Computer Services Policies
The use of the college’s computing and electronic communication resources is a privilege, not a right. That privilege can be revoked at any time if a user violates policies outlined here and contained in detail on the college website.
The Information Resource Use Policy is designed to ensure the ethical, efficient, effective and lawful use of computer hardware, software, networks and systems. Students who violate the policy will receive appropriate disciplinary action from the College and may also face legal action from civil authorities.
No provision of the college’s policy supersedes or limits any state or federal laws, or any other Texas State University System or Lamar State College Port Arthur policies regarding confidentiality, information dissemination or standards of conduct.
The College is committed to:
- Providing students with the computer hardware and software necessary to perform their instructional assignments;
- Protecting its computer environment from viruses;
- Maintaining compliance with the U. S. copyright laws and software license agreement and;
- Discouraging and monitoring for copyright infringement.
Each user is granted non-commercial use of the computing and communications facilities and services of the College according to rules that may be posted at those facilities, and to the terms described in this publication. A student who illegally duplicates software and/or its documentation, violates the policies of the Information Resources Use Policy or otherwise fail to comply with the college’s third-party software license agreements, will be subject to disciplinary action up to and including expulsion from school.
Computer Facilities Policy
The college’s computer facilities are provided for the support of college programs. All users are responsible for seeing that the facilities are used only for transaction of college business. Computer facilities and accounts are owned by the College and may be used only for college-related activities.
The College reserves the right to allocate and restrict access to computer resources. Users may not use computer systems, facilities or services in any way that diminishes or interferes with the reasonable and confidential use of those systems.
The College retains the right to access and immediately remove any data or files that demonstrate misuse.
Account access information assigned to an individual is not to be given to another individual. The individual assigned to an account is responsible for all activity for which that account is used.
The following policies govern the use of all college computing facilities. Any use of these facilities in any way other than those stated below will be considered in violation of college policy.
- Users are accountable for using computer facilities in an effective, ethical and lawful manner.
- Use of college computer facilities to create, display, modify, or transmit files that are abusive, harassing, threatening, indecent, or illegal is expressly prohibited.
- Material that might be considered indecent, abusive, harassing or threatening may be accessed, activated and viewed only insofar as those materials and resources are required to perform legitimate college-related functions.
- Illegal material may not be accessed, viewed or stored on college computer facilities.
- Conduct that involves the use of computing or communications resources to violate a college policy or regulation, or to violate another’s rights, is a serious abuse and can result in limitation of privileges and lead to appropriate disciplinary action.
Software Use Policies
Neither licensed software, nor college-developed software, shall be copied except as specifically stipulated in license agreements or in The Texas State University System Rules and Regulations. All software protected by copyright shall not be copied except as specifically stipulated by the owner of the copyright.
Students have permission to use licensed software according to the regulations established by the College. The use of such software is governed by the terms of licensing agreements between the College and the software licensors. Users must read and abide by the terms of those agreements.
Internet Use Policies
The College maintains a connection to the internet in support of its mission. Users must be aware that all internet usage, including source and destination, can be recorded and stored. Users have no right to privacy with regard to internet use.
The College has the ability and right to view any user’s usage patterns and act to assure internet resources are devoted to maintaining the highest levels of productivity.
The internet path record is the property of the College and therefore the people of the State of Texas. Such information is subject to the Texas Public Information Act and the state laws applicable to records retention.
Using the college’s internet connection to access information, images or other materials that violate any federal laws, state laws, Texas State University System rules or LSCPA policies is strictly prohibited. Using the internet connection to access other computer systems in violation of state or federal law is prohibited. Using the internet connection to access other computer systems in violation of the policies of the entity that owns those systems is strictly prohibited.
Electronic Messaging Policies
Access to and the responsible use of modern information resources are essential to the pursuit and achievement of excellence. The College encourages the appropriate use of electronic messaging to enhance productivity. Use of these resources must be consistent with the college’s goals of education, research, and public service.
“Electronic messaging” refers to those computer applications such as email, instant messaging, video and/or audio conferencing/collaboration, chat rooms, newsgroups, list servers, streaming media, message boards or any other application that allows a user to interactively or passively communicate with one or more persons or entities using the college computing or communications resources.
Responsible users of electronic messaging applications are expected to act in accordance with the following policies based on common sense, common decency and civility applied to the networked computing environment.
Information sent as electronic messages should meet the same standards for distribution or display as if they were tangible documents or instruments. Users must be clearly and accurately identified in all electronic communications.
Concealing or misrepresenting a name or affiliation in order to be dissociated from responsibility for actions taken is never appropriate. Alteration of the source of electronic messages or postings is unethical and possibly illegal.
Electronic messaging facilities are for college-related activities only. All electronic messaging files belong to someone. Aside from the college’s right of access, they should be assumed to be private and confidential unless the owner has explicitly made them available to others.
The College cannot guarantee the privacy or confidentiality of electronic documents or communications.
Users must respect the rights of others and must not send, post or broadcast abusive, threatening, illegal, indecent or harassing materials. While debate on controversial issues is inevitable and essential, users must do so in a way that actually advances the cause of learning and mutual understanding.
Electronic messaging and other network resources may not be used for commercial purposes or for personal financial gain.
The same standards of conduct expected of users regarding the use of telephones, libraries and other college resources apply to the use of electronic messaging.
Users will be held no less accountable for actions in situations involving electronic messaging than when dealing with other media.
Any communication where the meaning of the message, or its transmission or distribution, would be illegal, unethical or irresponsible is to be avoided.
Telephone System Use Policies
The college’s telephone facilities include any telephone or voice communication device including the Phone Mail System.
Users shall:
- Be accountable for using these facilities in an effective ethical and lawful manner.
- Only use those facilities for which they have authorization, whether these facilities are at the College or at any other facility accessible through the telephone network.
- Take all reasonable steps to protect the privacy of others as well as the integrity of the College. Users shall not share with others PIN numbers, passwords, or any other authorization which has been assigned to them.
- Be aware that all calls are monitored by a Call Detail Recording System located in the Computer Center. These reports are published to the President, Vice President of Academic Affairs and the Director of Computer Services monthly and are available to the Department Chairs upon written request.
Consequences of Information Resources Policy Violations
An individual’s computing and communications resources use privileges may be suspended or restricted immediately upon discovery of any policy violation. Removal of the suspension or restriction will be by appeal to the Director of Information Technology Services or the Vice President for Academic Affairs. Continued or major violations of these policies may result in the College exercising its right to deny future computing privileges. In addition, any user found in violation may also be subject to further disciplinary action by the College, including termination of employment or suspension from school, as well as legal action under state and federal laws, and legal action by the owners and licensors of proprietary software for violation of copyright laws and license agreements.