Blue Ridge Community and Technical College

Information Security

Information Security

The list below constitutes a code of computing practice for all persons using the college computer system. It is important for all users to practice ethical behavior in computing activities because of the many valuable and sensitive resources involved, and because of the effect one user’s practices can have on the work of others.

Disciplinary action for violating the code will be governed by the applicable provisions of student handbooks, faculty and staff handbooks, and the West Virginia Computer Crime and Abuse Act.

1.   You are responsible for being aware of and following the published procedures for accessing the computer system.

2.   You must use only the computer accounts which have been authorized for your use. You must use your computer accounts only for the purpose for which they are authorized. Use of your college’s computer resources for personal or business financial gain without express authorization is prohibited.

3.   You are responsible for the use of your computer accounts. You should make use of system-provided protection features such as passwords, and you should take precautions against others obtaining access to your computer resources. Do not make your account available to others for any purpose.

4.   Do not access or copy the programs, files, or data belonging to other persons or to the college without prior authorization to do so. Do not attempt to access files for which you do not have authorization. Programs and data provided by the college are not to be taken to other computer sites without permission. You may use software on your school’s computer only with permission, if it has been legally obtained, and if its use does not violate any license or copyright restriction. Do not use programs on your school’s computers that were obtained from other computer sites unless they are in the public domain or authorization to use them has been obtained.

5.   To minimize the impact of your work on the work of other persons, you must not attempt to encroach on others’ use of the facilities or deprive them of resources. Deliberate wasteful use of resources, such as printing or storing large amounts of unnecessary data on school computers or use for purely recreational purposes is prohibited.

6.   You are expected to conduct yourself in a manner that does not offend or harass others and that does not interfere with individual and campus activities. Resources are not to be used to store or transmit obscenities or other potentially offensive material.

7.   Do not attempt to modify system facilities. Do not misuse, damage, or misappropriate computer equipment or property.

 

West Virginia law provides that certain computer offenses are criminal acts and prescribes penalties for unlawful activities related to computer usage. Blue Ridge CTC believes it is important for its users to be aware of the West Virginia Computer Crimes and Abuse Act and its provisions, which are found in the West Virginia Code Chapter 61. Crimes and Their Punishment. Article 3c.

Financial Aid Schedule a Tour