Banner Alt Text

Board Policies Home

8.000 College Property, Equipment, and Facilities

8.100 Smoke Free Tobacco Free Campus

8.110 Use of College Facilities by Outside Groups

8.120 Firearms on Campus

8.200 Maintenance

8.300 Energy Conservation

8.400 Use of College Vehicles

8.410 Accidents for Damage to College Vehicles

8.500 Computer/Network Acceptable Use for Faculty and Staff

8.510 Computer/Network Acceptable Use for Students

8.600 Naming of College Facilities

8.700 Cellular Telephones Issued to Employees

8.510 Computer/Network Acceptable Use for Students

Policy Number: 8.510 

Subject: Computer/Network Acceptable Use for Students

Date Adopted: September 22, 1999

National Park Community College's computing and telecommunication networks, computing equipment and computing resources are owned by the College and are provided primarily to support the academic and administrative functions of the College. Federal and state law, and College policies and procedures govern the use of these resources. Additional rules and regulations may be adopted by various division/departments to meet specific administrative or academic needs. Any adopted requirements must be in compliance with applicable federal and state laws, and this policy.

Regulatory Limitations

The College may monitor access to the equipment and networking structures and systems for the following purposes:

► To ensure the security and operating performance of its systems and networks.
► To enforce College policies.

The College reserves the right to limit access when federal or state laws or College policies are violated or where College contractual obligations or College operations may be impeded. The College may authorize confidential passwords or other secure entry identification; however, students have no expectation of privacy in the material sent or received by them over the College computing systems or networks. While general content review will not be undertaken, monitoring of this material may occur for the reasons specified above.

All material posted to or sent over College computing and other telecommunications equipment, systems or networks must be accurate and must correctly identify the creator (e-mail, etc., account owners must be identifiable).

User Rights

Access to computing supported by NPC is granted contingent on that access not being misused. If that access is misused, it can be withdrawn at any time. Further action may be taken as a result of serious offenses.

Privacy and Privilege

All Users must respect the privacy and usage privileges of others, both on the NPC campus and at all sites reachable by NPC's external network connections. Users will not intentionally seek information on account passwords. Nor will they obtain copies of other Users passwords. Users will not modify files, data, or passwords belonging to other Users. Users will not develop, download, or execute programs for these purposes. Users must preserve and protect the privacy, dignity, well being, and informed consent of all participants.

Security and Related Matters

No one shall:

  1. attempt to circumvent data protection schemes, uncover security loopholes, or decrypt secure data;
  2. knowingly endanger or compromise the security of any College computer, network facility, or other computing resource or willfully interfere with others' authorized computer usage;
  3. modify or reconfigure or attempt to modify or reconfigure any software or hardware of any College computer or network facility in any way, unless specific authorization has been obtained;
  4. use College computer resources and communication facilities to attempt unauthorized access to or use of any computer or network facility, no matter where located, or to interfere with others' legitimate use of any such computing resource;
  5. attempt to access, copy, or destroy programs or files that belong to other users or to the College without prior authorization, nor shall anyone use College computing resources for unauthorized monitoring of electronic communications;
  6. create, run, install, or knowingly distribute a computer virus, Trojan Horse, or other surreptitiously destructive program, e-mail, or data via any College computer or network facility, regardless of whether demonstrable harm results;
  7. place confidential information in computers without protecting it appropriately. The College cannot guarantee the privacy of computer files, e-mail, or other information stored or transmitted by computer; moreover, the College may access such information in accordance with Regulatory Limitations section of this document.
  8. knowingly or recklessly perform any act that will interfere with the normal operation of computers, terminals, peripherals, or networks and shall not intentionally waste or overload computing resources.


Users shall use their accounts for the purposes for which they are established, as well as personal communications.

  1. Accounts and other College computer resources shall not be used for personal financial gain or benefit or for the benefit of organizations not related to the College.
  2. No one shall give any password for any College computer or network to any unauthorized person, nor obtain any other person's password by any unauthorized means. Users are responsible for the use of their computer accounts and shall not allow others access to their accounts, through sharing passwords or otherwise. Users should take advantage of system-provided protection measures to prevent such access.
  3. A user shall not use facilities, accounts, access codes, privileges, or information for which he or she is not authorized.

Enforcement and Sanctions

System administrators are responsible for protecting the system and users from abuses of this policy. Pursuant to this duty, system administrators may:

  1. formally or informally discuss the matter with the offending party,
  2. temporarily revoke or modify access privileges, or
  3. refer the matter to the appropriate disciplinary authority.

Any violation of this policy may result in the revocation or suspension of access privileges by the Department of Computing Services with review by the appropriate academic or administrative unit and/or law enforcement agencies if local, state, or federal laws may have been violated.

NPC Computer Resource Center Lab Rules

No One shall:

  1. attempt to bypass security restrictions in ANY way, or distribute a computer virus, Trojan horse, etc.;
  2. behave in a manner that affects the ability of others to study;
  3. bring food or drink into the lab without written special permission;
  4. View pornographic or other offensive material which, when viewed by others in the lab, would constitute sexual harassment in violation of NPC policy;
  5. alter the c: drive.

• No downloading or installation of any software to the local workstation without special written permission.

• No editing, adding, or deleting material from the c: drive.

• No changing of default settings on applications.

6. copy any college software. Site licenses must be maintained accurately;

7. participate in Chat session, nor download Chat software. Chatting is allowed ONLY in instructor-directed formal classroom instruction;

8. use the NPC computer labs for commercial gain or private profit or other resource consuming activities such as "MUD" chatting, spamming, chain letters, or other mass mailings.


  1. immediately notify the Lab Manager/Instructor of any problems.
  2. use free e-mail services offered on the Internet.
  3. be patient when printing. If your document does not print, ask a Lab Manager for help. Do not wastefully print multiple copies. Know how many pages you are sending to the printer. If your work requires printing documents of over 20 pages, obtain approval of lab manager first.
  4. download only to a floppy disk.
  5. abide by all federal, state, local laws and college policies.

Violation of any of these rules may result in denial of access to the labs, suspension from school, and possible criminal investigations in accordance with the 1999-2000 NPC Student Handbook "STUDENT RIGHTS AND RESPONSIBILITIES", Section 19, Section 30A #15 and #17.