Policy on Acceptable Use of Training Software Computer Resources

Policy on Acceptable Use of Training Software Computer Resources

ICCT • Policy

Policy on Acceptable Use of Training Software
& Computer Resources

This policy defines acceptable and unacceptable use of ICCT-provided training software, computing resources, and network access. All students are required to comply with this policy as a condition of enrollment.

General Principles & Guidelines

The International Center for Career Training provides class software and computing resources to support its mission and educational goals. Access to these resources imposes responsibilities and obligations and is granted subject to ICCT policies and all applicable local, state, and federal laws.

Acceptable use must be:

  • Limited to educational purposes
  • Legal, ethical, and academically honest
  • Respectful of shared resources
  • Protective of intellectual property and data ownership
  • Respectful of privacy, security, and freedom from harassment or intimidation

Prohibited Activities

A student must not:

  • Use computing resources for purposes inconsistent with their relationship with ICCT
  • Share, misuse, or fail to protect assigned accounts, user IDs, or passwords
  • Access or attempt to access another user’s accounts, data, files, or email without authorization
  • Misrepresent identity or attempt to bypass security or data protection measures
  • Decode passwords, intercept data, or monitor another user’s communications
  • Create, distribute, or propagate malware, viruses, or disruptive software
  • Damage files, disrupt services, or make unauthorized data modifications
  • Use ICCT resources for commercial, political, or profit-making purposes without authorization
  • Violate software license agreements or terms of use
  • Infringe copyrights, including unauthorized file sharing
  • Engage in any activity that violates ICCT principles or applicable laws

Network, Equipment & Software Restrictions

While using ICCT computing resources, students must not:

  • Attach unauthorized equipment (including wireless access points)
  • Install software that may impair system performance, integrity, or security
  • Deliberately interfere with computer systems or network traffic

Enforcement & Disciplinary Action

ICCT considers violations of acceptable use policies to be a serious offense. In cases of misuse or abuse of software, data, or user rights, ICCT may suspend a student’s access to computing resources for up to three (3) days without prior notice.

Repeated or severe violations may result in termination of the student’s enrollment contract.

Software Use Disclaimer

ICCT utilizes open-source software as part of its instructional programs. ICCT assumes no liability for misuse of such software by students.

Individuals using ICCT computing and network resources do so subject to all applicable laws and institutional policies. Information and materials transmitted through ICCT systems do not necessarily reflect the views of ICCT, its faculty, staff, or students.