Procedure 3.5.1(p)1. LTC Acceptable Computer And Internet Use
    
	This procedure addresses the issues of etiquette, ownership, professionalism, acceptable use, misuse, privacy/security, training, disciplinary action of guidelines violation, and legalities. It explains what are acceptable uses and what are unacceptable uses and gives examples. By following this procedure, Lanier Technical College (LTC) users will help in conserving technology resources and in using resources in a professional manner.
	Technical College System of Georgia's Acceptable Computer and Internet Use Procedure
	Technical Colleges throughout the country are moving into the information age by providing computer systems and Internet access for their students and employees.
	In making decisions regarding access to the Internet and use of its computers, the Department considers its own stated educational mission, goals, and objectives. Electronic information research skills are now fundamental to preparation of citizens and future employees. The Department expects faculty to blend thoughtful use of the Internet throughout the curriculum and provide guidance and instruction to students in its use. As much as possible, access from Technical Colleges to Internet resources should be structured in ways that point students to those resources that have been evaluated prior to use. While students shall be able to move beyond those resources to others that have not been previewed by staff, they shall be provided with guidelines and lists of resources particularly suited to learning objectives. Students and employees utilizing Technical College-provided Internet access are responsible for good behavior on-line just as they are in a classroom or other area of the college.
	Using a computer without permission is theft of services and is illegal under state and federal laws. Federal law prohibits misuse of computer resources. In addition, the following specific computer crimes are prohibited by state law in Georgia ( O.C.G.A. § 16-9-90 et seq.):
	
		- Computer theft (including theft of computer services, intellectual property such as copyrighted material, and any other property);
		
 - Computer trespass (unauthorized use of computers to delete or alter data or interfere with others' usage);
		
 - Computer invasion of privacy (unauthorized access to financial or personal
		data or the like);
		
 - Computer forgery (forgery as defined by other laws, but committed on a
		computer rather than on paper);
		
 - Computer password disclosure (unauthorized disclosure of a password
		resulting in damages exceeding $500 - in practice, this includes any disclosure
		that requires a system security audit afterward);
		
 - Misleading transmittal of names or trademarks (falsely identifying yourself or
		falsely claiming to speak for a person or organization by using their name,
		trademark, logo, or seal).
	
 
	Maximum penalties for the first four crimes in the list are a $50,000 fine and 15 years of
	imprisonment, plus civil liability. The maximum penalties for computer password disclosure are
	a $5,000 fine and 1 year of imprisonment, plus civil liability.
	The purpose of Technical College-provided Internet access is to facilitate communications in
	support of research and education. To remain eligible as users, students' use must be in
	support of and consistent with the educational objectives of the Department. Access is a
	privilege, not a right. Access entails responsibility.
	Users should not expect files stored on Department or Technical College-based computers to
	be private. Electronic messages and files stored on Technical College-based computers shall
	be treated like other Technical College premises that are temporarily assigned for individual
	use. Administrators may review files and messages in an effort to maintain system integrity and
	in an effort to insure that users are acting responsibly. Moreover, Department and Technical
	College officials shall cooperate with law enforcement officials who are properly authorized to
	search Department and Technical College computers and computer systems.
	All information created, stored or transmitted by Department or Technical College computers or
	networks is subject to monitoring for compliance with applicable laws and policies.
	The following uses of Department or Technical College-provided computers, networks and
	Internet access are not permitted:
	
		- To access, upload, download or distribute, obscene material;
		
 - To transmit obscene, abusive or threatening language;
		
 - To violate any local, state or federal statute;
		
 - To vandalize, damage, or disable the property of another individual or
		organization;
		
 - To access another individual's password, materials, information, or files
		without permission;
		
 - To violate copyright or otherwise use the intellectual property of another
		individual or organization in violation of the law, including software piracy;
		
 - To engage in any personal commercial enterprise without advance approval in
		writing by the President of the Technical College;
		
 - To knowingly endanger the security of any Department or Technical College
		computer or network;
		
 - To willfully interfere with another's authorized computer usage;
		
 - To connect any computer to any of the Department or Technical College
		networks unless it meets technical and security standards set by the Department;
		
 - To create, install, or knowingly distribute a computer virus,
		"Trojan horse," or other surreptitiously destructive program on any Department or
		Technical College computer or network facility, regardless of whether any
		demonstrable harm results; and
		
 - To modify or reconfigure the software or hardware of any Agency computer or
		network without proper authorization.
	
