SA-24 Student Technology Acceptable Use Policy
This policy governs the use of all technology and computer resources at Green River College including (but not limited to) college computers, college email, internet access, and use of the college network by either college-owned devices or privately owned devices. Use of the college’s technology and computer resources signifies agreement to abide by this policy.
All students enrolled at Green River College.
Private or personal business: Any activity performed outside college business.
Policy and/or Procedure
College facilities offering computer access exist to support academic success. Acceptable uses of these computers, systems, networks, and databases include: school activities, school-related activities, and limited “de minimis” personal activities (such as checking email and academic related websites) that do not interfere with other school-related activities. Unacceptable uses include, but are not limited to:
- Any activity which violates any college policy, including the college's Code of Conduct, or any city, state, or federal law, including hate speech, copyright violations, gambling, any malicious, threatening, or obscene matters.
- Any activity which interferes with the work of others, including but not limited to, excessive printing; creation or propagation of computer viruses or other self-replicating or destructive programs; harassment of others; posting, mailing, or printing of obscene materials; or distributing unsolicited advertisements.
- Using college technology resources to gain unauthorized access to any computer, files, data, systems, or networks.
- Unauthorized access of the college’s data repositories. This includes, but is not limited to, accessing, downloading to, or modifying any online storage (e.g., SharePoint, Teams, or OneDrive), network drives, or the hard drive on any school computer, whether or not security is in place. This also includes gaming that modifies the network drives or hard drives of the computer in any way. Shared classroom/instructional drives are for school-related files only; personal files are not permitted.
- Unauthorized installation or deployment of solutions or devices intended to bridge college technology resources to an outside entity or alternate internet provider. This includes, but is not limited to, wireless access points, VPNs, remote access or assistance solutions (e.g., TeamViewer or VNC apps), and internet connection sharing options.
- Unauthorized use of technology for the purpose of conducting private or personal commercial business. The College technology resources may not be used for commercial purposes.
- Misrepresenting or forging the identity of the sender or the source of an electronic communication.
- Viewing websites or emails which violate the College’s Code of Conduct, State, and Federal Laws.
User Account Information
For privacy and security reasons user account information may not be shared with anyone else. Each student should only use the user account they were assigned by the college in order to access the college technology resources.
The College reserves the right to monitor the use of college technology resources in the course of performing normal system and network maintenance orwhile investigating policy violations or suspected criminal activity.
Violations of this Student Technology Acceptable Use Policy will result in sanctions which may include loss of computer privileges, school disciplinary action, and/or legal action.
Each student is responsible for their own actions in using any of the college’s technology and computer resources. Green River College is not liable for harm caused by the actions of any person using the college’s technology resources.
Students are also bound by the Student Code of Conduct as set out in the Washington Administrative Code.(WAC)
Please be particularly aware of WAC 132J-126-090Conduct-Student Responsibilities sections:
WAC 132J-126-090 (8) Abuse; intimidation
WAC 132J-126-090 (15) Harassment
WAC 132J-126-090 (20) Disorderly conduct
WAC 132J-126-090 (21) Discriminatory conduct
WAC 132J-126-090 (23) Improper use of technology
Disciplinary action is described in the following section:
WAC 132J-126-140 Initiation of Disciplinary Action
History of Policy or Procedure
Draft: February 15, 2007Adopted: April 9, 2008Revised: March 3, 2008; February 21, 2013, April 20th, 2021, February 16, 2023
Reviewed by: Student Affairs and Information Technologyh5
Contact: David Larsen, Dean of Enrollment and Completion, 253-833-9111, ext. 3307, firstname.lastname@example.org
Sponsor: David Larsen, Dean of Enrollment and Completion, 253-833-9111, ext. 3307, Camella Morgan, CIO/Executive Director of IT, ext. 6050
- SA 1 Academic Standards & Progress Policy
- SA 2 Academic Honors
- SA-3 Audit a Class
- SA-4 Admissions
- SA-5 Deceased Student
- SA-6 Grading Policy
- SA-9 Transcripts
- SA-13 Financial Aid Application Process
- SA-14 Federal Direct Loan Program
- SA-15 Financial Aid Eligibility
- SA-16 Return of Financial Aid Funds
- SA-17 Satisfactory Progress for Financial Aid
- SA-18 Notification on Convicted Sexual Offenders
- SA-20 Degree Exception
- SA-22 Graduation Criteria
- SA-24 Student Acceptable Computer Use Policy
- SA-27 Missing Student Policy
- SA-28 Disclosure of Crime Statistics
- SA-29 Facility Access & Maintenance for Safety
- SA-30 Fire Safety Education for CCA
- SA-31 Reporting Crimes and Other Emergencies
- SA-89 Transfer Credit
- SA-90 Academic Credit for Prior Learning
- SA-91 College Holiday & Leave Policy
- SA-92 Timely Warning Notifications
- SA-93 Emergency Notification Policy