Page 65 - 2025 JCH Student Handbook
P. 65

65

        I.T. User Agreement
        Wireless Internet access is provided while you are a resident at Janet Clarke Hall. Connecting to the
        College  internet  means  you  automatically  agree  to  abide  by  the  following  responsibilities  and
        restrictions:

        The security of the network relies upon the proper conduct of end users who must adhere to strict
        guidelines. Please do not share passwords or access to internet accounts. The College will not be
        held responsible for unauthorised account access or data usage.

        Inappropriate or unacceptable use of the network is not permitted. Such activities may result in
        legal  repercussions,  and,  more  directly  and  immediately,  your  devices  being  banned  from
        connecting to the network.

        Examples of inappropriate and unacceptable use of computing and networking resources include,
        but are not limited to:

               ●  Activities or transmitting of materials that violate Australian laws (e.g., fraudulent acts,
                   copyright infringement, and threats or acts of intimidation or harassment against another
                   person).
               ●  Excessive bandwidth utilisation and/or downloading excessive amounts of data from the
                   Internet.

               ●  Attempting to circumvent security software or other security measures placed on college
                   network systems or computers.

               ●  Mishandling,  damaging  or  tampering  with  college  computer  equipment,  software  or
                   settings, or attempting to circumvent computer or network security or restrictions.

               ●  Maliciously accessing, altering, deleting, damaging or destroying any computer system,
                   network, program or data. This includes, but is not limited to, accessing/ altering another
                   user’s machine, or any machine attached to the college network.

               ●  Disrupting or attempting to disrupt network traffic or attempting to overload or crash the
                   college network or attached systems.

               ●  Attempting to monitor or capture network traffic.

               ●  Engaging in spam activities (i.e., sending unsolicited electronic communications to large
                   groups of individuals at the same time) or sending e-mail chain letters.
               ●  Installing software on any College owned equipment without permission.


        The College regularly monitors the use of the network resources. If a user violates any provisions of
        use, their access will be terminated. Disciplinary and (if appropriate) legal action may be taken.












                                                                                                              65
                                           Janet Clarke Hall Student Handbook 2025
   60   61   62   63   64   65   66   67   68   69   70