Lamar State College Port Arthur 2016-2017 Catalog
3. Using materials prohibited by the instructor during a test;
4. Either impersonating another student during a test or having another person assume one’ s identity during a test.
5. Changing answers on a previously graded test in order to have a grade revised;
6. Stealing examination materials.
7. Copying material, either exactly or in essence, and not providing appropriate documentation;
8. Copying or falsifying a laboratory or clinical project / assignment, including computer programs, in either disk or hard copy form;
9. Allowing someone else to compose or rewrite a student’ s assignment;
10. Stealing, buying, selling, or otherwise providing research papers.
As with other violations of student conduct, cheating and / or plagiarism may result in disciplinary action.
Penalty for False Statements
A student who provides false information or makes false statements to any college official or office or on an official form submitted to the College is subject to immediate dismissal.
Computer Services Policies
The use of the college’ s computing and electronic communication resources is a privilege, not a right. That privilege can be revoked at any time if a user violates policies outlined here and contained in detail on the college website.
The Information Resource Use Policy is designed to ensure the ethical, efficient, effective and lawful use of computer hardware, software, networks and systems. Students who violate the policy will receive appropriate disciplinary action from the College and may also face legal action from civil authorities.
No provision of the college’ s policy supersedes or limits any state or federal laws, or any other Texas State University System or Lamar State College Port Arthur policies regarding confidentiality, information dissemination or standards of conduct.
The College is committed to:
• Providing students with the computer hardware and software necessary to perform their instructional assignments;
• Protecting its computer environment from viruses;
• Maintaining compliance with the U. S. copyright laws and software license agreement and;
• Discouraging and monitoring for copyright infringement.
Each user is granted non-commercial use of the computing and communications facilities and services of the College according to rules that may be posted at those facilities, and to the terms described in this publication. A student who illegally duplicates software and / or its documentation, violates the policies of the Information Resources Use Policy or otherwise fail to comply with the college’ s third-party software license agreements, will be subject to disciplinary action up to and including expulsion from school.
Computing Facilities Use Policies
The college’ s computing facilities are provided for the support of college programs. All users are responsible for seeing that these facilities are used only for transaction of college business. Computing facilities and accounts are owned by the College and may be used only for college-related activities.
The College reserves the right to allocate and restrict access to computing resources. Users may not use computer systems, facilities or services in any way that diminishes or interferes with the reasonable and confidential use of those systems.
The College retains the right to access and immediately remove any data or files evidencing any such misuse.
Account access information assigned to an individual is not to be given to another individual. The individual assigned to an account is responsible for all activity for which that account is used.
The following policies govern the use of all college computing facilities. Any use of these facilities in any way other than those stated below will be considered in violation of college policy.
• Users are accountable for using computing facilities in an effective, ethical and lawful manner.
• Use of college computing facilities to create, display, modify, or transmit files that are abusive, harassing, threatening, indecent, or illegal is expressly prohibited.
• Material that might be considered indecent, abusive, harassing or threatening may be accessed, activated and viewed only insofar as those materials and resources are required to perform legitimate college-related functions.
• Illegal material may not be accessed, viewed or stored on college computing facilities.
• Conduct that involves the use of computing or communications resources to violate a college
Page 52 of 130