Page 71 - Demo
P. 71

Notwithstanding the above, DEC Information Technology personnel, after discussion with his or her department supervisor, may suspend, block, or restrict access to an account, independent of DEC disciplinary procedures, when it appears reasonably necessary to do so in order to protect the integrity, security, of functionality of DEC or other computer resources, to protect DEC from liability, or where the emotional or physical well-being of any person is immediately threatened.
Access will be restored to the account holder whenever the appropriate investigatory unto of DEC determines that the protection of the integrity, security, or functionality of DEC or other computing resources has been restored and the safety and well-being of all individuals can reasonably be assured, unless access is to remain suspended as a result of formal disciplinary action imposed through the Information Technology personnel or as a result of legal action.
It is the responsibility of all students to maintain the security of their user account which includes keeping personal passwords private, as well as maintaining a backup of their class files and projects. Also, DEC reserves the right to monitor the use of your account. If at any time it is determined that an account is being abused, DEC reserves the right to suspend computer / internet privileges to the student who is abusing account privileges. Abuse of the account is determined by school officials, and includes, but is not limited to:
Wi-Fi Access Policy
DEC provides Wi-Fi access to personal devices (i.e. laptops, tablet and cell phones) providing that you contact the Information Technology Department to have your device registered. The I.T. Department will have to obtain your devices’ Wi-Fi address in order for the device to be registered. The Wi-Fi access is not guaranteed and will not be available if there is a network outage or problem.
Data Storage and Backup Policy
Students will be given access to a folder on one of the DEC servers to store class files and projects. Students should keep a USB flash drive to store backup copies of their work. Student folders are not backed up and will not be available should there be a network issue. DEC is not responsible for lost data or files that are stored on the DEC network or
DEC computers: Students should not store their work on lab computers because the computers can be moved or replaced at any time without notice.
DEC is dedicated to providing and safe, reliable, and robust information technology infrastructure for students. In doing so, there are some general expectations for acceptable use of the computing systems located or connected to DEC to ensure that the computing systems maintain their highest level of efficiency and reliability. Many DEC functions rely heavily on the accessibility of computing systems, and DEC must take every reasonable action to protect them.
The use of DEC computing resources, including network facilities, account numbers, data storage media, printers, plotters, microphone systems, and software for computing activities other than those authorized by DEC is strictly prohibited. DEC students and faculty are expected to adhere to federal software piracy statutes. These laws forbid the copying of licensed programs. Unauthorized use of such resources is regarded as a criminal act in the nature of theft and violators are subject to suspension, expulsion, and civil and criminal prosecution.
The following are examples of misuse of computing resources:
1. Unauthorized duplication, distribution, or alteration of any licensed software. This includes software licensed by DEC and licensed
software accessed using the computing networks.
2. Attempting to gain unauthorized access to any computing resource or data, or attempting to disrupt the normal operation of any
computing resource or network at DEC or anywhere on the Internet.
3. Attempting to use another student’s computer account or data without their permission.
4. Using the DEC electronic mail system to attack other computer systems, falsify the identity of the source of electronic mail
messages. Sending harassing, obscene, or other threatening electronic mail. Attempting to read, delete, copy, of modify the
electronic mail of other without their authorization. Sending “for profit” messages, chain letters, or other unsolicited “junk” mail.
5. Knowingly infecting any computing resource with a software virus.
6. Using DEC computing or network resources for personal gain or illegal activities, such as theft, fraud, copyright infringement, piracy
(e.g., sound or video recording), or distribution of child pornography or obscenities.
7. Excessive consumption of bandwidth and/or network resources.
8. Sharing of usernames and passwords. Students and Facility should take every possible precaution to protect their DEC user accounts
and keep account information private.
COMMUNICABLE DISEASE
A student who has a communicable disease or who has come in contact with a communicable disease should notify the school. It is the responsibility of each person, both staff and students, to take the appropriate precautions to protect others from contamination and disease. The school will be responsible for informing students about exposure and will direct students to the appropriate health resources. Students may contact their own physicians if necessary. A physician’s written certification of good health will be required before an ill student is readmitted to class.
Page 71 of 88 Catalog Volume 62 -Version 3 Effective June 5, 2020







































































   69   70   71   72   73