AR 3720: Computer and Network Use

The Mt. Hood Community College Computer and Network systems are the sole property of the college. They may not be used by any person without the proper authorization of the college. The Computer and Network systems are for college instructional and work-related purposes only.

This regulation applies to all Mt. Hood Community College students, employees, and to others granted use of college information resources. This regulation refers to all College information resources, whether individually controlled or shared, stand-alone or networked. It applies to all computer and computer communication facilities owned, leased, operated, or contracted by the college. This includes personal computers, workstations, mainframes, minicomputers, Audio-visual equipment and associated peripherals, software, and information resources, regardless of whether used for administration, research, teaching, or other purposes.

This regulation is not intended to restrict communications or actions protected or required by state or federal law, including the Oregon Public Employees Collective Bargaining Act.

Conditions of Use

Individual units within the college may define additional conditions of use for information resources under their control. These statements must be consistent with this overall regulation but may provide additional detail, guidelines, or restrictions.

Legal Process

This regulation exists within the framework of Mt. Hood Community College board policy and state and federal laws. A user of college information resources who is found to have violated any of these policies will be subject to disciplinary action up to and including but not limited to loss of information resources privileges, disciplinary suspension or termination from employment or expulsion, or civil or criminal legal action.

Copyrights and Licenses

Computer users must respect copyrights and licenses to software and other on-line information.

Copying - Software protected by copyright may not be copied except as expressly permitted by the owner of the copyright or otherwise permitted by copyright law. Protected software may not be copied into, from, or by any college facility or system, except pursuant to a valid license or as otherwise permitted by copyright law.

Number of Simultaneous Users - The number and distribution of copies must be handled in such a way that the number of simultaneous users in a department does not exceed the number of original copies purchased by that department unless otherwise stipulated in the purchase contract.

Copyrights - In addition to software, all other copyrighted information (text, images, icons, programs, etc.) retrieved from computer or network resources must be used in conformance with applicable copyright and other law. Copied material must be properly attributed. Plagiarism of computer information is prohibited in the same way that plagiarism of any other protected work is prohibited.

Integrity of Information Resources

Computer users must respect the integrity of computer-based information resources.

Modification or Removal of Equipment - Computer users must not attempt to modify or remove computer equipment, software, or peripherals that are owned by others without proper authorization.

Unauthorized Use - Computer users must not interfere with others' access and use of the college computers. This includes but is not limited to: the sending of chain letters or excessive messages, either locally or off-campus; printing excess copies of documents, files, data, or programs; running grossly inefficient programs when efficient alternatives are known by the user to be available; unauthorized modification of system facilities, operating systems, or disk partitions; attempting to crash or tie up a college computer or network; and damaging or vandalizing college computing facilities, equipment, software or computer files.

Unauthorized Programs - Computer users must not intentionally develop or use programs that disrupt other computer users or which access private or restricted portions of the system or which damage the software or hardware components of the system. Computer users must ensure that they do not use programs or utilities that interfere with other computer users or that modify normally protected or restricted portions of the system or user accounts. The use of any unauthorized or destructive program will result in disciplinary action as provided in this procedure and may further lead to civil or criminal legal proceedings.

Unauthorized Access Computer users must not seek to gain unauthorized access to information resources and must not assist any other persons to gain unauthorized access.

Abuse of Computing Privileges - Users of Mt. Hood Community College information resources must not access computers, computer software, computer data, information, or networks without proper authorization or intentionally enable others to do so, regardless of whether the computer, software, data, information, or network in question is owned by the college. For example, abuse of the networks to which the college belongs or the computers at other sites connected to those networks will be treated as an abuse of college computing privileges.

Reporting Problems - Any defects discovered in system accounting or system security must be reported promptly to the appropriate system administrator so that steps can be taken to investigate and solve the problem.

Password Protection - A computer user who has been authorized to use a password-protected account may be subject to both civil and criminal liability if the user discloses the password or otherwise makes the account available to others without the permission of the Information Technology department.

Usage - Computer users must respect the rights of other computer users. Attempts to circumvent these mechanisms in order to gain unauthorized access to the system or to another person’s information are a violation of college regulation and may violate applicable law.

Unlawful Messages - Users may not use electronic communication facilities to send defamatory, fraudulent, harassing, obscene, threatening, or other messages that violate applicable federal, state, or other law or college policies or which constitute the unauthorized release of confidential information.

Commercial Usage - Electronic communication resources may not be used to transmit commercial or personal advertisements, solicitations, or promotions (see Commercial Use below). Some public discussion groups have been designated for selling items by the purchasing department and may be used appropriately, according to the stated purpose of the group(s).

Information Belonging to Others - Users must not intentionally seek or provide information on, obtain copies of, or modify data files, programs, or passwords belonging to other users, without the permission of those other users.

Rights of Individuals - Users must not release any individual’s (student or employee) personal information to anyone without proper authorization.

User identification - Users shall not send communications or messages anonymously or without accurately identifying the originating account or station.

Political, Personal, and Commercial Use – The college is a non-profit, tax-exempt organization and, as such, is subject to specific federal, state, and local laws regarding sources of income, political activities, use of the property, and similar matters.

Political Use - College information resources must not be used for partisan political activities where prohibited by federal, state, or other applicable laws.

Personal Use – College information resources should not be used for personal activities not related to college functions except in a purely incidental manner.

CommercialUse - College information resources should not be used for commercial purposes. Users also are reminded that the “.cc” and “.edu” domains on the Internet have rules restricting or prohibiting commercial use, and users may not conduct activities not authorized within those domains.

Nondiscrimination

All users have the right to be free from any conduct connected with the use of Mt. Hood Community College network and computer resources which discriminates against any person on the basis of sex or gender, national origin, religion, ethnicity, age, gender identity, gender expression, race, color, genetic information, sexual orientation, physical or mental disability, military and veteran status, pregnancy, marital status, or any other status protected under applicable federal, state, or local laws. No user shall use the college network and computer resources to transmit any message, create any communication of any kind, or store information which violates any College regulation, policy, or procedure regarding discrimination or harassment, or which is defamatory or obscene, or which constitutes the unauthorized release of confidential information.

Disclosure

No Expectation of Privacy – The college reserves the right to monitor all use of the college network and computers to assure compliance with these policies. Users should be aware that they have no expectation of privacy in the use of the college network and computer resources. The college will exercise this right only for legitimate college purposes, including but not limited to ensuring compliance with this procedure and the integrity and security of the system.

Possibility of Disclosure - Users must be aware of the possibility of unintended disclosure of communications.

Retrieval - It is possible for information entered on or transmitted via computer and communications systems to be retrieved, even if a user has deleted such information.

Litigation - Computer transmissions and electronically stored information may be discoverable in litigation.

Dissemination and User Acknowledgment

All users shall be provided access to copies of these procedures and be directed to familiarize themselves with them.

Approved: 1/28/08, 9/24/19, 6/14/11, 1/22/16

Revised: 9/22/09, 8/29/23

References: 15 U.S. Code Sections 6801 et seq. ;
17 U.S. Code Sections 101 et seq.;
16 Code of Federal Regulations Parts 314.1 et seq. ;
Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45;
ORS 341.290(4)