 
	Users of Department and Technical College computers and computer systems are
	subject to the Department's policy on the development of Intellectual Property. Any
	violation of this policy and rules may result in disciplinary action against the employee or
	student. When and where applicable, law enforcement agencies may be involved.
	The Department makes no warranties of any kind, either express or implied, for the computers,
	computer systems and Internet access it provides. The Department shall not be responsible for
	any damages users suffer, including but not limited to loss of data resulting from delays or
	interruptions in service. The Department shall not be responsible for the accuracy, nature or
	quality of information gathered through Technical College diskettes, hard drives or servers; nor
	for the accuracy, nature or quality of information gathered through Technical College-provided
	Internet access. The Department shall not be responsible for personal property used to access
	its computers or networks or for Technical College-provided Internet access. The Department
	shall not be responsible for unauthorized financial obligations resulting from Technical College provided
	access to the Internet.
	The foregoing standards are equally applicable to employees of the Department, wherever
	housed, and to employees and students of the Technical College.
	Penalties
	Violations of these policies incur the same types of disciplinary measures as violations of other
	Department or Technical College policies or state or federal laws, including criminal
	prosecution.
	
Lanier Technical College Specific Policy
	The Lanier Technical College Acceptable Computer And Internet Use Policy is the same as the Department of
	Technical and Adult Education's Acceptable Computer And Internet Use except that it is supplemented by the
	following:
	Etiquette
	
		- Report any hardware, software,1 or virus problems immediately to the appropriate instructor or
		staff.
		
 - Keep electronic messages brief and simple.
		
 - Send messages to the correct person. Remember replying to a message addressed to "all" will
		result in the message going to everyone that originally received the message.
		
 - Store on desktops and include in messages only those items and information that you would not
		mind reading in a newspaper or learning in a court of law. Documented court cases exist where
		electronic mail messages have been used as evidence.
		
 - Maintain a sense of humor; the person receiving the message has feelings.
		
 - Since the use of all CAPS depicts anger, use uppercase and lowercase letters in electronic
		messages.
		
 - Proofread all electronic messages before sending.
	
 
	Ownership
	
		- All information, hardware, software, and data are confidential and proprietary and are the
		exclusive property of LTC.
		
 - Do not copy or delete software files.
	
 
	Professionalism
	
		- Professionalism and personal courtesy and conduct are expected of all LTC users always.
		
 - Resources are not sufficient to provide e-mail for students, but students may access e-mail from
		an Internet service provider of their choice through PC facilities in the school library/media
		center.
		
 - Students' e-mail messages will be removed from the library/media center computers after each
		session.
	
 
	Acceptable Use
	In addition to the computer system's use as a business tool, the following are guidelines for acceptable use:
	
		- No software is to be added to any computer, PC, or network server owned or leased by the
		College. Do not load personal software or download software from the Internet onto computers.
		Exceptions are permitted on computer laboratory workstations ONLY in those computer labs
		specifically designed for or equipped with removable hard drives for this purpose and ONLY as
		directed by the instructor for the specific course requiring such modifications. Arrangements for
		modifications necessary to accommodate special needs students may be made through the
		Special Services Office.
		
 - Do not reconfigure the screen settings, software, or hardware. Exceptions are permitted on
		computer laboratory workstations ONLY in those computer labs specifically designed for or
		equipped with removable hard drives for this purpose and ONLY as directed by the instructor for
		the specific course requiring such modifications. Arrangements for modifications necessary to
		accommodate special needs students may be made through the Special Services Office.
		
