Information Technology Acceptable
Use Policy

For more information contact
Center for Student Success
Computer Lab
Room 171

Hours of Operation
Monday through Thursday
8:00 a.m. to 8:00 p.m.
Friday from 8:00 a.m. to 4:30 p.m.
Closed on Saturday and Sunday.

Interim Hours
Monday through Thursday
8:00 a.m. to 5:00 p.m.
Friday from 8:00 a.m. to 4:30 p.m.
Closed on Saturday and Sunday.

Closed between semesters or when campus is closed.

Clovis Community College provides numerous information technology resources for use by the College's students, faculty, and staff. Information technology includes, but is not limited to, all college computing equipment, software, systems, networks, electronic mail, and Internet access. These resources are the property of the College and are provided to the campus community to support the College's mission and institutional goals. The purpose of this policy is to protect the College's technology users and resources and to ensure equitable access and proper management of resources.

Users are responsible for all their activities while using technology resources and services. By using the College's resources, users agree to abide by all relevant Clovis Community College policies and procedures, as well as all federal, state, and local laws. Additionally, each computing facility or service has specific rules and regulations that govern the use of their systems and users must comply with those rules and regulations. Users are responsible for keeping up to date with this policy and other applicable College technology policies, procedures, and guidelines. Current technology policies are available on the campus web page and from the Information Technology Office.

Use of computing resources may be limited by issues of need, resources, or appropriate use. Access to computing resources is provided in part to learn, explore, and grow as part of a user's education or employment at the College. However, activities related to the College's educational mission and institutional goals take precedence over computing pursuits of a more personal nature. Some applications may be actively discouraged due to the demand they place on limited resources. Please cooperate with college computing staff if asked to refrain from running applications such as these when resource use is heavy.

Clovis Community College respects copyright laws and insists that its faculty, staff, and students do likewise. Copying proprietary software is theft and will not be tolerated on campus.

Users should not distribute email document attachments or post information on the College Web site containing copyrighted material unless evidence exists that the College has the right to copy or distribute such material. Examples of copyrighted materials could include software, database files, documentation, articles, graphic files, or downloaded information.

Electronic Communication and Internet Usage
The College provides a variety of electronic communication channels such as Web pages, the Internet, email, messaging, chats, lists and newsgroups for use by students, faculty, and staff. The College encourages the appropriate use of these technologies to enhance its mission and goals. The College permits incidental personal use of email provided that such use does not interfere with the operation of the College and does not negatively affect the user's job performance. For further information about electronic communication at the College, please see the Clovis Community College Electronic Mail Procedures and the Student Email Policy.

Users who purposely access sites or distribute electronic messages containing pornographic, lewd, sexually explicit, illegal, or other offensive material may expose the College to liability for sexual harassment or other unlawful discrimination. This includes information that contains sexual implications, racial slurs, gender-specific comments or any comment that offensively addresses someone's age, sexual orientation, religious or political beliefs, national origin, or disability. In addition, intentional access or distribution of such information is not for business purposes and is not necessary for the performance of legitimate job duties and responsibilities. Such use of the Internet is strictly prohibited.

Owners of computer accounts are responsible for safeguarding their User IDs and passwords and are responsible for all activity generated from their accounts. Misuse of access rights should be reported to the appropriate department or division supervisor.

Misuse of Technology Resources
The College provides information technology resources for users to engage in activities that support the work of the institution. Use of the College's resources for personal profit, non-College related fund-raising, political campaigns, or illegal purposes is not acceptable. Non-authorized solicitations on behalf of individuals, groups, or organizations are also prohibited. Examples of unacceptable use include selling raffle tickets for non-College related activities, advertising the sale of personal items, or distributing political campaign materials. Employees may not use the "All Campus User" mass distribution list to mass distribute non-work related messages. Other examples of misuse include, but are not limited to:

  • attempting to defeat or circumvent any security measures, controls, accounts, or record-keeping systems
  • using systems for unauthorized access
  • intentionally altering, misappropriating, dismantling, disfiguring, disabling, or destroying any computing information and/or services
  • using technology resources or services for workplace violence of any kind as defined in Campus Code of Conduct
  • using technology resources or services for unlawful purposes including fraudulent, threatening, defamatory, harassing, or obscene communications
  • invading the privacy rights of anyone
  • disclosing or using non-public information for unauthorized purposes
  • disclosing student records in violation of FERPA
  • violating copyright law
  • using another person's user ID, password, files or data without permission
Users should be aware that although the College takes reasonable measures to protect the security of its computing resources and accounts assigned to individuals, the College does not guarantee absolute security and privacy. Communications and other documents created by means of the College's technology resources are subject to New Mexico's Inspection of Public Records Act to the same extent as if they existed on paper. Information stored electronically may also be made available in administrative or judicial proceedings.

In general, the practice is to treat electronic data with as much privacy as possible. However, situations may arise where employees with legitimate business purposes may have the need to view information or email or monitor user activity on the network. The College will do so only when it believes it is appropriate to prevent or correct improper use, satisfy a legal obligation, or insure proper operation of the electronic resources.

The President or his/her designee may authorize access to employee or student email or computer files in a number of circumstances including, but not limited to:
  • situations involving the health or safety of people or property
  • possible violations of College codes of conduct, regulations, policies, or laws
  • termination of an employee
  • other legal responsibilities or obligations of the College
  • the need to locate information required for College business
Violations of the Acceptable Use Policy are treated like any other violation of College policy. The College reserves the right to discipline a user if it is determined, after an investigation by the appropriate Vice President or the President's designee, that the user violated federal or state law or College policy by misusing College technology resources or services. Procedures contained in the faculty, professional, support, and student handbooks will determine disciplinary action, up to and including termination or legal action.

All users of Clovis Community College technology resources must read, understand, and comply with the policies outlined in this document. By using any of the College's information technology resources, users agree to comply with these policies.

Board Approved 12/5/2001