Student Handbook

Page 82

XV.

APPROPRIATE USE POLICY (AUP) FOR GSSM TECHNOLOGY

The Appropriate Use Policy (AUP) pertains to all users of GSSM networks, contracted services, and any and all other technologies provided by and on behalf of the school. The term user includes, but is not limited to, employees, students, alumni, visitors, contractors, program applicants, job applicants, program participants, and volunteers. GSSM’s technology and services support excellence in teaching, learning, operations, safety, and communications. Activities with the potential to interfere with these aims are prohibited. This includes using email lists in ways that can be perceived as disrespectful and disruptive to other community members. By definition, a network is a shared resource. GSSM’s network is shared by its students, teachers, and administration. Those who use the network, and other shared technology resources provide by GSSM, accept the responsibility to use it appropriately. This Appropriate Use Policy describes those responsibilities and the rules that apply to users of the GSSM computer network.

A. Ethical and Behavioral Standards Those who use the GSSM network are expected to follow the same high standards of conduct and communication that would be expected in face-to-face encounters. These standards are described in the GSSM Student Handbook. Some responsibilities are unique to the environment created by computer networks and are addressed here: 1. Online Safety GSSM cares about the safety of students, faculty, and staff. Social networking services can be dangerous when personal information, particularly information that can lead to the identification or location of a person, is published openly. GSSM strongly encourages students to secure their profiles so that they are not visible to strangers. 2. Online Harassment GSSM’s policies against harassment are in effect whenever and however students encounter each other. This includes online encounters even when participants are off campus. The use of Internet services within and beyond the control of the school to harass another student is a violation of GSSM rules and will result in disciplinary action. When harassment involving non-GSSM services is observed or reported, the school may engage law enforcement agencies and the courts to compel the service provider to disclose identifying information about the harassing party. 3. Protected Information Education records, health information, confidential information, information which may be of a personal and private nature must be transmitted and stored in an approved encrypted format. Such information may only be accessed using authorized equipment maintained and authorized by GSSM and by GSSM authorized GSSM personnel. For more information, refer to the GSSM Information Security Policy. 4. Online Identity/Login Credentials GSSM provides network users with credentials (usernames and passwords) for the purposes of accessing GSSM-owned and GSSM-contracted resources. These credentials are intended to be used only by the person to whom they are assigned. Credentials assigned by GSSM must be kept secret and may not be divulged to anyone else. The person to whom network credentials are assigned is responsible for all activities that occur when those credentials are used. Further, it is a violation of GSSM rules for a person to impersonate someone else by either using their credentials or any other means that might obfuscate identity. GSSM students and employees may be provided credentials to access online databases while using 77


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Appendix C Student Walking Boundaries

1min
page 111

B TITLE IX POLICY

16min
pages 104-110

H. Legal Charges

2min
pages 102-103

G. Appeals

3min
page 101

E. Judicial Council

2min
page 99

F. Expulsion Hearing

2min
page 100

D. Consequences for Academic Integrity Violations

2min
page 98

C. Investigation and Imposition of Sanctions

2min
page 97

B. Descriptions of Specific Sanctions

5min
pages 95-96

C. GSSM Drug and Alcohol Policy

9min
pages 87-90

A. Disciplinary Offenses and Typical Sanctions

9min
pages 91-94

B. Using Your Computer at GSSM

5min
pages 83-84

A. Ethical and Behavioral Standards

2min
page 82

A. General Dress Code

2min
page 79

A. College Counseling and Advising

2min
page 76

I. Counseling Services

1min
page 75

G. Student Illness

2min
page 73

H. Excused Absences

2min
page 74

L. Permissible Student Vehicle Usage

2min
page 59

C. Parking

1min
page 68

H. Gym Usage During the Summer

1min
page 66

M. Student Vehicle Policy Violations

1min
page 60

K. Student Vehicle Policy

2min
page 58

J. Property Loss

1min
page 53

A. QUEST

2min
page 32

I. Visitor Sign-In Requirements

2min
page 52

E. Fire Safety Regulations in the Residence Hall

3min
page 50

I. Cell Phones

2min
page 42

P. Employment

1min
page 45

P. Meetings and Assemblies

2min
page 31

B. Academic Eligibility to Continue at GSSM

2min
page 13

H. Residence Hall Room Decorations and Furnishings

5min
pages 40-41

O. General Course Policies

2min
page 30

L. College Credit Hours for GSSM Courses

6min
pages 23-25

A. Academic Requirements

2min
page 12

G. Grade Appeal Policy

5min
pages 18-19

H. Grade Point Average Equivalencies

1min
page 20

F. Academic Integrity

6min
pages 15-17

A. Notification of Rights Under the Family Educational Rights and Privacy Act (FERPA

2min
page 9

I. Class Rank

1min
page 21

D. Philosophy and Expectations

2min
page 7
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Student Handbook by gssm - Issuu