 - Computer laboratory workstations that have CD writers installed are to be used for saving
		students' files/data only. Any other usage of the CD writers including reproduction of audio or
		software disks is subject to disciplinary action.
		
 - Do not use workstations for activities that use excessive bandwidth such as chat rooms, real time
		chats, e-mail chain letters, automated bulk mailing, music, or streaming video.
		
 - Computer laboratory workstations may be used only as directed by the instructor.
		
 - Library/Media Center workstations may be used freely for research and educational purposes
		and for recreational web browsing; however, students must relinquish use of workstations if
		others are waiting to use them for class work.
	
 
	Misuse
	The following listing consists of examples of misuse of the LTC computer system and are prohibited:
	
		- Unauthorized entry into the system
		
 - Unauthorized usage of the system
		
 - Unauthorized transfer of information
		
 - Tampering with the files of other people
		
 - Interfering with the work of other people
		
 - Sending or forwarding electronic chain letters
		
 - Resending the same message repeatedly
		
 - Transmitting, receiving, printing, or publishing any material that could be considered libelous,
		defamatory, abusive, threatening, or obscene
		
 - Personal usage for profit or gain
		
 - Personal usage that interferes with job responsibilities
		
 - Solicitation or selling of anything, especially fund-raising items
		
 - Advertisements and "want-ads" sent by e-mail
	
 
	Legalities
	
		- Electronic mail is classified as writing under the Federal Rules of Civic Procedure, meaning that
		in litigation, an opponent has the right to obtain copies of electronic mail relevant to the litigation.
		
 - Software, electronic mail, and some information obtained from the Internet are subject to
		copyright violations.
	
 
	Disciplinary Action for Procedure Violation
	Violations of this procedure are subject to disciplinary action.
	
		- Students and other users who violate acceptable computer and Internet use guidelines will receive a warning for the first violation; however, an additional violation will result in loss of computer privileges and/or other disciplinary action up to and including dismissal from the College.
	
 
	Additional Guidelines for Lanier Technical College Staff and Faculty
	Professionalism
	
		- Electronic mail, also called e-mail, is a global communication tool provided for the faculty and staff at
		LTC for sharing information, improving communication, and exchanging ideas. This tool provides ease
		of use, immediate communication, and a cost savings over both paper and telephone communication.
		All personnel at LTC who have electronic mail available are encourage to use this tool efficiently and
		professionally to conduct routine concerns of the College
		
 - Messages concerning the internal celebrations of LTC are encouraged. For example, announcing a
		bridal shower for a current LTC employee or announcing an award celebration for a LTC employee is
		acceptable.
	
 
	Training
	
		- The individual user of a computer, the Internet, and/or electronic mail should be trained on proper use.
		Information Technology Services personnel are not responsible for training users.
	
 
	Privacy/Security
	
		- Electronic mail is an insecure public system. The Information Technology Department provides
		electronic mail security on the mail server, but it is the individual user's responsibility to provide
		desktop security. Passwords aid each user in protecting the security of the computer. Antivirus
		scanning of files, particularly executable files, attached to a message will also protect the
		user's desktop computer from infection. These actions are the responsibility of the individual
		user and not the responsibility of the systems personnel.
		
 - Desktop passwords should be changed monthly.
		
 - Delete electronic mail messages after 30 days to avoid exhausting the resources of the LTC
		electronic mail system. Electronic mail messages may be deleted from the server after 90 days
		to avoid depleting these resources. System backup copies are made regularly. Mail IDs could
		be suspended if inactive over 120 days. Employees on extended leave should have their e-mail
		aliased to another user until they return.
	
 
	Disciplinary Action for Procedure Violation
	Violations of this procedure are subject to disciplinary action.
	
		Employees who fail to comply with these guidelines will be disciplined up to and including
		termination of employment.
	
	
	1 Software includes, but is not limited to, any storage media (CDs, diskettes, tapes, etc.) and any Internet access, whether or not files are downloaded.