Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Taft College Student Computer and Network Use: Home

Computer Use Policy


The District is committed to providing access to computing resources to all current students. In order to comply with federal and state regulations, laws, and harassment mitigation policies, the district has established procedures for the appropriate use of District Systems. The definition of District Systems expressly includes access to District data networks, including intranet and internet access, and District e-mail systems, from devices owned by a User or the District, whether on or off District property.

Use of District Systems is a privilege governed by certain regulations and restrictions as defined by the District as well as all applicable federal, state and local laws.

  1. Appropriate Use/Guidelines. Activities deemed to be appropriate uses of District Systems include the following:
  • Authorized access to and use of computer programs licensed by District available on stand-alone and networked District hardware.
  • Authorized access to lab and campus District Systems to perform and complete required course work for District courses in which the User is currently enrolled.
  • User access to District student e-mail accounts.
  • Connecting personally owned District-authorized devices to District Systems.
  • Independent study and research.

  1. Inappropriate Use. District Systems are shared and limited resources. All users have an obligation to use these resources responsibly. Certain activities are prohibited, including but not limited to:
  • Unauthorized use of a User Account.
  • Using District Systems to gain or attempt to gain unauthorized access to any computer systems, or gaining or attempting to gain unauthorized access to District Systems themselves.
  • Connecting unauthorized equipment to the District Systems.
  • Unauthorized attempts to circumvent data protection schemes or uncover security loopholes in, within, or outside of District Systems. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data.
  • Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks, whether within or outside of District Systems (e.g., deleting programs or changing icon names).
  • Knowingly or carelessly running or installing on any District Systems, or giving to another user or using District Systems to transmit, a program intended to damage or to place excessive loads on a computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan Horses, and worms.
  • Deliberately wasting/overloading computing resources on District Systems, such as printing too many copies of a document.
  • Violating terms of applicable software licensing agreements or copyright laws on District Systems.
  • Violating copyright laws and their fair use provisions using District Systems through inappropriate reproduction or dissemination of copyrighted text, images, etc.
  • Using District Resources for commercial activity, such as creating products or services for sale.
  • Using electronic mail via District Systems to harass or threaten others. This includes sending repeated, unwanted e-mail to another user.
  • Initiating or propagating electronic chain letters via District Systems.
  • Inappropriate mass mailing via District Systems. This includes multiple mailings to newsgroups, mailing lists, or individuals, e.g. “spamming,” “flooding,” or “bombing.”
  • Forging the identity of a user or machine in an electronic communication via District Systems.
  • Transmitting or reproducing materials that are slanderous or defamatory in nature or threat otherwise violate existing laws or college regulations via District Systems.
  • Attempting to monitor or tamper with another user’s electronic communications, or reading, copying, changing, or deleting another user’s files or software via District Systems without the explicit agreement of the owner.
  • Transmitting pornographic material via District Systems.
  • Pirating of computer software via District Systems.
  1. Privacy

User messages, data, and usage history on District Systems are accessible to System Administrators through normal system administration activities.

The District reserves the right to monitor the usage of all District Systems to ensure compliance with Board Policy 3720: Computer and Network Use, college policy, and federal, state and local laws. User files and information on District Systems may be subject to search by law enforcement agencies under court order if such files contain information which may be used as evidence in a court of law.

District Users are expected to comply with copyright and intellectual property laws.

Users who become aware of any violation of Board Policy 3720: Computer and Network Use should notify the proper authorities. These authorities include the appropriate administrator, the Office of the President/Superintendent, and/or the local police.

  1. Indemnification/Liability Statement

Use of any information obtained via the District’s Systems is at the User’s own risk.

The District is not responsible for any damage to your personal electronic devices due to any power problem while on campus, or interaction with the Districts Systems. Further, the District is not responsible for damage or theft of electronic devices under your control.

  1. Enforcement

Violations of Board Policy 3720: Computer and Network Use will be reported to the appropriate administrator and, if warranted, the appropriate civil authorities. Non-compliance with this policy may also result in disciplinary action including but not limited to cancellation of a User Account, loss of access to District Systems, suspension or expulsion, legal action, and potential prosecution for violation of state and/or federal law.

For additional Information on BP 3720 and AP 3720 on Computer and Network Use, please visit the Taft College website.