Computing Guidelines

Introduction
As a student at the Dammam Community College (DCC), you will have many opportunities to become competent in the use of information technology. If you are set on a career in Accounting, Marketing or Computer & Information Technology , you will already be aware of the importance of computing to your success.
The DCC IT can help you be more productive as a student: to register for classes, to send messages to your teachers and friends, to browse the Internet for collecting useful information and to conduct the general business of student life. The College makes information technology available to you in many and varied ways:

  • The DCC web page is an electronic, campus-wide information system that contains information to help you register for classes, add/drop courses and keep up with campus events, and more.

  • You can publish and exchange information on the Internet by using newsgroups and the World Wide Web.

  • PC’s are available for general use at locations across campus.

  • Students can download class notes and materials.

  • Classrooms are equipped with video and data outlets for network access.

  • A dial-in service is available to faculty and staff who live off-campus.  


Who Owns What?

 You do NOT own your computer account, but you do have exclusive access to this account. The College owns the account and gives you, and only you, the privilege of using it.
We use the possessive word "your" a lot, but this does not always mean "ownership." In some cases, it means "exclusive use."

You may own a personal computer or workstation. You will make the decisions about how that equipment will be used, unless it is connected to the campus network. The College owns the network and there are policies that may affect the way you configure your PC.

You may own a software license. Your license usually allows you to possess ONE copy of this software for your own use. It is a violation of your software license agreement to make copies of the software you purchase without permission. You should read and abide by your software license agreement. You also may NOT make a copy of software a friend has purchased.

You own any electronic messages you receive and any electronic files you create. You must not let anyone else use your access code and password to see your files.

The College owns the central computers, departmental computer labs, the general-purpose PC labs, the computers it places on its employees' desks and all the software it has installed on them. The College determines who may use these resources and how they may use them.

The College owns the College network - The College determines who is authorized to use its network. This means that students living on campus who connect their PCs to the campus network may NOT run their computers as multi-user machines, giving others login access to the network.


The Internet Community


What is the Internet?
The Internet isn't a thing; it isn't an entity; it isn't an organization.... no one owns it; no one runs it. It is simply everyone's computers, connected...a world controlled by no one...like a newspaper without editors - or rather, with millions of editors.

What does all this have to do with you and computer competence?
The College extends to students the privilege of using its computers and networks to exchange messages with your friends and teachers on campus, your friends at other schools, even your parents. You can share in the exchange of ideas through electronic news groups on thousands of subjects, reading what others post, and posting your own thoughts and information. You can use web browsers and other Internet tools to search and find needed information and to publish information about yourself.

And we call THIS a community?
Yes! We must make it a community. On any venture to a frontier that you might join, you would need to follow a code of behavior that would enable you to survive in the wilderness.

The College extends the privileges of the Internet to its faculty, students and staff, with the stipulation that they be good citizens. You may have heard the term "network" used to mean getting to know people and providing support to others who need it. Think of the Internet as this kind of network - an emerging community - something you want to get into, rather than on to. The Internet has its own stern code - responsibility and rational self-government. Those who are responsible users of the College's computing resources are members of a community of scholars; those who are not responsible don't get in.


How Can I Be a Good Internet Citizen?

You must be able to choose for yourself to do what is right and not to do what is wrong.

KNOW what it means to be responsible. You must be trustworthy.

BE AWARE of the thousands of others who rely on the College's computers to do their work. Consider how your computer behavior will affect them and choose what you know is right.

UNDERSTAND that College policies that address academic dishonesty, including theft, plagiarism, disruptive conduct, and misuse of materials and property, must guide your computing activities, just as they guide your activities in the classroom or elsewhere on campus.

DON'T send electronic messages to people you don't know or who don't need to get your message. This is a nuisance.

DON'T use College computing resources to send chain mail. This is a waste of computing resources and a nuisance. It offends members of the community.

DON'T let other students, relatives or any other person gain access to the College's computing resources through the access code given to you. This corrupts the integrity of computing resources by destroying accountability.

