12.07.2015 Views

STUDENT HANDBOOK - ITT Technical Institute

STUDENT HANDBOOK - ITT Technical Institute

STUDENT HANDBOOK - ITT Technical Institute

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

e saved indefinitely on the receiving computer, e-mail messages can be intentionally or accidentallyforwarded to non-intended recipients, and e-mail messages may be improperly delivered by an e-mailsystem.d) <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>, although it does not regularly monitor e-mail communications, reserves theright to inspect, monitor, disclose or discontinue e-mail communications without consent or noticewhen consistent with and/or required by law; when there is evidence or reason to believe violations oflaw or <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> policy are taking or have taken place; or when computer maintenanceor operational concerns require such action.e) <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> e-mail services may not be used for: unlawful activities; commercial purposes(whether or not under the auspices of <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>); personal financial gain; or any otheruse that violates any other <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> policy or guideline, including any policy regardingintellectual property or regarding sexual or other forms of harassment.f) Each user must properly identify himself or herself as the originator of all e-mail messages he or shesends and shall not employ any false identity on e-mail messages. Users shall also not give theimpression that they are representing or otherwise making statements on behalf of <strong>ITT</strong> <strong>Technical</strong><strong>Institute</strong> unless appropriately authorized to do so.g) Users shall not be permitted to send unsolicited "junk" e-mail or mass electronic mailings or chainletters without a legitimate <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> educational purpose.h) <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> e-mail systems are intended for purposes related to <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'seducational mission. Incidental personal uses of the e-mail system may be made, however, providedsuch use does not: (1) burden <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> with noticeable incremental cost; (2) violateany provision of this policy; or (3) otherwise interfere with the operation of <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'scomputing and network services. Users should be aware that such personal communications are notprivate and are subject to the same conditions as all other e-mail, as described above.Software Use<strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> makes a variety of software programs and applications available to the authorizedusers of its computing systems. This software is generally licensed to <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>. Failure toadhere to the terms of such licenses can subject violators to legal action and can jeopardize <strong>ITT</strong> <strong>Technical</strong><strong>Institute</strong>'s ability to procure such software for its users. Users of <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong>'s computing systemsmust adhere to the following guidelines:a) Users should ensure they are covered by the appropriate site-license for each software program orapplication they use. To determine whether you are an authorized user, contact the Dean.b) Unauthorized copying of software is illegal and strictly prohibited, even when such software is notprotected against copying. There is generally a no "fair use" provision for copying software. <strong>ITT</strong><strong>Technical</strong> <strong>Institute</strong>’s software licenses do not permit you to obtain a copy of any of its softwareprograms for your use or installation on any computer.c) Software must not be removed or copied from any <strong>ITT</strong> <strong>Technical</strong> <strong>Institute</strong> hardware or systemwithout prior written authorization from the Dean.d) Personal software must not be installed or downloaded from the internet onto any <strong>ITT</strong> <strong>Technical</strong><strong>Institute</strong> hardware or system without written authorization from the Dean.18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!