Email for Students
Student Email Access
Students are assigned a college email account upon admission to the college. Students activate and view this account on MyMCC.
Student Email Use
The Colorado Community College System (System) assigned student email account shall be the primary official means of communication with students. The System expects that students sign in and check their college issued e-mail account on a frequent and consistent basis as students are responsible for all information sent to them via their system-assigned email account. This account is free of charge and currently is active for life. The use of student email is a privilege, not a right; and the System maintains the right to limit access. Email is subject to disclosure to third parties through subpoena or other processes.
It is acceptable to use the System’s student email for purposes relating directly to education. Email should be considered the same as printed communication and should meet the same standards of taste, professionalism, accuracy and legality that are expected in printed communication.
Email Harassment
If a student is being harassed via email, the student should immediately notify the Vice President of Student Services. It is also the responsibility of all students to report any potential misuse of the college email communications services.
For full policy please visit: https://www.cccs.edu/wp-content/uploads/2013/09/SP4-32.pdf
Prohibited Use
Prohibited activities on CCCS computers and telecommunications systems include but are not limited to:
- Fraudulent, harassing, threatening or libelous messages and inclusion of personal or sensitive information about individuals without their consent
- Obscene, profane, abusive, defamatory, derogatory, threatening, or sexually explicit language or graphic representation
- Statements or graphic representations that may be construed as discriminatory or offensive by reference to race, national origin, gender, religion, age, disability, sexual orientation, or other legally protected criteria
- Commercial activities and other activities conducted for personal gain
- Religious causes
- Solicitations not approved by the System
- Political fund-raising or lobbying
- Violating any federal, state, or local law/regulation, or System policy/procedure.
- Deliberately wasting computing resources.
- Posting or viewing on College computers, materials that violate existing laws or the College’s codes of conduct (MCC strictly prohibits viewing, solicitation, or printing of pornographic literature on College equipment).
- Sending, receiving, displaying, printing, otherwise disseminating, or storing material that is fraudulent, harassing, illegal, abusive, indecent, embarrassing, profane, sexually explicit, obscene, intimidating, or defamatory; Exceptions may be made for legitimate instructional purposes
- Transmitting to others, in any location, images, sounds or messages that might reasonably be considered harassing
- Screen displays of images, sounds or messages that could create an atmosphere of discomfort or harassment for others, especially those considered obscene or sexually explicit
- Attempting to forge electronic mail messages or using someone else’s electronic mail
- Accessing personal interest sites, viewing chat rooms (except chat rooms integrated within the course management system), or using recreational games for other than occasional use
- Using CCCS computers for commercial gain or private profit
- Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, music, videotapes, books, or other copyrighted sources, and copyrighted software
- Exporting software or technical information in violation of U.S. export laws
- Posting or e-mailing scams such as "make money fast" schemes or pyramid/chain letters
- Threatening bodily harm or property damage to individuals or groups
- Making fraudulent offers of products, items, or services originating from a user’s account
- Attempting to access the accounts of others, or attempting to penetrate security measures of other entities’ systems ("hacking"), whether or not the intrusion results in corruption or loss of data
- Accessing another person’s computer, computer account, files, or data without permission
- Using any means to decode or otherwise obtain restricted passwords or access control information
- Attempting to circumvent or subvert system or network security measures. Examples include creating or running programs that are designed to identify security loopholes, to decrypt intentionally secured data, or to gain access to any system; Initiating or facilitating in any way mass unsolicited and unofficial electronic mailing (e.g., "spamming", "phishing", "flooding", or "bombing")
- Engaging in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, damaging files or making unauthorized modifications to data
- Engaging in any other activity that does not comply with the general principles presented above.
- Activities will not be considered misuse when authorized by appropriate College officials for security or performance testing.
Computer Usage Violation
System administrators may access user files as required to protect the integrity of computer systems. For example, following organizational guidelines, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged. All existing laws (federal and state) and College regulations and policies apply, including not only those laws and regulations that are specific to computers and networks, but also those that apply generally to personal conduct.
Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable campus policies, or procedures. Complaints alleging misuses of Morgan Community College resources will be directed to those responsible for taking appropriate disciplinary action.
For detailed information on CCCS email and computer policies, please see the following websites: https://www.cccs.edu/wp-content/uploads/2012/08/BP3-125.pdf