The Acceptable Use Policy is a collection of policies approved by the Cascadia College Board
of Trustees. It defines how students, staff, and faculty are able to legally, ethically,
and fairly use Cascadia's technology resources.
The policy defines the legal rights of Cascadia in reference to Cascadia College computer systems, it defines the rights of users and their data, it states that only legal, licensed copies of software are permitted to be installed on campus computers. It holds all users responsible for using the computers in an ethical manner as defined by state law.
Cascadia College maintains the right to monitor all its systems to ensure that no single user places college's systems at risk nor unfairly monopolizes network resources such that resource availability declines for others.
Information Services Acceptable Use Policy
The purpose of this policy is to outline the acceptable uses of computing and information technology resources for Cascadia College community. This policy outlines the standards for acceptable use of College computing and information technology resources that include, but are not limited to, equipment, software, networks, data and telecommunications equipment whether owned, leased or otherwise provided by Cascadia.
By logging into a Cascadia computer, or network system via remote services or personal
Use Policy. We recommend that you read through the entire Acceptable Use Policy before
utilizing any of Cascadia's network resources.
If you have a question or concern that you don't feel is covered in the Acceptable Use Policy, please email it to the HelpDesk at firstname.lastname@example.org.
Preserving the access to information resources is a community effort that requires each member to act responsibly and guard against abuses. Therefore, both the Cascadia community as a whole and each individual user have an obligation to abide by the following standards of acceptable and ethical use:
- Use only those computing and information technology resources and data for which you have authorization and only in the manner and to the extent authorized.
- Use computing and information technology resources only for their intended purpose.
- Protect the confidentiality, availability, and integrity of computing and information
technology resources, including data.
- Abide by applicable laws and College policies and all applicable contracts and licenses and respect the copyright and intellectual property rights of others, including
the legal use of copyrighted material.
- Respect the finite capacity of resources and limit use so as not to consume an unreasonable amount of resources or to interfere unreasonably with the activity of
- Respect the privacy and personal rights of others.
- Use IS resources without proper authorization.
- Attempt to monitor, intercept, analyze or modify network traffic or transactions not
specifically addressed to your computer.
- Harass, defame, intimidate or threaten anyone through the use of computing or network
- Use computing or network resources for profit, commercial or political use.
- Attempt to alter or reconfigure any College IS resources, e.g. network infrastructure,
- Attempt to obtain privileges for which you are not authorized.
- Attempt to learn another user's password(s) or personal information.
- Attempt to alter or obscure your identity or your computer's identity, including but
not limited to IP Address and email address, while communicating on any network.
- Interfere with or disrupt computer or network accounts, services or equipment of others
including but not limited to consumption of excessive IS resources, (e.g. local area
network or Internet bandwidth) through the propagation of worms or viruses or the
inappropriate sending of broadcast messages to large number of hosts.
- Interfere with or circumvent the IS Group's responsibilities and procedures.
- Consume excessive IS resources, e.g. Local Area Network or Internet Bandwidth.
- Abuse email privileges.
- Download and/or share copyrighted material for which you do not have the proper authorization.
This policy applies to all users of Cascadia computing and information technology
resources including faculty, staff, students, alumni, guests, external individuals
or organizations and individuals accessing external network services, such as the
Internet via College facilities.
The Director for Information Services will determine operational policies, networking standards and procedures to implement the principles outlined in this policy. IS has the right to protect shared information services.
Users of information service resources at Cascadia are subject to applicable federal, state, and local laws, applicable contracts and licenses, and other university policies, including those for Human Resources, and those contained in the faculty and student handbooks, and notably those policies governing copyright and intellectual property compliance. Users are responsible for ascertaining, understanding, and compliance with the laws, rules, policies, contracts and licenses applicable to their particular uses.
Failure to comply with the appropriate use of computing and information technology
resources threatens the atmosphere for the sharing of information, the free exchange
of ideas and the secure environment for creating and maintaining information property
and subjects one to disciplinary action.
Any member of the Cascadia community found using computing and information technology resources in violation of this policy may be denied access to College computing resources and may be subject to disciplinary action, both outside and within the College, including, without limitation, suspension of system privileges, expulsion from school, termination of employment and/or legal action as may be appropriate.
Information Services will publish a procedure describing how student violations are administered.
There is no inherent expectation of privacy for information stored on Cascadia information
services resources, except as provided by federal and state law and other College
policy. Every effort will be made to maintain individual privacy, but the College
will not be liable for the failure of these privacy efforts.
While the College does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the College's computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, the scanning of systems and network ports for anomalies and vulnerabilities, and other such activities that are necessary for the rendition of service.