2017-2018 Academic Catalog w/Addendum

Email for Students

STUDENT EMAIL ACCESS

Students are assigned a college email account upon admission to the college. Students activate and view this account on MyMCC.

STUDENT EMAIL USE

The Colorado Community College System (System) assigned student email account shall be the primary official means of communication with students. The System expects that students sign in and check their college issued email account on a frequent and consistent basis as students are responsible for all information sent to them via their system-assigned email account. This account is free of charge and currently is active for life. The use of student email is a privilege, not a right; and the System maintains the right to limit access. Email is subject to disclosure to third parties through subpoena or other processes.

It is acceptable to use the System’s student email for purposes relating directly to education. Email should be considered the same as printed communication and should meet the same standards of taste, professionalism, accuracy and legality that are expected in printed communication.

EMAIL HARASSMENT

If a student is being harassed via email, the student should immediately notify the Vice President of Student Services. It is also the responsibility of all students to report any potential misuse of the college email communications services.

For full policy please visit: CCCS Student Email Acceptable Use Policy SP 4-32

PROHIBITED USE

Prohibited activities on CCCS computers and telecommunications systems include but are not limited to:

  1. Fraudulent, harassing, threatening or libelous messages and inclusion of personal or sensitive information about individuals without their consent
  2. Obscene, profane, abusive, defamatory, derogatory, threatening, or sexually explicit language or graphic representation
  3. Statements or graphic representations that may be construed as discriminatory or offensive by reference to race, national origin, gender, religion, age, disability, sexual orientation, or other legally protected criteria
  4. Commercial activities and other activities conducted for personal gain
  5. Religious causes
  6. Solicitations not approved by the System
  7. Political fund-raising or lobbying
  8. Violating any federal, state, or local law/regulation, or System policy/procedure.
  9. Deliberately wasting computing resources.
  10. Posting or viewing on College computers, materials that violate existing laws or the College’s codes of conduct (MCC strictly prohibits viewing, solicitation, or printing of pornographic literature on College equipment).
  11. Sending, receiving, displaying, printing, otherwise disseminating, or storing material that is fraudulent, harassing, illegal, abusive, indecent, embarrassing, profane, sexually explicit, obscene, intimidating, or defamatory; Exceptions may be made for legitimate instructional purposes
  12. Transmitting to others, in any location, images, sounds or messages that might reasonably be considered harassing
  13. Screen displays of images, sounds or messages that could create an atmosphere of discomfort or harassment for others, especially those considered obscene or sexually explicit
  14. Attempting to forge electronic mail messages or using someone else’s electronic mail
  15. Accessing personal interest sites, viewing chat rooms (except chat rooms integrated within the course management system), or using recreational games for other than occasional use
  16. Using CCCS computers for commercial gain or private profit
  17. Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, music, videotapes, books, or other copyrighted sources, and copyrighted software
  18. Exporting software or technical information in violation of U.S. export laws
  19. Posting or e-mailing scams such as "make money fast" schemes or pyramid/chain letters
  20. Threatening bodily harm or property damage to individuals or groups
  21. Making fraudulent offers of products, items, or services originating from a user’s account
  22. Attempting to access the accounts of others, or attempting to penetrate security measures of other entities’ systems ("hacking"), whether or not the intrusion results in corruption or loss of data
  23. Accessing another person’s computer, computer account, files, or data without permission
  24. Using any means to decode or otherwise obtain restricted passwords or access control information
  25. Attempting to circumvent or subvert system or network security measures. Examples include creating or running programs that are designed to identify security loopholes, to decrypt intentionally secured data, or to gain access to any system; Initiating or facilitating in any way mass unsolicited and unofficial electronic mailing (e.g., "spamming", "phishing", "flooding", or "bombing")
  26. Engaging in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, damaging files or making unauthorized modifications to data
  27. Engaging in any other activity that does not comply with the general principles presented above.
  28. Activities will not be considered misuse when authorized by appropriate College officials for security or performance testing.

COMPUTER USAGE VIOLATION

System administrators may access user files as required to protect the integrity of computer systems. For example, following organizational guidelines, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged. All existing laws (federal and state) and College regulations and policies apply, including not only those laws and regulations that are specific to computers and networks, but also those that apply generally to personal conduct.

Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable campus policies, or procedures. Complaints alleging misuses of Morgan Community College resources will be directed to those responsible for taking appropriate disciplinary action.

For detailed information on CCCS email and computer policies, please see the following website: 

https://www.cccs.edu/bp-3-125-electronic-communication-policy/

Powered by SmartCatalog IQ