DON'T use access codes that belong to someone else.

DON'T play games. You are not authorized to use your account to play games.

UNDERSTAND what you are authorized to do. Know what the College's purpose is in making these computing resources available to you.

DON'T MISUNDERSTAND. Your access to computing resources is a privilege, not a right. It is a privilege that the College extends to students who are trusted to make responsible use of computing resources.


The E-Mail Etiquette

You can expect that e-mail messages you exchange in doing your job are confidential because the College does not monitor student use of e-mail. You should be aware, however, that e-mail messages are written records that could be subject to review with just cause.
 
College policies prohibit certain kinds of e-mail messages. Policies prohibit harassment, campaigning and soliciting, for instance. Chain mail is an irresponsible use of resources and, therefore, a violation of policy. These policies pertain to e-mail just as they do to any other College resource and are enforced when brought to the attention of the administration.
 
In spite of policy, e-mail messages are vulnerable to hackers when they know the owner's password.

  • Remember, the e-mail messages you send become the possession of the receiver. They can easily be re-distributed by recipients.

  • Delete messages that should not be preserved.

  • Resist the temptation to send chain mail, even when it promises you fame and fortune.

  • Realize that College policy and good passwords provide good but not complete assurance of the privacy of your e-mail messages. When the confidentiality of a message is of the utmost importance, only a person-to-person conversation may be sufficiently secure.

  • Don't use College computing resources for campaigning or soliciting.

Misuse of Computing Facilities
The Internet community is under siege from outlaws. Very often the outlaws are newcomers to the Internet, not yet aware of its tradition of rational self-government. For fun, out of meanness, seeking notoriety or because they fall into bad company, some people attack computing systems. They:

  • steal other people's passwords;

  • disrupt computer systems and networks;

  • send forged electronic messages;

  • post messages that vilify and threaten other people;

  • invade the privacy of others.

Students who do these things at DCC will lose computing privileges and be subject to suspension or expulsion from the College.

A user should choose a password that combines letters, numbers and special characters. Whether you use your access code and password, or not, it is your responsibility to keep them secure. Do not let anyone talk you into "sharing". Don't write down your password. Don't tell your friends - or anyone - what your password is.

Hackers make the system stop working or perform poorly. You should realize that it is not a sign of genius to find out how to be disruptive.

Many students and teachers do not want others seeing their messages or coursework or research. On computers, you can control who can see your files by protection codes. Use these codes as you would use locks to keep your files private.  


Misuse of E-mail  

  • Students are expected to be courteous and respectful in their e-mail communications in accordance with established codes of ethics and the common rules that have evolved regarding e-mail, sometimes referred to as Netiquette.

  • Students must not send chain letters or “spam”. These types of messages are an irresponsible waste of computing resources and an inconsiderate nuisance.

  • Students must not send offensive, demeaning, insulting or intimidating e-mail messages, or anything that harasses or disparages others. Sending such messages can result in disciplinary action.

  • Students must not violate copyright laws, trademark laws, or other laws in sending e-mail messages, publishing web pages or posting to newsgroups and discussion lists.

  • Students may use the College’s institutional mail lists only with appropriate authorization.

Approved Disciplinary Sanctions for Abuse of IT Privileges

Dammam Community College provides state-of-the-art facilities in information and communication technologies. In addition to advanced computers deployed in academic buildings, the provision of e-mail and Internet access to students is intended to promote knowledge and skills. Students are expected to ensure high ethical standards in utilizing these services with genuine commitment to practices that commensurate with the values of the Islamic society, and the excellence desired by this College. To promote the optimum use of these educational resources and to benefit from the services provided, it is essential to outline policies and procedures with appropriate disciplinary actions in the event of violations.

A student who violates these policies will be subject to disciplinary action by the DCC IT Disciplinary Action Committee and/or the Student Affairs Committee, which may include loss of computing privileges, suspension and/or expulsion.

The disciplinary actions listed below will be the general framework used for handling all violations and will be reviewed annually to ensure better compliance.

