| 
							IntroductionAs a student at the Dammam Community 
							College (DCC), you will have many opportunities 
							to become competent in the use of information 
							technology. If you are set on a career in 
							Accounting, Marketing or Computer & Information Technology , you 
							will already be aware of the importance of computing 
							to your success.
 The DCC IT can help you be more productive as 
							a student: to register for classes, to send messages 
							to your teachers and friends, to browse the Internet 
							for collecting useful information and to conduct the 
							general business of student life. The College makes 
							information technology available to you in many and 
							varied ways:
 
								
								
								The DCC web page is an electronic, campus-wide 
								information system that contains information to 
								help you register for classes, add/drop courses 
								and keep up with campus events, and more.
								
								You can publish and exchange information on the 
								Internet by using newsgroups and the World Wide 
								Web.
								
								PC’s are available for general use at locations 
								across campus. 
								
								Students can download class notes and materials.
								
								
								Classrooms are equipped with video and data 
								outlets for network access. 
								
								A dial-in service is available to faculty and 
								staff who live off-campus.   
							Who Owns What?
 
							 You do NOT own your computer account, but you 
							do have exclusive access to this account. The 
							College owns the account and gives you, and only 
							you, the privilege of using it. We use the possessive word "your" a lot, but this 
							does not always mean "ownership." In some cases, it 
							means "exclusive use."
 
 You may own a personal computer or 
							workstation. You will make the decisions about how 
							that equipment will be used, unless it is connected 
							to the campus network. The College owns the network 
							and there are policies that may affect the way you 
							configure your PC.
 
 You may own a software license. Your license 
							usually allows you to possess ONE copy of this 
							software for your own use. It is a violation of your 
							software license agreement to make copies of the 
							software you purchase without permission. You should 
							read and abide by your software license agreement. 
							You also may NOT make a copy of software a friend 
							has purchased.
 
 You own any electronic messages you receive 
							and any electronic files you create. You must not 
							let anyone else use your access code and password to 
							see your files.
 
 The College owns the central computers, 
							departmental computer labs, the general-purpose PC 
							labs, the computers it places on its employees' 
							desks and all the software it has installed on them. 
							The College determines who may use these resources 
							and how they may use them.
 
 The College owns the College network - The 
							College determines who is authorized to use its 
							network. This means that students living on campus 
							who connect their PCs to the campus network may NOT 
							run their computers as multi-user machines, giving 
							others login access to the network.
 
							The Internet Community
 
 What is the Internet?
 The Internet isn't a thing; it isn't an entity; it 
							isn't an organization.... no one owns it; no one 
							runs it. It is simply everyone's computers, 
							connected...a world controlled by no one...like a 
							newspaper without editors - or rather, with millions 
							of editors.
 
 What does all this have to do with you and 
							computer competence?
 The College extends to students the privilege of 
							using its computers and networks to exchange 
							messages with your friends and teachers on campus, 
							your friends at other schools, even your parents. 
							You can share in the exchange of ideas through 
							electronic news groups on thousands of subjects, 
							reading what others post, and posting your own 
							thoughts and information. You can use web browsers 
							and other Internet tools to search and find needed 
							information and to publish information about 
							yourself.
 
 And we call THIS a community?
 Yes! We must make it a community. On any 
							venture to a frontier that you might join, you would 
							need to follow a code of behavior that would enable 
							you to survive in the wilderness.
 
 The College extends the privileges of the Internet 
							to its faculty, students and staff, with the 
							stipulation that they be good citizens. You may have 
							heard the term "network" used to mean getting to 
							know people and providing support to others who need 
							it. Think of the Internet as this kind of network - 
							an emerging community - something you want to get 
							into, rather than on to. The Internet has its own 
							stern code - responsibility and rational 
							self-government. Those who are responsible users of 
							the College's computing resources are members of a 
							community of scholars; those who are not responsible 
							don't get in.
 
							How Can I Be a Good Internet Citizen?
 You must be able to choose for yourself to do what 
							is right and not to do what is wrong.
 
 KNOW what it means to be responsible. You 
							must be trustworthy.
 
