Policy 8-1-2: Computing and Network Use Agreement
|Policy:||Policy 8-1-2: Computing and Network Acceptable Use Policy||Date Adopted:||Jul 10, 2008|
|Statement:||All students and staff who use WNC's computing facilities are responsible for knowing the content of Western Nevada College's Computer and Network Acceptable Use Policy.|
Section 1: Appropriate Use
The appropriate utilization of computing resources entails the following:
- Respecting the Rights of Others: Users are expected to show consideration for the rights of other computer users. This includes refraining from activities that may disrupt or impede others' access or use of computing resources.
- Protecting Facility Integrity: The physical and software facilities of the computing system must be safeguarded. Users should take measures to prevent any unauthorized access, damage, or tampering with the hardware or software components.
- Compliance with Licensing and Contracts: Users are required to adhere to all applicable license agreements and contractual obligations associated with the software and resources they utilize.
- Adherence to Regulations and Laws: All users must comply with the regulations set forth by the Nevada System of Higher Education (NSHE) and relevant state and federal laws when using computing resources. This includes, but is not limited to, policies related to privacy, security, and acceptable use.
For students enrolled in WNC courses, it's essential to note that they are considered NSHE students and, as such, are obligated to abide by NSHE policies. Inappropriate use of computing or networking resources may lead to the revocation of computing privileges. In the event of a breach of appropriate use, the following steps may be taken:
- A written warning will be issued to notify the individual of the policy or law violation and the potential suspension of their access if the misconduct persists.
- Compliance with NSHE Code and campus bylaws will be followed if the need arises to suspend computing privileges for faculty, staff, or students.
- However, in situations where the security and functioning of computing systems or networks are jeopardized, immediate access termination may occur.
Moreover, in accordance with NRS 281.481, NSHE employees are prohibited from using NSHE computer resources for personal or financial gain. Personal use should not disrupt official institutional use. Any employee found responsible for intentionally or negligently damaging NSHE computing resources will be held accountable for resulting expenses.
NSHE accounts provided to students, faculty, and staff are for the exclusive use of the designated recipient. Unauthorized access or privileges are strictly prohibited. Users must refrain from attempting to disrupt computing and network services, including activities like the deliberate spread of computer viruses or the excessive sending of unwanted messages to individuals, groups, or the system.
Section 2: Privacy Issues
The NSHE implements security measures to ensure the protection of the following:
- Integrity and Privacy of Electronic Information: NSHE safeguards the integrity and privacy of electronic information, including administrative data, individual data, personal files, and electronic mail. These measures are in place to prevent unauthorized access, tampering, or disclosure of sensitive electronic information.
- Compliance with FERPA (Family Educational Rights and Privacy Act): NSHE ensures strict adherence to all requirements outlined in the Family Educational Rights and Privacy Act (FERPA). This federal law governs the privacy and security of student educational records and sets specific guidelines for their protection.
- Prevention of Security Circumvention: Users are explicitly prohibited from circumventing security measures put in place by NSHE. This policy is enforced to maintain the effectiveness and integrity of the security systems and to prevent unauthorized access or breaches.
By implementing these security measures, NSHE aims to maintain the confidentiality, integrity, and availability of electronic information while upholding legal and regulatory requirements such as FERPA. Additionally, it emphasizes the importance of not attempting to bypass or undermine established security protocols.
Section 3: Internet (NevadaNet)
It's important to be mindful that the NSHE agreement with the Internet access provider includes prohibitions against the following actions:
- Attempted Unauthorized Access or Destruction of Customer Information: Any attempts to gain unauthorized access to or intentionally destroy the information of customers or other users are strictly prohibited.
- Knowingly Causing Denial-of-Service: Engaging in activities with the intent to cause a denial-of-service to any customers is prohibited. This includes actions that disrupt or impede the normal operation of the network, rendering it inaccessible to others.
- Interfering with Network Use: Users are not permitted to use products and services in a manner that interferes with the legitimate use of the network by other customers or authorized users. Additionally, actions that violate the law or support any unlawful activities are expressly forbidden.
These prohibitions are put in place to ensure the security, reliability, and lawful use of the Internet access provided by NSHE's agreement with the service provider. Users are expected to adhere to these rules to maintain a secure and productive online environment.
Section 4: Inappropriate Use of the Internet (NevadaNet)
Using NevadaNet for any purpose that violates the NSHE Code, federal or state laws, and regulations is deemed inappropriate. Moreover, it is also considered inappropriate to utilize the NevadaNet network in a manner that directly or indirectly interferes with or disrupts the services or equipment of NevadaNet Participants. These inappropriate uses encompass, but are not confined to:
- Distributing email or other communications containing non-NSHE-related commercial advertising, chain letters, or engaging in other non-business related activities, such as using NevadaNet as an open forum for unsolicited distribution of personal opinions or grievances.
- Providing NevadaNet connectivity to third parties through activities like reselling, trading, bartering, or any other means.
- Establishing or sustaining personal or non-NSHE-related commercial business activities.
- Spreading computer worms or viruses over the network.
- Using the network to gain unauthorized access to other computational, information, or communication devices or resources.
These guidelines are established to ensure that NevadaNet is used in a manner that aligns with legal and ethical standards, maintains the integrity of the network, and promotes a secure and productive online environment for all participants.
|Date(s) Revised||November 3, 2023; January 18, 2011; September 2, 2008; May 11, 2004;||Date(s) Reviewed|
|NSHE Code(s)||NRS Code(s)||281.481||NAC Code(s)|
|Code Statement||NSHE Board of Regents' Meeting Minutes: 6/99|
*Please note: that not all WNC Policies will be referenced in these documents.
NSHE Board of Regents Handbook
Nevada Revised Statutes (NRS)
Nevada Administrative Code (NAC)
U.S. Copyright Law 17
18 U.S.C. 1030