{"id":371,"date":"2024-09-04T19:59:56","date_gmt":"2024-09-04T19:59:56","guid":{"rendered":"https:\/\/www.smcm.edu\/tothepoint-2024\/?page_id=371"},"modified":"2024-09-09T17:24:46","modified_gmt":"2024-09-09T17:24:46","slug":"computer-violations","status":"publish","type":"page","link":"https:\/\/www.smcm.edu\/tothepoint\/computer-violations\/","title":{"rendered":"Computer Violations"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The Office of Information Technology reserves the right to immediately suspend access to computer accounts (email, Portal, Blackboard), computer lab machines and RESNET Internet privileges for any violation of the Computer Ethics Statement, the Appropriate Use Policy, or malicious damage to computer equipment. If there is a violation, one or both of the following steps will be taken:\u00a0\u00a0<\/span><\/p>\n<ol type=\"A\">\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The student will receive an email instructing him\/her to go to the Office of Information Technology to sign a\u00a0letter of verbal warning. This letter may be forwarded to the student conduct officer.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The student\u2019s account may be disabled and a letter with evidentiary documentation will be sent to the student\u00a0conduct officer for conduct action. The student\u2019s account will remain disabled until the Office of Information\u00a0Technology receives notification from the student conduct officer regarding the outcome of a conduct hearing.\u00a0<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The following activities are examples of violations that may result in suspension of computer access, pending a conduct hearing:\u00a0<\/span><\/p>\n<ol type=\"A\">\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Theft, altering, or modifying the operations of any technology equipment.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inspecting, modifying, downloading, copying, or sharing data or programs from any source without authorization\u00a0from the owner.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Attempting to penetrate or alter computer security mechanisms or gain access to information.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Engaging in any activity which deprives others of their privileges on the computer system.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inflicting malicious damage on computer equipment.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using the electronic mail system to send abusive, obscene, or otherwise harassing communications.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using the computer system for commercial purposes.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using false or misleading identification for any purpose associated with the use of the computer system.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using another person\u2019s account without the explicit written permission of the assistant vice president for\u00a0information technology.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Forwarding chain letters to or abuse of the AllStudent, AllFaculty, or AllStaff email groups.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If suspicious network activity is detected on RESNET related to a student\u2019s computer, access may be disabled, and\u00a0the student will be advised on the appropriate remediation.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Violations are not limited to the outlined examples. Please refer to the Appropriate Use of College IT Resources policy at\u00a0<a href=\"https:\/\/www.smcm.edu\/it\/about\/policies\/\">https:\/\/www.smcm.edu\/it\/about\/policies\/<\/a> for additional information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At any time, a student who feels he\/she has been unjustly accused has the right to speak to the assistant vice president for\u00a0information technology and, in his\/her absence, a member of the Office of Information Technology senior staff.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Office of Information Technology reserves the right to immediately suspend access to computer accounts (email, Portal, Blackboard), computer lab machines and RESNET Internet privileges for any violation of the Computer Ethics Statement, the Appropriate Use Policy, or malicious damage to computer equipment. If there is a violation, one or both of the following steps<a class=\"tribe-events-read-more\" href=\"https:\/\/www.smcm.edu\/tothepoint\/computer-violations\/\" rel=\"bookmark\" > Find out more &raquo;<\/a><\/p>\n","protected":false},"author":258,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-371","1":"page","2":"type-page","3":"status-publish","5":"entry"},"acf":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.smcm.edu\/tothepoint\/wp-json\/wp\/v2\/pages\/371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smcm.edu\/tothepoint\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.smcm.edu\/tothepoint\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.smcm.edu\/tothepoint\/wp-json\/wp\/v2\/users\/258"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smcm.edu\/tothepoint\/wp-json\/wp\/v2\/comments?post=371"}],"version-history":[{"count":0,"href":"https:\/\/www.smcm.edu\/tothepoint\/wp-json\/wp\/v2\/pages\/371\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.smcm.edu\/tothepoint\/wp-json\/wp\/v2\/media?parent=371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}