Chapter Eight - Technology: Internet Use
Internet Use (Procedure 7.0170)
The College's authorized Internet users shall have no expectation of privacy in anything they browse, send or receive when using the College's Internet service.
Permitted Uses of the Internet:
- The Internet connection provided by the College is primarily for work-related or academic purposes.
- Occasional and reasonable personal use is permitted, provided that personal use should be kept to a minimum and should not interfere with the performance, productivity, or work duties and responsibilities.
- Users will observe professional and ethical guidelines, applicable federal or state laws, and any College procedures.
Prohibited Uses of the Internet:
Users will not sue the College's Internet to view, download, save, receive, or send material related to or including:
- Offensive content of any kind, including pornographic material.
- Promoting discrimination on the basis of race, color, religion, pregnancy, national origin, ethnicity, age, sex, gender, veterans or military status, disability, sexual orientation, genetic information, marital status, or any other protected factor.
- Threatening or violent behavior.
- Illegal activities.
- Commercial messages.
- Gambling of any form or type.
- Personal financial gain.
- Forwarding email chain letters.
- Spamming email accounts for College email services or machines.
- Material protected under copyright laws, including but not limited to MP3 music, movies, and other entertainment files.
- Sending or dispersing without authorization, College restricted, sensitive, or confidential data to students, employees, business associates, or anyone outside the College.

Technology Resources
Adjunct Faculty Handbook Home Page
Home page and Table of Contents
User ID, Passwords & Security, and Email
User Access and Email information and procedures
Internet Use
Permitted and prohibited uses of the Internet (Procedure 7.0170)
Security Awareness & PODs
Information Technology Security Awareness (Procedure 7.0400) and personally-owned devices (PODs)
Cybersecurity Tips
Cybersecurity tips from our experts
