Piedmont College Acceptable Use
The Acceptable Use Policy and the Computer Use sections of the Student Handbook can be read below. The Acceptable Use Policy can be downloaded on the Downloads page.
Click on the link that best describes the information you need:
Acceptable Use Policy
Facility Use Guidelines
Statement of Computing Ethics
EDUCOM Code - Software and Intellectual Rights
This Acceptable Use Policy constitutes a campus-wide policy that is intended to allow for the
proper use of all Piedmont College computing, telecommunications and networking resources. We
are committed to protecting our employees, students, and the college from illegal or damaging
actions by individuals, either knowingly or unknowingly.
Internet, Intranet, and Extranet- related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of Piedmont College. These systems are to be used for business purposes in serving the interests of the college in the course of normal operations. Appropriate use should always be legal, ethical, and show restraint in the consumption of Piedmont College resources. Also, appropriate usage should demonstrate the respect for intellectual property, ownership of data, system security mechanisms, and individual rights to privacy and freedom from intimidation, harassment and unwarranted annoyances.
return to top
The purpose of this policy is to outline the acceptable use of all computer and telecommunications
equipment and networking resources belonging to Piedmont College. These rules are in place to protect
the employee and Piedmont College. Inappropriate use exposes Piedmont College to risks including virus
attacks, compromise of network systems and services, as well as legal issues.
return to top
Authorised users are:
» Current faculty and staff of the College
» Students who are currently enrolled in the College
» Others, including authorized vendors and guests, whose access does not interfere with the access of resources by others, result in the loss of data or other resources, violate school policy, or any other laws
return to top
To the highest possible standard, Piedmont College strives to preserve individuals’ privacy. However, users must
recognize that data created on the College network remains the property of the College. Because of the need to
protect the Piedmont College network, administration cannot guarantee the confidentiality of information stored
on any network device belonging to the college. The College reserves the right to monitor equipment, systems,
and network traffic at all times and also reserves the right to audit network systems on a periodic basis to ensure
compliance with this policy.
return to top
Authorized users of the Piedmont College network, computers, and telecommunications equipment are responsible
for knowing what information resources are available and for refraining from all acts that waste resources or
prevent others from using these resources.
The list below is by no means exhaustive, but attempts to provide a framework for activities which fall into the category of unacceptable use.
The following acts are prohibited:
» Online game playing, music downloads and streaming, video downloads and streaming and online gambling, unless used to gather educational materials for classroom instruction
» Downloading any of the following programs (unless with explicit approval from administration):
» AOL Instant Messenger
» Direct Connect
» Other commercially available software and/or freeware and shareware which allows files to be shared by other users.
» Malicious or harmful activities including attempts to circumvent security systems, and virus and anti-spyware software; attempts to create or propagate viruses; deliberate damage to physical equipment as well as attempts to damage network files or software; and installing/using unauthorized or pirated software
» Sharing your network/email password with anyone or allowing an unauthorized party to use Piedmont College equipment
» Using Piedmont College facilities and equipment to conduct any other for-profit business venture or political campaigning or advertising
» Using Piedmont College resources to create or maintain personal websites, online blogs, or music sharing download sites, including sites that are considered sexually explicit, obscene, or pornographic
» Engaging in any illegal activities as defined by federal, state, and local laws and regulations
» Using Piedmont College resources to create, maintain, or transmit any material that could be considered discriminatory, offensive, threatening, harassing or intimidating
return to top
Please use good judgment and common sense when using the Piedmont College email system and abide by the following guidelines:
» Do NOT send any email to someone who has asked you not to do so. This may constitute harassment.
» Do NOT send frivolous or excessive email messages to recipients either on or off campus, including the sending of “junk mail”, advertisements, for-sale items, and personal stories or pictures.
» Do NOT create, send, or forward chain letters (messages that are forwarded many times to people who have not solicited the email).
» Do NOT send or forward any chain letters, pictures, or personal requests and information to the Faculty and Staff email list or use this list for any reason beyond the scope of Piedmont College business.
» Do NOT send emails containing warnings or virus alerts to other Piedmont College users.
» Do NOT send unwanted emails that are considered to be Spam (Spam: Unauthorized and/or unsolicited electronic mass mailing).
» Do NOT send or ask to receive large amounts of data in an email, including pictures, music, document, and files, which can slow down the system. If you need to share a large file with a colleague, contact the IT department so that arrangements can be made to put the information on the network instead of sending it through an email.
» Do NOT send sensitive or private information in an email, including passwords, social security numbers and other id numbers, account numbers, and credit card information.
» Do NOT respond to any emails from any companies asking you to change passwords or id numbers, give out any personal or financial information, respond to a problem with their website or your account, or click on a link in the email. If you have a concern that this email may be legitimate, contact the company either through their website or by phone.
» Do NOT use the email system to have a debate or conversation with other email users while including the entire Piedmont College email directory (Faculty and Staff) in the email. While the subject may interest you and some others, please do not assume that the entire directory wishes to join the debate. This type of mailing can overload the email system.
» Do NOT open any emails or attachments from anyone that you are not expecting to receive mail from or that seems suspicious in nature. Delete these items immediately.
» Do NOT use your Deleted Items folder as a place to store emails that you want to keep.
» DO empty your Deleted Items folder regularly.
