You are here:
< Back

Acceptable Technology Use Policy

Central Penn College students, faculty, and staff have the right to reliable systems and
support services in the workplace. The technology resources at Central Penn College are
provided for the educational, instructional, research, and administrative activities of the
College, and the use of these resources is a privilege that is extended to members of
the Central Penn College community. As a user of these services and facilities, students
will have access to valuable College resources and to internal and external networks.
Consequently, it is important for students to behave in a responsible, ethical, and
legal manner.

In general, acceptable technology use means respecting the rights of other computer
users, the integrity of the physical facilities, and all applicable licenses and contractual
agreements. Individuals are also subject to federal, state and local laws governing many
interactions that occur on the Internet. These policies and laws are subject to change as
state and federal laws develop and change.

This policy applies to all users who access the College’s network or equipment using
college-owned or personal equipment, including wireless devices.

• Students are responsible for respecting and protecting the privacy of others and
may use only the technology systems, computer accounts, and computer files for
which they have authorization.
• Students must not use another individual’s account, or attempt to capture, guess, or
distribute other users’ passwords or similar private information.
• Students should make a reasonable effort to protect passwords and to secure
resources against unauthorized use or access.
• Students are responsible for respecting and protecting the intellectual property of
others and must not infringe on copyrights. Making illegal copies of music, videos,
games, images, texts, or other media is strictly prohibited.
• Plagiarism or representing the work of others is strictly prohibited.
• Students must be professional and respectful when using computing systems
to communicate with others; the use of College technology resources to send
messages that are pornographic, threatening, rude, discriminatory, or meant to
harass any other person is not allowed.
• Students must not use technology resources to start or further acts that are criminal
or violate the School’s code of conduct.
• The sending of SPAM, chain letters, or other mass unsolicited communications
is prohibited.
• Students may not buy, sell, advertise, or otherwise conduct personal business on
the network, unless approved as a school project.
• Students must use network resources, like internet bandwidth, wisely. Excessive
use of streaming media or online gaming hurts everyone by slowing down
the network.

• Management has the right to view emails and other normally-private documents
stored on school systems. They shall exercise this right infrequently and judiciously.
Enforcement and Sanctions

All members of the community are expected to assist in the enforcement of this policy.
Persons in violation of this policy are subject to a full range of sanctions, including, but,
not limited to, the restriction or possible loss of network privileges. A serious violation
could result in more serious consequences. Some violations may constitute criminal
offenses as defined by local, state and federal laws, and the school may initiate or assist
in the prosecution of any such violations to the full extent of the law.

Reporting Violations
Any suspected violation of this policy should be reported immediately to HelpDesk@ Messages sent to this email address will be reviewed by the IT
department and forwarded to appropriate College staff.

Ready to begin your story?

A few minutes can start a lifetime of success! Fill out our free online application now.

Request Info