Policies and Procedures

B0408P(c) Computer & Telecommunications Usage - Users

​User Responsibilities

  1. Users are responsible to keep themselves familiar with all school policies and procedures.  If questions arise concerning computing policies, contact INMS for further clarification.
  2. Users should never give out their password. If for any reason you are asked to divulge your password by anyone, the user should report that action to INMS.
  3. Identity Theft will not be tolerated. All instances of identity theft will be treated as theft and or fraud, which will lead to disciplinary or legal actions. Please notify INMS and security as soon as possible if you suspect someone is misusing your computer account.
  4. Users must not use the system for other than academic and/or administrative purposes.
  5. Users must not cause damage to either hardware or software. Report all problems to INMS helpdesk.
  6. Users must not use software that causes damage to the systems or to other users.
  7. Users must not copy/give software to a third party without oral/written permission from its author.
  8. Absolutely no food, drinks, or tobacco of any kind are allowed in the labs or computer classrooms.

Academic Integrity

  1. Computer fraud or dishonesty takes many forms and the wide use of computers and networks on campus raise some particularly important issues. In general, computer users who attempt to violate privacy, steal software or gain more than their fair share of resources may be subject to disciplinary action. To have a fair share of resources means that each person use only his or her allocated resources and make no attempt to degrade system performance.
  2. A violation of responsibilities or a breach of academic honesty could result in the denial of computer system and network access as well as other disciplinary action. (Reference: Policy E0700 Student Code of Conduct)
  3. The College may also choose to prosecute violators through civil or criminal justice systems. Note that violations in use of networks may also result in prosecution by entities outside Western Technical College when violations affect outside resources. When violations involve networks crossing state lines, federal law enforcement agencies may become involved.
  4. Internet Plagiarism will not be tolerated and will be treated as any other type of plagiarism.  All information quoted from an Internet source must be noted appropriately. (Reference: Policy E0700 Student Code of Conduct)

Student Email

  1. It is the policy of this college that its facilities be used to fulfill its mission of teaching and public service. Western facilities including the email system are not available for unrestricted use for other purposes.
  2. Email is not intended to be used for personal gain nor as a medium for free expression when unrelated to the academic programs or operations of the College.
  3. Communications that violate Wisconsin, federal, local or international laws are unacceptable. Activities that interfere with the ability of others to make effective use of campus email, computing and network resources are prohibited. You may be subject to criminal prosecution if you: access or release unauthorized information/data; intentionally disclose your password to another who uses it to gain unauthorized access to information; or fail to exercise adequate care in maintaining system security. Using the network in a harmful or harassing manner is prohibited.
  4. It is also the responsibility of all students to report any potential misuse of the college email communications services. Inquiries and concerns can be reported to Director of INMS.
  5. It is imperative that Western insure that all email communications to the user community (students & staff) are essential and relevant to the academic college mission.
  6. Email communications is a tool for official communication with students. Students are expected to check their official Western email at lastname1stinitial@students.westerntc.edu. In the case of a duplicate, a number will be added after the 1st initial in the ID.
  7. For open records access requests and the subpoena of computer materials, state and federal regulations apply.  In regard to open records access requests, email delivered to the College is considered to be an open record, much like a written or printed document, and can be requested.  As is the case of all open records access, only items which are readily available need be supplied.  Email messages retained in your mailbox could be regarded as readily available and could have to be supplied if requested.

Failure to comply with the above guidelines or the unauthorized or illegitimate use of Western Technical College computing facilities or resources shall constitute a violation of College policy and will subject the violator to disciplinary or legal action by the College. In addition, the College may require restitution for any use of service that is in violation of these guidelines. Any questions about this policy or the applicability of this policy to a particular situation should be referred to the Director of INMS.

Revised December 12, 2016
Revised March 25, 2009
Revised January 9, 2008
Revised June 21, 2007
Reviewed November 16, 2004
Revised September 17, 2003
Revised March 24, 2003
Revised November 1, 2001
Revised February 26, 2001
Approved February 15, 2000