Copies of this CCSF Computer Usage Policy can be found in the college catalog and the employee's handbook. Each user who uses the CCSF computing facilities and resources is bound by this policy.

Violation of these policies will be dealt with in the same manner as violations of other College policies and may result in disciplinary review. In such a review the full range of disciplinary sanctions is available including the loss of computer use privileges, dismissal from the College, and legal action. Violations of some of the policies below may constitute a criminal offense.

 CCSF makes computer accounts and resources available for student use in the pursuit of instructional goals, and to faculty and staff to support the institution's mission.

The Computer Usage Policy applies to all users of the CCSF computing resources. This includes administrators, faculty, staff, students and guests on District equipment and networks.

Computer accounts and computer access are privileges, and require the individual user to act responsibly. By using the CCSF accounts, users have agreed to respect the rights of other users and accounts, to use the account only for school-related purposes, and to safeguard the integrity of the system and its related physical resources. Users have further agreed to observe all relevant laws, regulations, policies and contractual obligations of the College.

Other organizations operating computing and network facilities that are reachable via the City College network may have their own policies governing the use of those resources. When accessing remote resources from City College facilities, users are responsible for obeying both the policies set forth in this document and the policies of the other organizations. It is the user's responsibility to be informed of the policies of other outside organizations to which they establish a computer link.

 CCSF does NOT guarantee or warranty the confidentiality of user files, including e-mail, except where legally or contractually protected. It is the practice of Information Technology Services (ITS) to respect the confidential nature of user files, but the ITS Department reserves the right to view or alter user files when it is necessary. Any ITS employee must have permission from the appropriate Vice Chancellor prior to investigating or modifying a user file.

User files may also be subject to search under court order if such files are suspected of containing information that could be used as evidence in a Court of law. Student files as kept on ITS facilities are considered educational records as covered by the Family Educational Rights and Privacy Act of 1974 (Title 20, Section 1232(g) of the United States Code, also referred to as the Buckley Amendment).

In addition, a system administrator may access user files as required to protect the integrity of the computer system. For example, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged.

All existing federal and state laws and College regulations apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct.

Misuse of computing, networking or information resources may result in the loss of computing and/or network privileges without notice. This includes both those that ITS administers, and those that may exist in other departments associated with 欧宝体育app and connected to its network. Deliberate violations of these policies will be dealt with in the same manner as violations of other college policies and may result in disciplinary sanctions including, but not limited to, loss of computer use privileges, dismissal from the college, and/or appropriate legal action.

Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable College or campus policies, procedures, or collective bargaining agreements. Complaints alleging misuse of the College's computing resources will be directed to those responsible for taking appropriate disciplinary action as specified under Enforcement below. Illegal reproduction of soft