Lamar State College Port Arthur
2016-2017 Catalog
Revised 9-13-16
Internet Use Policies
The College maintains a connection to the internet
in support of its mission. Users must be aware that
all internet usage, including source and destination,
can be recorded and stored. Users have no right to
privacy with regard to internet use.
The College has the ability and right to view any
user’s usage patterns and take action to assure
internet resources are devoted to maintaining the
highest levels of productivity.
The internet path record is the property of the
College and therefore the people of the State of
Texas. Such information is subject to the Texas
Public Information Act and the state laws applicable
to records retention.
Using the college’s internet connection to access
information, images or other materials that violate
any federal laws, state laws, Texas State University
System rules or LSCPA policies is strictly
prohibited. Using the internet connection to access
other computer systems in violation of state or
federal law is prohibited. Using the internet
connection to access other computer systems in
violation of the policies of the entity that owns those
systems is strictly prohibited.
Electronic Messaging Policies
Access to and the responsible use of modern
information resources are essential to the pursuit
and achievement of excellence. The College
encourages the appropriate use of electronic
messaging to enhance productivity. Use of these
resources must be consistent with the college’s goals
of education, research, and public service.
“Electronic messaging” refers to those computer
applications such as email, instant messaging, video
and/or audio conferencing/collaboration, chat rooms,
newsgroups, list servers, streaming media, message
boards or any other application that allows a user to
interactively or passively communicate with one or
more persons or entities using the college computing
or communications resources.
Responsible users of electronic messaging
applications are expected to act in accordance with
the following policies based on common sense,
common decency and civility applied to the
networked computing environment.
Information sent as electronic messages should meet
the same standards for distribution or display as if
they were tangible documents or instruments. Users
must be clearly and accurately identified in all
electronic communications.
actions taken is never appropriate. Alteration of the
source of electronic messages or postings is
unethical and possibly illegal.
Electronic messaging facilities are for collegerelated activities only. All electronic messaging files
belong to someone. Aside from the college’s right of
access, they should be assumed to be private and
confidential unless the owner has explicitly made
them available to others.
The College cannot guarantee the privacy or
confidentiality
of
electronic
documents
or
communications.
Users must respect the rights of others and must not
send, post or broadcast abusive, threatening, illegal,
indecent or harassing materials. While debate on
controversial issues is inevitable and essential,
users must do so in a way that actually advances the
cause of learning and mutual understanding.
Electronic messaging and other network resources
may not be used for commercial purposes or for
personal financial gain.
The same standards of conduct expected of users
regarding the use of telephones, libraries and other
college resources apply to the use of electronic
messaging.
Users will be held no less accountable for actions in
situations involving electronic messaging than when
dealing with other media.
Any communication where the meaning of the
message, or its transmission or distribution, would
be illegal, unethical or irresponsible is to be avoided.
Telephone System Use Policies
The college’s telephone facilities include any
telephone or voice communication device including
the Phone Mail System.
Users shall:
•
Be accountable for using these facilities in an
effective ethical and lawful manner.
•
Only use those facilities for which they have
authorization, whether these facilities are at the
College or at any other facility accessible
through the telephone network.
•
Take all reasonable steps to protect the privacy
of others as well as the integrity of the College.
Users shall not share with others PIN numbers,
passwords, or any other authorization which
has been assigned to them.
•
Concealing or misrepresenting a name or affiliation
in order to be dissociated from responsibility for
Page 54 of 135
Be aware that all calls are monitored by a Call
Detail Recording System located in the
Computer Center. These reports are published