» DO keep emails in your inbox to a minimum to avoid overloading the server.
» DO clean out your Sent Items folder regularly.
» DO save any large files such as pictures, web-shots, and documents to your computer’s hard drive and delete these files from your email.
return to top
Student Handbook Guidelines
The College maintains computer labs which are available for use by all students.
Please contact the staff on duty for the times when assistance is available.
All students are required to maintain their data on personal data disks. Do not store information on the
computer hard drives. Security systems are in place to restrict access to software and protect the College's
software copyrights from destruction or the introduction of computer viruses. Hard drives are periodically
optimized and/or purged of non-essential files.
All persons using the computer resources are required to follow the guidelines set forth for priority of use. Inappropriate use and/or behavior in the lab area, as well as violations of rules and regulations of the College will result in disciplinary action and restriction from computer services use.
return to top
Guidelines for Use of College Computing Facilities
Piedmont College Computer Services Guidelines for the use of College computing facilities
are defined by several policy statements, including the College's Statement of Computing Ethics, the EDUCOM Code
on Software and Intellectual Rights as shown below. Questions concerning these guidelines or other ethical or legal
considerations pertaining the use of computing facilities should be referred to the Director of Computer Services.
return to top
Statement of Computing Ethics
Piedmont College provides extensive computing facilities to assist its educational, research,
and administrative activities. Considerable resources have been invested in these facilities and it is expected that
they will be used appropriately and wisely. Observance of relevant legal and ethical considerations is required. The
following list, although not covering every situation, specifies some of the responsibilities that accompany usage of
College computing facilities. All users should abide by these guidelines:
1. Users may use ONLY those computer accounts or facilities that have been authorized for their use through Computer Services. Specifically, a user is not to work from a computer account assigned to another person. Access gained to computer resources through the negligence or naÃ¯vetÃ© of another user is not considered authorized use.
2. Each user may use a computer account only for the purposes for which it is intended. College-supported computing includes instructional, research, and administrative activities. College computing equipment and facilities may not be used for commercial purposes or monetary gain, with the exception that faculty may use such for properly authorized consultation, provided payment is made to the College for such use.
3. Users are responsible for all use of their computer accounts and equipment. They should make appropriate use of system-provided protection features and take precautions against others obtaining access to their computer resources.
4. Piedmont College is bound by Title 17 of the United States Code on copyright and supports the provisions contained therein. Individual employees are likewise bound by copyright laws. The College endorses and supports the EDUCOM Code on Software and Intellectual Rights. Piedmont College and its employees have obtained the use of a variety of computer software products pursuant to license agreements from software companies. Neither the College nor its employees own this software or related documentation. The use of the software by the College and its employees and students is controlled by the license agreements with the respective software companies. Unless specifically authorized by the software producer, neither the College nor any individual has the right to reproduce software materials. Piedmont College does not condone the illegal or unauthorized duplication or use of software. Every person who uses College computing equipment, or who uses any computer while on College property or conducting College business, is individually responsible for complying with all copyright laws and software licensing agreements. Piedmont College reserves the right to conduct a software audit on any computer equipment owned by the College or used in the College's business, and to remove unauthorized copies of software from those computers. The College does not, however assume responsibility for preventing misconduct regarding computer software by individuals acting in violation of this policy.
5. Users may not search, access, or copy directories, programs, files, or data not belonging to them unless they have specific authorization to do so. Programs, subroutines, and data provided by the College may not be taken to other computer sites without permission of the owner.
6. Piedmont College recognizes and endorses the privilege of privacy for individuals in using its computing facilities. However, it is conceivable that there will be an occasional need for authorized individuals to examine files. For example, in the normal course of operations certain Computer Services personnel must have access to all files. In addition, when circumstances would seem to make such an action appropriate, the Vice President of Finance and Administrative Services may authorize special examination of specified files.
7. Users should not encroach on use of the computer by others. This includes such activities as tying up computer resources for excessive game playing, sending messages or mail, or other trivial applications.
8. Users may not attempt to modify system facilities or attempt to "crash" any system, nor should they attempt to subvert the restrictions associated with their computer accounts.
9. Through the Internet, Piedmont College provides a mechanism for sending and receiving electronic mail worldwide, much as does the U.S. Postal Service with paper mail. Neither the College nor any office or department thereof is responsible for the nature of mail messages. The content of a mail message is the sole responsibility of the sender.
return to top
The EDUCOM Code-Software and Intellectual Rights
EDUCOM, founded in 1964, is a nonprofit consortium of higher education institutions which facilitates the introduction, use, access to and management of information resources in teaching, learning, scholarship and research. It has developed a code for software and intellectual rights which is as follows: Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media. It encompasses respect for the right to acknowledgment, right to privacy, and right to determine the form, manner, and terms of publication and distribution. Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against members of the academic community.
Abuse of computing privileges and nonobservance of these policies are considered to be serious matters
and will subject violators to disciplinary action. Computing privileges may be revoked and violators will be subject to the
usual judicial procedures of the College. In addition, it should be understood that this policy does not preclude further action
resulting from the application of pertinent laws and regulations of the State of Georgia and/or the United States of America.
This information can be found on pages 15-17 of the Piedmont College Student Handbook.
The document can be viewed in its entirety at http://www.piedmont.edu/student_life/Student_Handbook_2005_2006.pdf
return to top