Acceptable Use Procedure Examples

Examples of Acceptable or Unacceptable uses of technology, not limited to what is listed below.


Students

​Acceptable

​Unacceptable

​Completing course work​Video games not related to educational activities
​School-related research​Torrenting, sharing, or downloading unauthorized copies of data
​Communication with peers and college service areas​Sharing, downloading or installing cracked, unauthorized or malicious software
​Project-related work/research​Any illegal activities or actions that break laws or regulations
​Occasional personal activities such as social media​Removing technology resources or data from College systems, classrooms, or campuses without permission
​Unauthorized modifications to College technology

Employees

​Acceptable

​Unacceptable

​Actions related to work/job functions​Video Games not related to educational activities
​Communication with peers and college service areas​Torrenting, sharing, or downloading unauthorized copies of data
​Professional development and training​Sharing, downloading or installing cracked, unauthorized or malicious software
​Occasional personal activities such as social media​Any illegal activities or actions that break laws or regulations
​Removing technology resources or data from College systems, classrooms, or campuses without permission
​Unauthorized modifications to College technology

Vendors/Guests

​Acceptable

​Unacceptable

​Vendor: Work as outlined in the vendor contract​Software resources not related to educational activities or vendor work
​Guest: General purpose PC use (email, internet browsing, using services/systems)​Torrenting, sharing, or downloading unauthorized copies of data
​Sharing, downloading or installing cracked, unauthorized or malicious software
​Any illegal activities or actions that break laws or regulations
​Removing technology resources or data from College systems, classrooms, or campuses without permission
​Unauthorized modifications to College technology