2017-2018 Lamar State College Port Arthur Catalog 40 | Page 54
Lamar State College Port Arthur
2017-2018 Catalog
The College retains the right to access and
immediately remove any data or files evidencing any
such misuse.
Account access information assigned to an
individual is not to be given to another individual.
The individual assigned to an account is responsible
for all activity for which that account is used.
The following policies govern the use of all college
computing facilities. Any use of these facilities in
any way other than those stated below will be
considered in violation of college policy.
• Users are accountable for using computing
facilities in an effective, ethical and lawful
manner.
• Use of college computing facilities to create,
display, modify, or transmit files that are
abusive, harassing, threatening, indecent, or
illegal is expressly prohibited.
• Material that might be considered indecent,
abusive, harassing or threatening may be
accessed, activated and viewed only insofar as
those materials and resources are required to
perform legitimate college-related functions.
•
•
Illegal material may not be accessed, viewed or
stored on college computing facilities.
Conduct that involves the use of computing or
communications resources to violate a college
policy or regulation, or to violate another’s
rights, is a serious abuse and can result in
limitation of privileges and lead to appropriate
disciplinary action.
Software Use Policies
Neither licensed software, nor college-developed
software, shall be copied except as specifically
stipulated in license agreements or in The Texas
State University System Rules and Regulations. All
software protected by copyright shall not be copied
except as specifically stipulated by the owner of the
copyright.
Students have permission to use licensed software
according to the regulations set by the College. The
use of such software is governed by the terms of
licensing agreements between the College and th e
software licensors. Users must read and abide by the
terms of those agreements.
Internet Use Policies
The College maintains a connection to the internet
in support of its mission. Users must be aware that
all internet usage, including source and destination,
can be recorded and stored. Users have no right to
privacy with regard to internet use.
The College has the ability and right to view any
user’s usage patterns and take action to assure
internet resources are devoted to maintaining the
highest levels of productivity.
The internet path record is the property of the
College and therefore the people of the State of
Texas. Such information is subject to the Texas
Public Information Act and the state laws applicable
to records retention.
Using the college’s internet connection to access
information, images or other materials that violate
any federal laws, state laws, Texas State University
System rules or LSCPA policies is strictly
prohibited. Using the internet connection to access
other computer systems in violation of state or
federal law is prohibited. Using the internet
connection to access other computer systems in
violation of the policies of the entity that owns those
systems is strictly prohibited.
Electronic Messaging Policies
Access to and the responsible use of modern
information resources are essential to the pursuit
and achievement of excellence. The College
encourages the appropriate use of electronic
messaging to enhance productivity. Use of these
resources must be consistent with the college’s goals
of education, research, and public service.
“Electronic messaging” refers to those computer
applications such as email, instant messaging, video
and/or audio conferencing/collaboration, chat rooms,
newsgroups, list servers, streaming media, message
boards or any other application that allows a user to
interactively or passively communicate with one or
more persons or entities using the college computing
or communications resources.
Responsible users of electronic messaging
applications are expected to act in accordance with
the following policies based on common sense,
common decency and civility applied to the
networked computing environment.
Information sent as electronic messages should meet
the same standards for distribution or display as if
they were tangible documents or instruments. Users
must be clearly and accurately identified in all
electronic communications.
Concealing or misrepresenting a name or affiliation
in order to be dissociated from responsibility for
actions taken is never appropriate. Alteration of the
source of electronic messages or postings is
unethical and possibly illegal.
Electronic messaging facilities are for college-
related activities only. All electronic messaging files
belong to someone. Aside from the college’s right of
access, they should be assumed to be private and
Page 53 of 135