POLICIES & REGULATIONS
3. Introduce or activate any viruses, worms, harmful
code, and/or Trojan horses; evade spam filters to
the FIDM network.
4.Use FIDMCloud Mail accounts, web-related content, or computer resources for personal gain, gambling activities, partisan political purposes, or with the intent of harming a particular individual.
5. Create, download, install, or store programs and software on FIDM systems.
6. Use FIDM network resources to send or post unsolicited messages or email, whether commercial or not:
a. to any recipients who have requested that messages not be sent to them.
b. to a large number of recipients, including users, newsgroups, or bulletin boards, at one time; send or post a message or email with deceptive, absent, or forged header or sender identification information.
c. resell FIDM’s services, in whole or in part, to any entity or individual.
d. hold FIDM, or its affiliates to public scorn or ridicule.
7. Use the FIDM network or computer resources to
play games, use non-FIDM chatrooms, download,
HOW TO AVOID PENALTIES
agreements. Access, send, receive, display, perform, disclose, store, or execute any content:
a. in violation of any copyright, right of publicity, patent, trademark, service mark, trade name, trade secret, or other intellectual property right.
b. in violation of any applicable agreement, —OR—
c. without authorization.
14. Distribute or reproduce, in any digital form, copyrighted music, video, or other multimedia content without the express written permission of the owner.
Violating this policy in whole or in part could result in restrictions to computer resources access or further disciplinary action by the college (such as dismissal from school) and/or criminal prosecution by appropri-ate legal authorities.
The computer labs are designated for students working on academic projects. Out of consideration for all students, recreational computer use is not allowed at busy times when students with academic work are waiting. Use of computers for recreational purposes is not permitted within the classroom when the class is in session.
display, perform, send, receive, or store any
content that is obscene, pornographic, lewd, or
lascivious.
8. Have food or beverages near computer terminals or in the computer labs.
9. Search, read, copy, alter, or delete another person’s files or use another person’s user ID or password, or share a password or Zoom link.
10. Transmit intimidating, harassing, threatening,
discriminating, and inappropriate messages, or
forge electronic communication via all platforms.
Propagate chain letters or pyramid schemes,
whether or not the recipient wishes to receive
such mailings.
11. Communicate with their instructor via personal
telephone number/mobile number or email
address, text messaging or any social media,
including, but not limited to, Facebook, Instagram,
Snapchat, Twitter, or LinkedIn.
12. Use the FIDM network or computer resources
to plagiarize or reproduce copyrighted materials,
trademarks, or other protected material in
any electronic form without express written
permission from the material’s owner. This
includes FIDM’s trademarks, college logo,
and seal.
13. Distribute or duplicate copyrighted software or programs without appropriate licensing
– Do not use file sharing software, (also known as peer-to-peer or p2p software) to download copyrighted media. Students MUST have the copyright owner’s permission or the down-load is considered infringing and illegal.
– Most programs that allow for the download of songs and movies without payment will share the recipient’s computer’s files and personal information to the Internet by default.
– Popular file sharing programs used to distribute and obtain media illegally include: DropBox, BitTorrent, Gnutella, Warez P2P and many others. While these sites are not illegal, they are used for illegal activities.
– Students should only use legal downloading or subscription streaming services, such as Amazon, iTunes, YouTube, and Netflix, to view media.
– Students should not share media obtained legally, except as the copyright holder permits (iTunes streaming, etc.). Most file sharing software, by default, finds, advertis-es and shares all music and movies on the recipient’s computer regardless of whether or not they have the right to share/upload these files.
– Students should protect their computers from malicious software by not installing file sharing software. While malware rarely installs file sharing software, that software is routinely exploited by criminals to provide