail
  • Obtaining, possessing, using, or attempting to use passwords or other information, sharing your account and/or assisting others in unauthorized access of campus or remote systems
  • Attempting to read, inspect, modify, distribute, delete, or copy data, mail messages, or software without proper authorization
  • Tapping phone/data lines or accessing files by circumventing privacy or security restrictions
  • Attempting to circumvent or subvert any system security measures or decode passwords
  • Introducing computer "viruses" or other disruptive/destructive programs into the Phoenix College network or into external networks
  • Evading or changing a resource quota; damaging or disrupting a computing or communications system, network or program
  • Applying for a computing or communications account under false pretense
  • Using facilities and/or technologies for commercial purposes
  • Using information technologies for recreational game playing, Internet relay chatting, or other types of interactive gaming
  • Storing illegal software or copyrighted materials on the network, such as mp3's or pirated software applications.

As a user of information technologies, you are subject to applicable Arizona State and Federal laws. Violations will be referred to the Dean of Information Technology (staff) and/or the Dean of Student Affairs (students). Phoenix College reserves the right to investigate suspected violations using all appropriate means. 

Furthermore, Phoenix College may terminate or restrict any person's access to its technologies, without prior notice, if such action is necessary to maintain availability, security, and integrity of operations for other users of the technologies. Those who do not accept these standards of behavior will be denied use of Phoenix College information technologies. The Phoenix College Student Handbook (updated annually), employee policies, and administrative regulations approved by the Maricopa Community Colleges Governing Board contain processes for addressing violations.

Your signature on an account application, on-line registration for a computing or communications account (including your MEID), and/or use of Phoenix College IT systems or services denotes that you understand these policies and accept the above stated terms of use.