Policy on Acceptable Use of Training Software Computer Resources
December 15, 2025 2025-12-15 20:19Policy on Acceptable Use of Training Software Computer Resources
Policy on Acceptable Use of Training Software
& Computer Resources
This policy defines acceptable and unacceptable use of ICCT-provided training software, computing resources, and network access. All students are required to comply with this policy as a condition of enrollment.
General Principles & Guidelines
The International Center for Career Training provides class software and computing resources to support its mission and educational goals. Access to these resources imposes responsibilities and obligations and is granted subject to ICCT policies and all applicable local, state, and federal laws.
Acceptable use must be:
- Limited to educational purposes
- Legal, ethical, and academically honest
- Respectful of shared resources
- Protective of intellectual property and data ownership
- Respectful of privacy, security, and freedom from harassment or intimidation
Prohibited Activities
A student must not:
- Use computing resources for purposes inconsistent with their relationship with ICCT
- Share, misuse, or fail to protect assigned accounts, user IDs, or passwords
- Access or attempt to access another user’s accounts, data, files, or email without authorization
- Misrepresent identity or attempt to bypass security or data protection measures
- Decode passwords, intercept data, or monitor another user’s communications
- Create, distribute, or propagate malware, viruses, or disruptive software
- Damage files, disrupt services, or make unauthorized data modifications
- Use ICCT resources for commercial, political, or profit-making purposes without authorization
- Violate software license agreements or terms of use
- Infringe copyrights, including unauthorized file sharing
- Engage in any activity that violates ICCT principles or applicable laws
Network, Equipment & Software Restrictions
While using ICCT computing resources, students must not:
- Attach unauthorized equipment (including wireless access points)
- Install software that may impair system performance, integrity, or security
- Deliberately interfere with computer systems or network traffic
Enforcement & Disciplinary Action
Repeated or severe violations may result in termination of the student’s enrollment contract.
Software Use Disclaimer
ICCT utilizes open-source software as part of its instructional programs. ICCT assumes no liability for misuse of such software by students.
Individuals using ICCT computing and network resources do so subject to all applicable laws and institutional policies. Information and materials transmitted through ICCT systems do not necessarily reflect the views of ICCT, its faculty, staff, or students.