This document establishes procedures for the appropriate use of computer systems, telephone systems,
networks, data, computer programs and other information technology resources by students, faculty and
staff at the College of Central Florida.
Users are expected to use computer and network resources in a responsible manner. Users should take
appropriate precautions to ensure the security of their passwords and prevent others from obtaining
access to their computer resources. Convenience of file or printer sharing is not a sufficient reason for
sharing computer accounts.
Users may not encroach on others' use of computer resources. Such actions include, but are not limited
to, overloading computer resources with trivial applications or excessive game playing, sending frivolous or
excessive messages including chain letters, junk mail, and other similar types of broadcast messages,
downloading personal music and videos unrelated to specific educational purposes, or using excessive
amounts of storage.
The following behaviors are prohibited while using College information technology resources, including
computers and networks owned or operated by the College of Central Florida, or to which the College of
Central Florida is connected:Modifying system or network facilities, or attempting to crash systems or networks;
Using, duplicating or transmitting copyrighted material, without first obtaining the owner's
permission, in any way that may reasonably be expected to constitute an infringement, or that
exceeds the scope of a license, or violates other contracts;
Tampering with software protections or restrictions placed on computer applications or files;
Using College information technology resources for personal for-profit purposes;
Installing unlicensed software on College computers;
Sending messages that are malicious or that a reasonable person would find to be harassing. This
includes vulgar, racist or obscene material;
Sending or disseminating any College data or information that would be considered sensitive or
confidential, unless it is specifically required by a State or Federal governmental body;
Subverting restrictions associated with computer accounts;
Using information technology resources to obtain unauthorized access to records, data, and other
forms of information owned, used, possessed by, or pertaining to the College or individuals;
Accessing another person's computer account without permission. Users may not supply false or
misleading data, or improperly obtain another's password to gain access to computers or network
systems, data or information. Obtaining access to an account name or password through the
negligence or naiveté of another is considered to be a specifically prohibited use;
Intentionally introducing computer viruses, Trojan Horses, or other rogue programs into information
technology resources that belong to, are licensed to, or are leased by the College of Central Florida
Physically damaging information technology resources;
Using, or encouraging others to use, information technology resources in any manner that would
violate this or other College policies or any applicable state or federal law;
Falsely reporting or accusing another of conduct that violates this policy, without a good faith basis
for such an accusation; and,
Releasing any information stored in college systems to others outside of the college except where
specifically authorized to do so.
Users should remember that information distributed through the College's information technology
resources might be considered a form of publication. Although the College of Central Florida does not
take responsibility for material issued by individuals, users must recognize that third parties may perceive
anything generated at the College of Central Florida as in some manner having been produced under the
College of Central Florida auspices. Accordingly, users are reminded to exercise appropriate language,
behavior, and style in their use of information technology resources.
Users must strictly adhere to software licensing agreements and copyright laws. All software licenses for
software not centrally maintained by Information Technology must be on file in the department where the
software is installed.
While respecting users' privacy to the fullest extent possible, the College reserves the right to examine anyMisuse of computing, networking, or information resources may result in the loss of computing and/or
computer files. The College reserves this right for bona fide purposes including, but not limited to:
Enforcing policies against harassment and threats to the safety of individuals;
Protecting against or limiting damage to College information technology resources;
Complying with a court order, subpoena or other legally enforceable discovery request;
Investigating and preventing the posting of proprietary software or electronic copies of texts, data,
media, or images in disregard of copyright, licenses, privacy, or other contractual or legal
obligations or in violation of law;
Safeguarding the integrity of computers, networks, software and data;
Upgrading or maintaining information technology resources;
Protecting the College or its employees and representatives against liability or other potentially
network access. Additionally, misuse can be prosecuted under applicable statutes. Users may be held
accountable for their conduct under any applicable College or campus policies, or procedures. Illegal
production of software and other intellectual property protected by U.S. copyright law is subject to civil
damages and criminal punishment including fines and imprisonment.
Minor infractions of this policy, when accidental, such as consuming excessive resources or overloading
computer systems, are generally resolved informally by the unit administering the accounts or network.
This may be done through electronic mail or in-person discussions and education.
Repeated minor infractions or misconduct that is more serious may result in the temporary or permanent
loss of computer access privileges or the modification of those privileges. More serious violations include,
but are not limited to unauthorized use of computer resources, attempts to steal passwords or data,
unauthorized use for copying of licensed software, repeated harassment, and threatening behavior, may
result in termination of employment if the user is an employee or referral to an administrator for appropriate
disciplinary action if the user is a student.
Violations will normally be handled through the College's disciplinary procedures applicable to the relevant
user. For example, students will be investigated and penalties or discipline imposed consistent with the
procedures described in college policy and the Student Code of Conduct. However, the College may
deny or restrict access to resources prior to the initiation or completion of such procedures when it
reasonably appears necessary to do so to protect the integrity, security, or functionality of the resources or
to protect the College from liability. The College may also refer suspected violations of law to appropriate
law enforcement agencies.