Examples of Acceptable or Unacceptable uses of technology, not limited to what is listed below.
Acceptable | Unacceptable |
---|---|
Completing course work | Video games not related to educational activities |
School-related research | Torrenting, sharing, or downloading unauthorized copies of data |
Communication with peers and college service areas | Sharing, downloading or installing cracked, unauthorized or malicious software |
Project-related work/research | Any illegal activities or actions that break laws or regulations |
Occasional personal activities such as social media | Removing technology resources or data from College systems, classrooms, or campuses without permission |
| Unauthorized modifications to College technology |
Acceptable | Unacceptable |
Actions related to work/job functions | Video Games not related to educational activities |
Communication with peers and college service areas | Torrenting, sharing, or downloading unauthorized copies of data |
Professional development and training | Sharing, downloading or installing cracked, unauthorized or malicious software |
Occasional personal activities such as social media | Any illegal activities or actions that break laws or regulations |
| Removing technology resources or data from College systems, classrooms, or campuses without permission |
| Unauthorized modifications to College technology |
Acceptable | Unacceptable |
Vendor: Work as outlined in the vendor contract | Software resources not related to educational activities or vendor work |
Guest: General purpose PC use (email, internet browsing, using services/systems) | Torrenting, sharing, or downloading unauthorized copies of data |
| Sharing, downloading or installing cracked, unauthorized or malicious software |
| Any illegal activities or actions that break laws or regulations |
| Removing technology resources or data from College systems, classrooms, or campuses without permission |
| Unauthorized modifications to College technology |