Page 66 - 2024 JCH Student Handbook
P. 66

66


        I.T. User Agreement

        Wireless Internet access is provided while you are a resident at Janet Clarke Hall. Connecting to

        the College internet means you automatically agree to abide by the following responsibilities and
        restrictions:

        The security of the network relies upon the proper conduct of end users who must adhere to strict
        guidelines. Please do not share passwords or access to internet accounts. The College will not be

        held responsible for unauthorised account access or data usage.

        Inappropriate or unacceptable use of the network is not permitted. Such activities may result in
        legal repercussions, and, more directly and immediately, your devices being banned from
        connecting to the network.

        Examples of inappropriate and unacceptable use of computing and networking resources

        include, but are not limited to:

               ●   Activities or transmitting of materials that violate Australian laws (e.g., fraudulent acts,
                   copyright infringement, and threats or acts of intimidation or harassment against

                   another person).

               ●   Excessive bandwidth utilisation and/or downloading excessive amounts of data from
                   the Internet.


               ●   Attempting to circumvent security software or other security measures placed on
                   college network systems or computers.

               ●   Mishandling, damaging or tampering with college computer equipment, software or
                   settings, or attempting to circumvent computer or network security or restrictions.


               ●   Maliciously accessing, altering, deleting, damaging or destroying any computer system,
                   network, program or data. This includes, but is not limited to, accessing/ altering another
                   user’s machine, or any machine attached to the college network.

               ●   Disrupting or attempting to disrupt network traffic or attempting to overload or crash the
                   college network or attached systems.


               ●   Attempting to monitor or capture network traffic.

               ●   Engaging in spam activities (i.e., sending unsolicited electronic communications to
                   large groups of individuals at the same time) or sending e-mail chain letters.


               ●   Installing software on any College owned equipment without permission.

        The College regularly monitors the use of the network resources. If a user violates any provisions of
        use, their access will be terminated. Disciplinary and (if appropriate) legal action may be taken.




                                                                                                              66
                                           Janet Clarke Hall Student Handbook 2024
   61   62   63   64   65   66   67   68   69   70   71