Page 35

35 2. If the faculty member is unsure as to whether a violation has occurred, s/he shall consult with the Director of Student Life and Housing or immediate supervisor for review and discussion. 3. If the faculty member is persuaded that an act of academic dishonesty has occurred, s/he shall report in writing his/her findings, reasons for his/her conclusion with appropriate supporting materials and, on a separate sheet, a list of possible witnesses promptly to the Director of Student Life and Housing for review. The faculty member cannot impose a remedy without the involvement of the Director of Student Life and Housing. F. Acceptable Use of Computing Resources CIA makes available, to authorized users, computer facilities and services in support of its mission of providing an environment which encourages innovative teaching, learning, and research. The complete statement on acceptable use of computing resources at CIA is found at http://gate.cia.edu/joomla/index.php?option=com_content&task=view&id=12&Itemid=34 1. Rights and Responsibilities Unauthorized use of CIA computing resources is strictly prohibited. Authorized users are given authorization with the understanding that they will have certain rights and responsibilities. These responsibilities include the following as applied to all resources at CIA, including those provided in CIA-operated housing facilities: • • • • • • • •

Protect your password(s) Report any observed or attempted breach of security by others Change your password(s) as required or requested Make frequent and appropriate backups of your own work to guarantee protection against loss Clearly label personal works and opinions as yours before they are distributed to others Respect the rights of others, the integrity of the systems, and related physical resources Abide by applicable state and federal legislation Respect the confidentiality of records

2. Legal Context and Enforcement All existing local, state, and federal laws, licensing agreements, and all Institute regulations and policies apply to the use of CIA computing resources. Reproduction or distribution of copyrighted works, including but not limited to, images, texts, or software, without the expressed, written permission of its owner is an infringement of US Copyright Law, and is subject to civil damages and criminal penalties, as well as judicial action by CIA. Misuse of computing networking or information resources may result in the restriction or discontinuation of computing privileges, and may be prosecuted. Users are accountable for following Institute policies and procedures. Violators are subject to a full range of sanctions including but not limited to the loss of computer or network access privileges, disciplinary action, and dismissal from CIA. Students and employees may have rights of access to information about themselves contained in computer files, as specified in federal and state laws. Files may be subject to

Cia student handbook  
Read more
Read more
Similar to
Popular now
Just for you