Acceptable Computer and Internet Use Procedure

The purpose of Technical College-provided computers, computer systems, and Internet access is to facilitate skills development and enhance communication in support of research, education, and workforce development. To remain eligible as users, employees' and students' use must support and be consistent with the System's objectives. Access is a privilege, not a right. Access entails responsibility.

Users should not expect files stored on System or Technical College-based computers or hosted services to be private. Electronic messages and files stored on Technical College-based computers shall be treated like other Technical College premises that are temporarily assigned for individual use. Administrators may review files and messages to maintain system integrity and ensure that users act responsibly. Moreover, System and Technical College officials are expected to cooperate with law enforcement officials authorized to search System and Technical College computers and computer systems.

All information created, stored, or transmitted by System or Technical College computers or networks is subject to monitoring for compliance with applicable laws and policies.

In addition to the computer crimes delineated in O.C.G.A. 16-9-93, the following uses of System or Technical College-provided computers, networks, and Internet access are not permitted:

  1. To create, access, or transmit sexually explicit, obscene, or pornographic material.
  2. To create, access, or transmit material that could be considered unlawful conduct based on race, color, creed, national or ethnic origin, gender, religion, disability, age, genetic information, political affirmation or belief, disabled veteran, a veteran of the Vietnam Era or citizenship status objectively interfering with that individual or group’s: (1) performance, (2) work or educational environment, or (3) ability to participate in an educational program or activity
  3. To violate any local, state, or federal statute.
  4. To vandalize, damage, or disable the property of another individual or organization.
  5. Access another individual's password, materials, information, or files without permission.
  6. To violate copyright or otherwise use the intellectual property of another individual or organization violates the law, including software piracy.
  7. To conduct private or personal for-profit activities. This includes use for private purposes such as business transactions, private advertising of products or services, and any activity meant to foster personal gain.
  8. To knowingly endanger the security of any System or Technical College computer or network.
  9. To willfully interfere with another's authorized computer usage.
  10. To knowingly connect any computer to any of the System or Technical College networks unless it meets technical and security standards set by the System.
  11. To create, install, or knowingly distribute a computer virus, rootkit, keystroke logger, "Trojan horse," "Malware," or other surreptitiously destructive programs on any System or Technical College computer or network facility, regardless of whether any demonstrable harm results.
  12. To modify or reconfigure the software or hardware of any Agency computer or Network without proper authorization.
  13. To conduct unauthorized not-for-profit business activities.
  14. To conduct any activity or solicitation for political or religious causes.
  15. To perform any activity that could cause the loss, corruption of, prevention of rightful access to, or unauthorized distribution of Agency data and information.
  16. To create, access, or participate in online gambling. Occasional access to information or websites of the Georgia Lottery Corporation shall not constitute nor be considered inappropriate use.
  17. To capture and/or record network traffic without authorization.
  18. To knowingly transmit copyrighted material using peer-to-peer file sharing technology.
  19. To knowingly evade Internet content filtering or other traffic monitoring tools using VPN, Proxy Services, Tor, or similar technologies.

Occasional personal use of Internet connectivity and e-mail that does not involve inappropriate use as described above may occur if the college permits. However, any such use should be brief and infrequent and shall not interfere with the User’s performance, duties, and responsibilities.

Users of System and Technical College computers and computer systems are subject to the System’s policy on the development of Intellectual Property.

Users of System and Technical College computers and computer systems or hosted services are subject to the System’s Information Security Standards. The System and Technical Colleges make no warranties, express or implied, for the computers, computer systems, and Internet access. The System and Technical Colleges shall not be responsible for any damages users suffer, including but not limited to data loss resulting from delays or interruptions in service. The System and Technical Colleges shall not be responsible for the accuracy, nature, or quality of information gathered through System or Technical College-based computer hard drives or servers; nor for the accuracy, nature, or quality of information gathered through System or Technical College-provided Internet access. The System and Technical Colleges shall not be responsible for personal property used to access its computers or networks or provided Internet access. The System and Technical Colleges shall not be responsible for unauthorized financial obligations resulting from providing access to the Internet.

The preceding standards are equally applicable to employees of the System, wherever housed, and to employees and students at the Technical Colleges.

Penalties

Violations of these policies incur the same disciplinary measures as violations of other System or Technical College policies or state or federal laws, including criminal prosecution.