糖心vlog

 

Policy: Policy 8-1-2: Computing and Network Acceptable Use Policy Date Adopted: July 10, 2008
Department: Computing Services Date(s) Reviewed and/or Revised:

November 3, 2023; January 18, 2011; September 2, 2008; May 11, 2004;
Contact: Director
Statement: All students and staff who use 糖心vlog's computing facilities are responsible for knowing the content of 糖心vlog's Computer and Network Acceptable Use Policy. 

Section 1: Appropriate Use

The appropriate utilization of computing resources entails the following:

  1. Respecting the Rights of Others: Users are expected to show consideration for the rights of other computer users.  This includes refraining from activities that may disrupt or impede others' access or use of computing resources.
  2. Protecting Facility Integrity: The physical and software facilities of the computing system must be safeguarded. Users should take measures to prevent any unauthorized access, damage, or tampering with the hardware or software components.
  3. Compliance with Licensing and Contracts: Users are required to adhere to all applicable license agreements and contractual obligations associated with the software and resources they utilize.
  4. Adherence to Regulations and Laws: All users must comply with the regulations set forth by the Nevada System of Higher Education (NSHE) and relevant state and federal laws when using computing resources. This includes, but is not limited to, policies related to privacy, security, and acceptable use.

For students enrolled in 糖心vlog courses, it's essential to note that they are considered NSHE students and, as such, are obligated to abide by NSHE policies.  Inappropriate use of computing or networking resources may lead to the revocation of computing privileges. In the event of a breach of appropriate use, the following steps may be taken:

Moreover, in accordance with NRS 281.481, NSHE employees are prohibited from using NSHE computer resources for personal or financial gain. Personal use should not disrupt official institutional use. Any employee found responsible for intentionally or negligently damaging NSHE computing resources will be held accountable for resulting expenses.

NSHE accounts provided to students, faculty, and staff are for the exclusive use of the designated recipient. Unauthorized access or privileges are strictly prohibited. Users must refrain from attempting to disrupt computing and network services, including activities like the deliberate spread of computer viruses or the excessive sending of unwanted messages to individuals, groups, or the system.


Section 2: Privacy Issues

The NSHE implements security measures to ensure the protection of the following:

  1. Integrity and Privacy of Electronic Information: NSHE safeguards the integrity and privacy of electronic information, including administrative data, individual data, personal files, and electronic mail. These measures are in place to prevent unauthorized access, tampering, or disclosure of sensitive electronic information.
  2. Compliance with FERPA (Family Educational Rights and Privacy Act): NSHE ensures strict adherence to all requirements outlined in the Family Educational Rights and Privacy Act (FERPA). This federal law governs the privacy and security of student educational records and sets specific guidelines for their protection.
  3. Prevention of Security Circumvention: Users are explicitly prohibited from circumventing security measures put in place by NSHE. This policy is enforced to maintain the effectiveness and integrity of the security systems and to prevent unauthorized access or breaches.

By implementing these security measures, NSHE aims to maintain the confidentiality, integrity, and availability of electronic information while upholding legal and regulatory requirements such as FERPA. Additionally, it emphasizes the importance of not attempting to bypass or