Background Image
Previous Page  75 / 86 Next Page
Show Menu
Previous Page 75 / 86 Next Page
Page Background


other information sources. Using the system on an occasional basis for personal use, such

as corresponding with friends or family through electronic mail, may also be considered

appropriate, but in all cases usage should defer to college related activities. The computer

system may not be used for commercial or solicitation purposes without the express written

consent of appropriate school officials. The computer resources provided by the college are

the sole and exclusive property of the college.

It is expected, in return, that users must respect the rights and privacy of others and must

obey school policies and state and federal laws that may apply to their activities while using

the computer system. Although the college, in its official capacity, will make every effort

to respect the privacy of users of the computer system, it should be understood by all users

that the computer systems is owned and operated by a private and Christ-centered college.

Bluefield College considers any violation of the acceptable use principles or guidelines to

be a serious offense. Any or all of these systems and all files on these systems may be

intercepted, monitored, recorded, copied, audited, inspected, and disclosed to Bluefield

College and law enforcement personnel, as well as authorized officials of other agencies,

both domestic and foreign. Bluefield College also reserves the right to protect its network

from systems and events that threaten or degrade operation. Bluefield College also reserves

the right to determine what is acceptable and not acceptable in the use of computer systems.

Violators are subject to disciplinary action as prescribed in the honor codes, in the Student

Handbook, and in the Faculty Handbook. Offenders may be prosecuted under the law toits

fullest extent.

Bluefield College Department of Information Technology may suspend or limit access to its

resources for misuse of software, hardware, and/or network services. Other actions may be

taken depending on the nature of any misuse including investigating any suspicious activity.

Violations may result in loss of access privileges, disciplinary action by student judicial

groups, and/or prosecution under civil or criminal laws. By using these systems, you are

consenting to follow and submit to all Bluefield College policies concerning appropriate

network use. Administrators of individual systems such as the library or computer labs may

establish policies that place additional responsibilities upon users.

Access to communication systems and networks owned or operated by Bluefield College

implies certain responsibilities and obligations. Access is granted subject to college policies

and local, state, and federal laws. Acceptable use is ethical, reflects academic honesty,

and shows restraint in the consumption of shared resources. It demonstrates respect for

intellectual property, ownership of data, system security mechanism, and individual rights

to privacy and to freedom from intimidation and harassment.

Legal Responsibilities

There are several legal obligations for users of the computer system. The examples

provided here are the most significant, but should not be considered a complete list. It is the

responsibility of users to be aware of and respect state and federal statutes that may regulate

their activities.

• Users must obey copyright laws and respect the intellectual property of others.

• Software license agreements must be honored. The college makes every effort to

properly purchase and license all software installed on the institution’s computer