Page 26 - De Anza College Catalog 2018-2019
P. 26

the integrity of the systems and related physical resources and observe all relevant law, regulations and contractual obligations. For district employees, the intended uses of the district network are those which are reasonable and necessary for the pursuit of job duties; for students, the intended uses are those which are reasonable and necessary for the pursuit of instructional activities. Although personal use is not an intended use, the district recognizes that the network will be used for incidental personal activities provided that such use is within reason and provided that such usage is ordinarily on an employee’s own time, is occasional, and does not interfere with or burden the district’s operation.
“Unauthorized uses” include prohibited uses and any other use for a prohibited purpose, including illegal activities, mes- sages which may constitute discrimination or harassment under state or federal law, or anything that interferes with the intended use.  ese types of prohibited uses and pur- poses are further de ned in Administrative Procedure 3250.
All users of the district network must read, understand and comply with this policy as well as Administrative Procedure 3250, and any additional guidelines established by the district. Such guidelines will be reviewed by the district and may become subject to board approval as a district policy or procedure. By using any part of the district network, users agree that they will comply with this policy.
Copies of this policy can be found in the policies section of the college catalog, student handbooks, faculty handbooks, new classi ed employee handbook and the handbook for new administrators. Copies of this policy are also available in the district Human Resources O ce, the o ce of the dean of Student Development and EOPS (De Anza), the o ce of the dean of Student A airs and Activities (Foothill), and on the district’s website at www.fhda.edu.
Enforcement of the Policy
 e board directs the chancellor or designee to enforce all existing federal and state law and district and college policies, including not only those laws and regulations that are speci c to computers and networks but also those that apply generally to personal conduct. Violations of this policy will be dealt with in the same manner as violations of other district policies or standards of behavior and may result in disciplinary
24
action, subject to applicable due process requirements.
Users who believe this policy has been misinterpreted or misapplied may  le a complaint in accordance with the complaint procedures found in Administrative Procedure 3250. Students who do not observe the requirements of this policy may be in violation of the Student Code of Conduct and subject to student discipline.
 is policy and Administrative Procedure 3250 shall be distributed to all new and existing employees. Nothing in this policy should be construed to interfere with First Amendment rights or with the academic freedom of faculty as outlined in Board Policy 4190.
Both the Board Policy Manual and Administrative Procedures Appendix may be found at www.boarddocs.com/ca/fhda/ Board.nsf/Public.
MISUSE OF COMPUTER INFORMATION
(AP 3250)
 is administrative procedure implements Board Policy 3250.
Abuse of computing, networking or information resources contained in or part of the district network may result in the loss of computing privileges. Additionally, abuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable district or college policies, procedures or collective bargaining agreements. Complaints alleging abuse of the district network will be directed to those responsible for taking appropriate disciplinary action. Illegal reproduction of material protected by U.S. copyright law is subject to civil damages and criminal penalties including  nes and imprisonment.
Examples of behaviors constituting abuse which violate district Board Policy 3250 include, but are not limited to, the following activities:
System Abuse
operation of computers, terminals,
peripherals or networks
■ Knowingly running or installing on
any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network including programs known as computer viruses, Trojan horses and worms.
■ Knowingly or carelessly allowing someone else to use their account who engages in any misuse in violation of Board Policy 3250 or of this AP 3250
■ Forging email messages
■ Attempting to circumvent data
protection schemes or uncover or
exploit security loopholes
■ Masking the identity of an account
or machine
■ Deliberately wasting computing
resources
■ Downloading, displaying, uploading
or transmitting obscenity or
pornography, as legally de ned ■ Attempting without district
authorization to monitor or tamper with another user's electronic communications, or changing,
or deleting another user's  les
or software without the explicit agreement of the owner, or any activity which is illegal under California computer crime laws
■ Personal use which is excessive or interferes with the user’s or others’ performance of job duties, or otherwise burdens the intended use of the network
■ Illegal downloading and/or distribution of copyright-protected materials, including but not limited to music and videos
Harassment
■ Using the telephone, email or voice mail to harass or threaten others
■ Knowingly downloading, displaying
or transmitting by use of the
district network, communications, pictures, drawings or depictions that contain ethnic slurs, racial epithets or anything that may be construed as harassment or disparagement of others based on their race, national origin, sex, sexual orientation, age, disability, religious or political belief
■ Knowingly downloading, displaying 2O18-2O19 DE ANZA COLLEGE CATALOG
■ ■
■
■
Using a computer account that one is not authorized to use
Obtaining a password for a computer account that one is not authorized to have
Using the district network to
gain unauthorized access to any computer systems
Knowingly performing an act which will interfere with the normal















































   24   25   26   27   28