Page 26 - Course_Catalog_2020-2021
P. 26

For example, system administrators, following organizational guidelines, may access or examine individual files or accounts based on suspicion that they have been corrupted or damaged or subject to unauthorized use or misuse. In such cases of access without notice, data or information acquired may be used to initiate or extend an investigation related to the initial cause or as required by law or board policy. Such data or information may also be used as grounds for appropriate personnel action.
User Rights
While the district monitors electronic usage as part of its normal network operating procedures, the district does not routinely inspect or monitor users’ computer hardware or files, email or telephone messages, nor disclose information created or stored in such media without the user’s consent. The district shall attempt to notify users before accessing computer hardware and files or prior to suspending service. In the event that the district acts without user consent, under its district rights specified above, the district shall do so with the least perusal of contents and the least action necessary to resolve the immediate situation. When the district accesses files without user consent, it shall notify the user as soon as possible of its access and provide the reason for its action.
User Responsibilities
The board recognizes that computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources and observe all relevant law, regulations and contractual obligations.
For district employees, the intended uses of the district network are those which are reasonable and necessary for the pursuit of job duties; for students, the intended uses are those which are reasonable and necessary for the pursuit of instructional activities. Although personal use is not an intended use, the district recognizes that the network will be used for incidental personal activities provided that such use is within reason and provided that such usage is ordinarily on an employee’s own time, is occasional, and does not interfere with or burden the district’s operation.
“Unauthorized uses” include prohibited uses and any other use for a prohibited purpose, including illegal activities, messages which may constitute discrimination or harassment under state or federal law, or anything that interferes with the intended use. These types of prohibited uses and purposes are further defined in Administrative Procedure 3250.
All users of the district network must read, understand and comply with this policy as well as Administrative Procedure 3250, and any additional guidelines established by the district. Such guidelines will be reviewed by the district and may become subject to board approval as a district policy or procedure. By using any part of the district network, users agree that they will comply with this policy.
Copies of this policy can be found in the policies section of the college catalog, student handbooks, faculty handbooks, new classified employee handbook and the handbook for new administrators. Copies of this policy are also available in the district Human Resources Office, the office of the dean of Student Development and EOPS (De Anza), the office of the dean of Student Affairs and Activities (Foothill), and on the district’s website at
Enforcement of the Policy
The board directs the chancellor or designee to enforce all existing federal and state law and district and college policies, including not only those laws and regulations that are specific to computers and networks but also those that apply generally to personal conduct. Violations of this policy will be dealt with in the same manner as violations of other district policies or standards of behavior and may result in disciplinary action, subject to applicable due process requirements.
Users who believe this policy has been misinterpreted or misapplied may file a complaint in accordance with the complaint procedures found in Administrative Procedure 3250. Students who do not observe the requirements of this policy may be in violation of the Student Code of Conduct and subject to student discipline.
This policy and Administrative Procedure 3250 shall be distributed to all new and existing employees. Nothing in this policy should be construed to interfere with First Amendment rights or with the academic freedom of faculty as outlined in Board Policy 4190.
Both the Board Policy Manual and Administrative Procedures Appendix may be found at Board.nsf/Public.
(ADMINISTRATIVE PROCEDURE 3250) This administrative procedure implements Board Policy 3250.
Abuse of computing, networking or information resources contained in or part of the district network may result in the loss of computing privileges. Additionally, abuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable district or college policies, procedures or collective bargaining agreements. Complaints alleging abuse of the district network will be directed to those responsible for taking appropriate disciplinary action. Illegal reproduction of material protected by U.S. copyright law is subject to civil damages and criminal penalties including fines and imprisonment.
Examples of behaviors constituting abuse which violate district Board Policy 3250 include, but are not limited to, the following activities.
System Abuse
■ Using a computer account that one is not authorized to use
■ Obtaining a password for a computer account that one is not authorized to have
■ Using the district network to gain unauthorized access to any computer systems
■ Knowingly performing an act which will interfere with the normal operation of computers, terminals, peripherals or networks
■ Knowingly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network including programs known as computer viruses, Trojan horses and worms.
■ Knowingly or carelessly allowing someone else to use their account who engages in any misuse in violation of Board Policy 3250 or Administrative Procedure 3250

   24   25   26   27   28