18
| Page
● If you suspect that your account has been used by someone
else, notify Administration immediately.
● Use shared resources considerately. Do not monopolize
systems, overload networks with excessive data, or stream or
waste computer time, disk space, paper, or other resources.
Leave the work area clean and in order for the next person
when finished.
● Do not assume information stored on the School’s computer
facilities to be private. Any and all information saved on
Institution computer facilities may be accessed or deleted at
any time by school representatives.
● All computer files, disks, USB flash drives, etc. belong to
somebody. Assume them to be private and confidential unless
the owner has given explicit permission to make them
available to others. If in doubt, ask first.
● Staff, faculty, and students are strictly prohibited from
copying commercial or otherwise copyrighted software and
code, whether for use on or off-campus (except as specifically
permitted by the author or manufacturer) or engaging in any
other activity that may violate copyright, patent, or
trademark. (Consult the IT Specialist or the appropriate
software license agreement should you have any questions.)
● It is the school’s policy to comply with all copyright laws. All
faculty, staff, students, and members of the campus
community are expected to be aware of and follow these
requirements. Copyright law information can be found at
www.copyright.gov.
● Students are prohibited from accessing data or programs for
any reason without the owner’s explicit permission.
● Students are prohibited from downloading, installing,
creating, modifying, or transmitting any computer program or
instruction intended to gain unauthorized access to, or make
unauthorized use of, any computer facilities or software.
● Students are prohibited from using the School’s network,
intranet, learning management system, or computer facilities
with the intent to compromise other computers or networks,
to commit crimes, or to engage in other unethical acts. The
School will take necessary steps to preserve the security of its
computer resources.
Students will be billed for the cost of any damage to computer
hardware or the cost of reconfiguration of any software, or for any
other costs incurred by the institution because of a violation of
these rules.
Report any violation of this Computer Use Policy to the
administration immediately.
Wireless Access
The school is pleased to make wireless internet access available to
students throughout the campus. The following rules and policies
apply to wireless internet access. Use of wireless internet access
demonstrates your agreement to be bound by these rules and
policies.
1) Users are responsible for configuring their own equipment.
The School does not guarantee technical support for
establishing or maintaining a connection or equipment to
maintain a wireless connection.
2) The School is not responsible for any personal information
that is compromised, or for any damage caused to hardware
or software resulting from the use of the wireless Internet
connection for any reason whatsoever.
3) All users are responsible for maintaining their own virus
protection on their computers or wireless devices.
4) The transmission or receiving of child pornography or
sexually explicit graphics or material is strictly prohibited.
5) Users are prohibited from misrepresenting themselves as
another user; attempting to modify or gain unauthorized
access to files, passwords or data belonging to others, or
damaging or alternating others software or hardware.
6) It is prohibited to download copyrighted material in violation
of U.S. Copyright Law (Title 17, U.S. Code).
7) Use of laptops during class, without the permission of the
instructor, is prohibited.
8) Anyone violating these rules is subject to having the right to
use the wireless internet access terminated.
DISCLAIMER: The school is providing wireless connectivity in
this facility as a supplementary information service and offers no
guarantees or representations that any use of the wireless
connection is in any way secure or that any privacy can be
protected. Your transmissions may be viewed or intercepted by
third parties. Use of this wireless connection is entirely at the risk
of the user and the School is not responsible for any loss of
information that may arise from the use of the wireless connection.
Furthermore, the School is not responsible for any loss, injury or
damage resulting from the use of the wireless connection.
Instructions on how to access the wireless connection may be
picked up at the IT office or with the Administrative Assistant.
Social Media – Acceptable Use
Communications on social media must be always respectful and in
accordance with this policy. Use of social media must not infringe
on the rights or privacy of other students or staff, and students must
not make ill-considered comments or judgments about other
students, staff, or third parties. Students must take particular care
when communications through social media can identify them as
a student of ATS Institute of Technology to members of staff, other
students, or other individuals.
The following non-exhaustive list may, according to the
circumstances and be of an unacceptable nature and should never
be posted. Violation of any of these may result in dismissal.
Confidential information (which may include research not yet in
the public domain, information about fellow students or staff or
personnel matters, non-public or not yet approved documents or
information).
● Details of complaints and/or legal proceedings/potential legal
proceedings involving the school.
● Personal information about another individual, including
contact information, without their express permission.
● Students may not post obscenities, slurs, or personal attacks
that can damage the reputation of the Institution and its
representatives. Curriculum, Brightspace/D2L, or email
screenshot on any social media is strictly forbidden.
● Comments posted using fake accounts or using another
person's name without their consent.
● Material, including images, that is threatening, harassing,
discriminatory, illegal, obscene, indecent, defamatory, or
hostile towards any individual or entity.
● Any other posting that constitutes a criminal offense.