Approved Penalties 

Violations

Penalties

1.      Access to internet sites contravene ethical values (pornographic sites)    

1.1  Repeated entry into pornographic sites to obtain pictures or films and dissemination of such material through the DCC either via e-mail or placed on the shared/public files.

(1) Discontinue computer ID for computing facilities or Internet services of the College for at least one month and not more than one semester. 

 (2) Written undertaking not to commit such offence in the future. DCC IT will take a written undertaking and a copy of the undertaking will be kept in the student's file in Student Affairs. 

(13) The publication of the violation in DCC News without mentioning names. 

 (4) Based on the extent of violation the possibility of transferring the case to the Student Affairs Committee, that will identify his accountability or transfer the case to competent bodies outside the DCC.

2.      Violation of the rights and privacy of others (personal or moral) 

 2.1  Inappropriately acquires user accounts and passwords of others. 

 2.2  Sends electronic messages that can be generalized as false propaganda, harm, demean, threaten others or incite others to do so.  

2.3  Circulation and transmission of articles containing materials not commensurate with the values of the Kingdom or the DCC.  

2.4  To use DCC computing facilities for promotions or advertising, or business.  

2.5  Violations of copyright and intellectual property, and abuse of trademarks.

(1) Discontinue computer ID for computing facilities or Internet services of the DCC for at least one month and not more than one semester. 

 (2) Written undertaking not to commit such offence in the future. DCC IT will take a written undertaking and a copy of the undertaking will be kept in the student's file in Student Affairs. 

(13) The publication of the violation in DCC News without mentioning names. 

 (4) Based on the extent of violation the possibility of transferring the case to the Student Affairs Committee that will identify his accountability or transfer the case to competent bodies outside the DCC.

Note that the violations of intellectual property rights, including copyright, are governed by a special law.

3.      Theft of computer equipment and accessories  

3.1  Theft devices, equipment and accessories from computing facilities, or participating in, or inciting such activity, or hiding equipment.

(1) When a student abuses computing resources, all of his computing privileges will be suspended immediately to protect the computing resources and to assure reliable service to the rest of the community.  This will continue until the issuance of the recommendations of the Student Affairs Committee.

(2) Based on the extent of violation the possibility of transferring the case to the Student Affairs Committee that will identify his accountability or transfer the case to competent bodies outside the DCC.

4.      Destroy computer systems, devices and networks, or degrade the efficiency of their performance  

4.1   Deliberate damage or tampering with the devices, equipment and accessories installed in computing facilities.  

4.2   Deliberately sending destructive computer Viruses/Trojans/Worms to systems, networks and devices.  

4.3  Deliberate influence on the performance of computers and networks of the DCC or affect the speed or decrease the efficiency of transport loads across the networks.

(1) Discontinue computer ID for computing facilities or Internet services of the DCC for at least one semester and not more than one academic year.

(2) Written undertaking not to commit such offence in the future. DCC IT will take a written undertaking and a copy of the undertaking will be kept in the student's file in Student Affairs.

(13) The publication of the violation in DCC News without mentioning names.

(4) Based on the extent of violation the possibility of transferring the case to the Student Affairs Committee that will identify his accountability or transfer the case to competent bodies outside the DCC.

5.      Violations affecting the national integrity of the DCC community  

5.1    Design and publish Web pages, including links to sites or materials or information inconsistent with the proper use of the network, DCC regulations and values of higher education.  

5.2    Participation or hosting or supervision of sites or forums affecting the national integrity of the DCC community.  

5.3    Disseminating wrong or inaccurate or distorted information about the DCC through the use of DCC computer network.


Remarks:  

(1) In case of repeated violation by the student after being warned, more severe punishment will follow including stopping access to all computing resources and possible recommendation to the Student Affairs Committee to suspend the student from the DCC for a specified period.  

(2) DCC IT will have formed a monitoring cell to ensure the proper use of the computer, network and IT facilities.  The cell will be charged with continuous follow-up to detect and report violations, and proactively prevent the circulation and proliferation of prohibited material using DCC IT resources.

horizontal-ad