12.07.2015 Views

STUDENT HANDBOOK - ITT Technical Institute

STUDENT HANDBOOK - ITT Technical Institute

STUDENT HANDBOOK - ITT Technical Institute

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Internet Use and Creation of Web PagesAll use and access of the Internet from <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'s computing systems is subject to the followingguidelines:a) Access to pornographic, gambling, “hate speech”, or similar web sites is strictly prohibited. Websites accessed by <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'s computing systems users may be monitored.b) The Dean must authorize any web page created. Each such web page must include contactinformation, including an e-mail address, of the writer or publisher on each page.c) Creation of any web page must comply with copyright laws for all content, including photographs,illustrations, and other graphic images that were created by others. Downloading an image from anyweb site without permission usually violates copyright law. See also “Copyright Infringement isProhibited” contained herein.d) Any personal, club or organization web page created must be clearly marked with a legend indicatingthat such page is personal in nature and does not represent the views or opinions of <strong>ITT</strong> <strong>Technical</strong><strong>Institute</strong>.e) While <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> does not typically provide editorial review of web pages, <strong>ITT</strong><strong>Technical</strong> <strong>Institute</strong> reserves the right to edit or terminate such pages at any time to comply with thirdparty complaints, any applicable law or regulation, or computer and network management concerns.Proper and Responsible Use of <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> Computing Systemsa) Users of <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'s computing systems must respect the privacy and rules governing allinformation accessible through the systems. For example, users must not intentionally seekinformation on, obtain copies of or modify files, tapes or passwords belonging to other users or <strong>ITT</strong><strong>Technical</strong> <strong>Institute</strong> available on <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'s computing systems.b) Users of <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'s computing systems must respect the finite capacity of thecomputing systems. For example, users shall limit usage of the computing systems so as to notinterfere with the usage of others and must not use the computing systems for profit-making or fundraisingactivities without specific prior written authorization from the Dean to do so.c) Users of <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'s computing systems must respect the integrity of the computingsystems. For example, users must not download, transmit, or install any virus, Trojan horse, worm,or other potentially destructive code on any <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> computing system.d) Users of <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'s computing systems must ensure that their usage of such systemscomplies with all applicable local, state and federal laws.19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!