Security / Appropriate Use

Employees must respect the confidentiality of other individuals’ electronic communications. Except in cases in which authorization has been granted by CCS management, employees are prohibited from engaging in, or attempting to engage in:

  • monitoring or intercepting the files or electronic communications of other employees or third parties;
  • hacking or obtaining access to systems or accounts they are not authorized to use;
  • using other people’s log-ins or passwords; and
  • breaching, testing, or monitoring computer or network security measures

No e-mail or other electronic communications can be sent using CCS equipment that attempt to hide the identity of the sender or represent the sender as someone else.

Electronic media and services should not be used in a manner that is likely to cause network congestion or significantly hamper the ability of other people to access and use the system.

Anyone obtaining electronic access to other organizations’ or individuals’ materials must respect all copyrights and cannot copy, retrieve, modify, or forward copyrighted materials, except as permitted by the copyright owner.

See also the College’s Information Security Plan which can be found on the CCS Policy Database.