Background Image
Previous Page  78 / 86 Next Page
Show Menu
Previous Page 78 / 86 Next Page
Page Background


stored therein, such as creating or propagating viruses, disrupting services, or

damaging files;

• Use college systems for commercial or partisan political purposes;

• Use college systems or networks to view or print pornographic material;

• Make or use illegal copies of copyrighted software, store such copies on college

systems, or transmit them over college networks;

• Use mail, messaging, or display services to harass or to intimidate another

person, for example, by broadcasting unsolicited messages, by sending unwanted

mail, downloading, printing or displaying offensive material (eg. screen savers),

or by using someone else’s name or user ID;

• Waste computer resources, for example, by intentionally placing a program in

an endless loop, by using excessive amounts of paper through printing needlessly,

for amusement, or by sending chain letters;

• Destroy or damage networking equipment, such as keyboards, mice, CPU’s,

and monitors;

• Consume beverages or food in any computing lab facility on campus;

• Use the college’s systems or networks for personal gain, for example, by selling

access to your user ID or performing work for profit with college resources in a

manner not authorized by the college, or by selling/buying merchandise on-line;


• Engage in activity that does not conform to the General Principles statements



Bluefield College considers any violation of the acceptable use principles or guidelines to

be a serious offense. Any or all uses of these systems and all files on these systems may

be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to Bluefield

College and law enforcement personnel, as well as authorized officials of other agencies,

both domestic and foreign. Bluefield College also reserves the right to protect its network

from systems and events that threaten to degrade operations. Bluefield College also reserves

the right to determine what is acceptable and not acceptable in the use of computer systems.

Violators are subject to disciplinary action as prescribed in the honor codes, in the Student

Handbook and in the Faculty Handbook. Offenders may be prosecuted under the law to its

fullest extent, as described in, but not limited to, those statues referred to in the Appropriate

Use of Computer Facilities Policy.

Bluefield College Department of Information Technology may suspend or limit access to its

resources for misuse of software, hardware, and/or network services. Other actions may be

taken depending on the nature of any misuse including investigating any suspicious activity.

Violations may result in loss of access privileges, disciplinary action by student judicial