Student Handbook 2024-25
8. Do not attempt to access restricted portions of the network, an operating system, security software, or accounting software unless authorized by the appropriate college administrator or owner. 9. Tapping into telephone or network lines is prohibited. 10. Use the college’s information technology facilities and services for college related work. 11. Use of college information technology resources for personal gain requires prior approval. Security on any computer system is a high priority, especially when the system involves many users. If a person feels they can identify a security problem on the Internet, please notify an administrator. Do not demonstrate the problem to other users. Do not use another individual’s access. Attempts to log on to the Internet as a system administrator will result in cancellation of user privileges. Please note the Beacon College e-mail password policy falls under the Microsoft password complexity rules: Passwords must contain a minimum of six (6) characters; Passwords must contain either a number or symbol; Passwords must contain both an uppercase letter and a lowercase letter; and Passwords will expire in 90 days. Internet Vandalism will result in cancellation of privileges. Vandalism is defined as any malicious attempt to harm, alter, or destroy data of another user, Internet, or other networks that are connected to the Internet backbone. This includes, but is not limited to: the uploading or creation of computer viruses. Crypto-mining of any kind on Beacon’s Network is strictly prohibited. Sites referencing, discussing, or affiliated with crypto-mining will be blocked as a preventative measure. Any attempt to access these sites will be held in direct violation of Privileges subsection
Student Handbook AY 2024-2025 | Version 082024
Page 19
Made with FlippingBook - Online Brochure Maker