Purpose and Users
The primary use of library computer systems/computer resources is for academic, educational, and research purposes.
The primary users of the Library's computer system/computer resources are current Santiago Canyon College (SCC) students.
- Non-SCC students, i.e., SCC faulty/staff, Santa Ana College students/faculty/staff, District staff, and general community users may use Library computers and are logged-in as guest users.
- High school students must have parental or legal guardian permission in the form of a completed "High School Student Library User Application" on file at the Library in order to use library computers.
- Other minor children must be supervised by a parent or adult eighteen years or older.
- Librarians reserve the right to observe computers.
- Librarians reserve the right to limit the amount of time that a user may occupy a computer especially during peak student usage periods to insure equitable access to all students.
- Any computer work has to be saved to the user's external storage medium, e.g., flash drive, CD/DVD, cloud technology, etc.
- Library is not responsible for damage to or loss of a user's external storage medium.
- Library is not responsible for any lost work.
- Copyright, obscenity, libel, hostile harassment, and other laws governing communication and publication apply to electronic media as well. Users are personally responsible and liable for such infringing activities.
- Examples of violations:
- Pirating software (use software in violation of pertinent software licensing agreements), distribute pirated software with College resources; download illegal copies of music, video, or text.
- Examples of violations:
- Some of the SCC computing systems/resources provide access to outside networks, public and/or private. Users are advised that they may encounter material which may be considered inappropriate in nature or content. Users are further advised that neither SCC nor the Rancho Santiago Community College District assume responsibility for the content of any of these outside networks. Policies and regulations of the college, state, and federal law are applicable to all library computing resources and systems.
Violations of Computer Usage Policy
- Accessing with or without permission, or causing to be accessed without authorization, altering, damaging, deleting, hacking, destroying, or otherwise using any data, computer, computer system, computer software and programs, or computer network belonging to or used by the college or any member of the District.
- Accessing with or without permission, taking, copying, or making use of any data from a computer, computer system, or computer network, or taking or copying any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network belonging to or used by the college or District.
- Using or causing to be used, computer services without permission.
- Disrupting or causing the disruption of computer services or denying or causing the denial of computer services to an authorized user of a computer, computer system, or computer network belonging to or used by the college or District.
- Introducing any computer contaminant or virus into any computer, computer system, or computer network belonging to the college or District.
- Sending any message using any computer system or network without authorization or sending any message in the name of another person or entity.
- Using any account or password without authorization.
- Allowing or causing an account number or password to be used by any other person without authorization.
- Accessing or causing to be accessed, downloading or causing to be downloaded, pornographic or obscene materials except when accessing such material which is part of the instructional process or assignment for a class in which the student is currently enrolled.
- Use of systems or networks for personal commercial purposes.
- "Cyberstalking", which is to be understood as any use of the college or district computer system, computer network, or computer programs to stalk another person via excessive messages or inquiries, inappropriate or threatening messages, racially motivated communications, photos or other means of communication.