Appendix A – Internet Use PolicyAppendix A – Internet Use Policy admin Wed, 07/10/2019 - 10:13
Authorized Use: Any scholarly activity, AVTEC business activity, or personal activity by an authorized user that does not violate any federal or state law or AVTEC policy.
Authorized Users: Currently enrolled students, authorized guests, or other individuals as approved by the AVTEC Administration or their designee.
Computing resources: Refers to and includes any and all forms of computer-related equipment, tools, and intellectual property. This includes computer systems, personal computers, and computer networks and all forms of software, firmware, operating software, and application software owned by AVTEC or under the school's possession, custody, or control.
E-mail: Electronic mail
Personally Owned Computer (POC): Any desktop or laptop, or handheld computing devices such as tablets, smartphones, gaming devices, or other electronic devices that may connect to AVTEC computing resources owned by an employee or student that is used on campus or in campus housing.
AVTEC Owned Computer (AOC): Any AVTEC-owned desktop computer, laptop computer, or handheld computer that is assigned to or used by an Authorized User.
Personal use of campus computers in offices, computer labs, library, and other areas is allowed within reasonable limits. Authorized users shall be made aware that they are using AVTEC equipment and/or resources, and such use is a reflection on the institution. Authorized users shall be aware that they are subject to all AVTEC policies while personally owned computers are connected to AVTEC’s network.
IT Rights and Remedies
IT Services is responsible for enforcing AVTEC’s Acceptable Use of Computing Resources Policy. It shall be enforced in concert with all other AVTEC policies, as well as local, state, and federal laws pertaining to the use of the network and computer resources. This policy applies to both the AVTEC wired and wireless networks. It is the user’s responsibility to be aware of all relevant policy documents.
Individuals should always have a contingency plan for critical activities, assignments, and/or communications. Campus network resources are as advanced as possible. IT Services cannot control failure of equipment and/or network and/or remote location problems beyond the boundary of AVTEC’s campus.
Enforcement of the Acceptable Use Policy
As a state-owned resource, the Campus Network is monitored. The network data content is not monitored, reviewed, or stored. If connections to and from the user’s computer look unusual, the user will receive an email or phone call from a staff member about the activity. The staff member will attempt to ensure that the computer is configured correctly and/or not infected with a virus. In some cases, the user may be asked to modify their activity.
In extreme cases, the computer may be disconnected from the network without warning. IT Services has the authority, depending on circumstances, to block network access to/from the user’s machine. Repeated violations may result in permanent loss of network connectivity privileges.
Failure to abide by AVTEC’s Acceptable Use of Computing Resources Policy and the AVTEC General Acceptable Use Policy may result in actions including but not limited to:
- Immediate disconnection from the Campus Network without warning
- Disciplinary action, as outlined in AVTEC Housing and Student Affairs Policies
- Legal action under state and federal law
- The user is responsible for registering the computer or electronic device. Go online to: http://www.AVTEC.edu/webform/guest-wireless-internet-access
- If registration information changes, the user must contact AVTEC’s IT Services with the updated information.
- The user is responsible for all network traffic generated by their network-attached device. The user will be held accountable for violations of the applicable policies regardless of whether the user 1) generated the traffic, 2) is aware of the traffic, or 3) is aware of the policy violation.
- The user is responsible for seeking clarification from IT Services about any situations that they feel may violate policy.
- The user is responsible for installing, maintaining, and utilizing a virus prevention application.
- The user is responsible for protecting the wireless network's security software, so it is not transferred from one machine to another. The user is also responsible for the safekeeping of their authentication, user identification, and password.
The performance of AVTEC business, education, and institutional functions require the appropriate use of network resources. Any disruption of the network can penalize hundreds of users on campus. Under no circumstances is an AVTEC student or authorized guest to engage in any activity illegal under local, state, or federal law or to violate the Alaska Administrative Code.
The actions listed below are prohibited and are the responsibility of the user, whether intentional or accidental:
- Violating any state or federal law or regulation
- Any action that would impair the function of the network
- Any action that would deny or impair network service to another system or user
- Operation of any server on the network
- Peer to peer programs that share music, video, or other files
- Hosting a WEB site on a machine connected to the campus network
- Providing access to the AVTEC network to non-authorized users
- Using a computer, computer account, or system without authorization
- Using the campus network to gain unauthorized access to any computer (hacking)
- Connecting to another Internet Service Provider (dial-up, DSL, cable modem) while connected to the campus network
- Performing an act that will interfere with, damage, or otherwise degrade the normal operation of other systems and/or network resources; including, but not limited to, running, installing, or distributing programs known as computer viruses, Trojan horses, and worms
- Attempting to monitor or tamper with another individual's electronic communications, including scans, “sniffers,” and probes of the campus network
- Attempting to circumvent data protection schemes or security mechanisms
- Misrepresenting one’s identity to avoid accountability, including, but not limited to, falsifying one’s E-mail address or impersonating others in any communication form
- Using another individual's computer account identity
- Violating terms of applicable software licensing agreements or copyright protection laws, including making available materials such as music, videos, text, or software without appropriate permission
- Taking any action that invades the privacy of individuals or entities that are creators, authors, users, or subjects of information resources
- Using the network for commercial purposes, for personal financial gain, or the exchange of services for money or any other thing of value. Advertising of the availability for sale of miscellaneous used personal property belonging to the resident is not commercial within the meaning of this paragraph
- Using an unauthorized IP address or statically assigned address
- Using electronic mail, services, or facilities to harass others, including, but not limited to, sending unsolicited mass mailings over the network (chain mail, solicitations, etc.), sending email and/or attachments to an individual who has requested that such email and/or attachments not be sent, using harassing comments or activities during Internet Chat applications
- Connecting a personal wireless switch, router, or access point to the campus network
- Extending the campus network services by modifying the wiring beyond the area of their intended use of one computer per data jack. This applies to all network hardware, computer lab equipment, and in-room data jacks