 BE AWARE of the thousands of others who rely 
							on the College's computers to do their work. 
							Consider how your computer behavior will affect them 
							and choose what you know is right.
 
 UNDERSTAND that College policies that address 
							academic dishonesty, including theft, plagiarism, 
							disruptive conduct, and misuse of materials and 
							property, must guide your computing activities, just 
							as they guide your activities in the classroom or 
							elsewhere on campus.
 
 DON'T send electronic messages to people you 
							don't know or who don't need to get your message. 
							This is a nuisance.
 
 DON'T use College computing resources to send 
							chain mail. This is a waste of computing resources 
							and a nuisance. It offends members of the community.
 
 DON'T let other students, relatives or any 
							other person gain access to the College's computing 
							resources through the access code given to you. This 
							corrupts the integrity of computing resources by 
							destroying accountability.
 
 DON'T use access codes that belong to someone 
							else.
 
 DON'T play games. You are not authorized to 
							use your account to play games.
 
 UNDERSTAND what you are authorized to do. 
							Know what the College's purpose is in making these 
							computing resources available to you.
 
 DON'T MISUNDERSTAND. Your access to computing 
							resources is a privilege, not a right. It is a 
							privilege that the College extends to students who 
							are trusted to make responsible use of computing 
							resources.
 
 
 The E-Mail Etiquette
 You can expect that e-mail messages you exchange in 
							doing your job are confidential because the College 
							does not monitor student use of e-mail. You should 
							be aware, however, that e-mail messages are written 
							records that could be subject to review with just 
							cause.
 
 College policies prohibit certain kinds of e-mail 
							messages. Policies prohibit harassment, campaigning 
							and soliciting, for instance. Chain mail is an 
							irresponsible use of resources and, therefore, a 
							violation of policy. These policies pertain to 
							e-mail just as they do to any other College resource 
							and are enforced when brought to the attention of 
							the administration.
 
 In spite of policy, e-mail messages are vulnerable 
							to hackers when they know the owner's password.
 
								
								
								Remember, the e-mail messages you send become 
								the possession of the receiver. They can easily 
								be re-distributed by recipients. 
								
								Delete messages that should not be preserved.
								
								
								Resist the temptation to send chain mail, even 
								when it promises you fame and fortune. 
								
								Realize that College policy and good passwords 
								provide good but not complete assurance of the 
								privacy of your e-mail messages. When the 
								confidentiality of a message is of the utmost 
								importance, only a person-to-person conversation 
								may be sufficiently secure. 
								
								Don't use College computing resources for 
								campaigning or soliciting. 
 
							Misuse of Computing 
							Facilities The Internet community is under siege from outlaws. 
							Very often the outlaws are newcomers to the 
							Internet, not yet aware of its tradition of rational 
							self-government. For fun, out of meanness, seeking 
							notoriety or because they fall into bad company, 
							some people attack computing systems. They:
 
 
								
								
								steal other people's passwords; 
								
								disrupt computer systems and networks; 
								
								send forged electronic messages; 
								
								post messages that vilify and threaten other 
								people; 
								
								invade the privacy of others.  
							Students who do these things at DCC will lose 
							computing privileges and be subject to suspension or 
							expulsion from the College.
 A user should choose a password that combines 
							letters, numbers and special characters. Whether you 
							use your access code and password, or not, it is 
							your responsibility to keep them secure. Do not let 
							anyone talk you into "sharing". Don't write down 
							your password. Don't tell your friends - or anyone - 
							what your password is.
 
 Hackers make the system stop working or perform 
							poorly. You should realize that it is not a sign of 
							genius to find out how to be disruptive.
 
 Many students and teachers do not want others seeing 
							their messages or coursework or research. On 
							computers, you can control who can see your files by 
							protection codes. Use these codes as you would use 
							locks to keep your files private.
 
 
 Misuse of E-mail
 
								
								
								Students are expected to be courteous and 
								respectful in their e-mail communications in 
								accordance with established codes of ethics and 
								the common rules that have evolved regarding 
								e-mail, sometimes referred to as Netiquette. 
								
								Students must not send chain letters or “spam”. 
								These types of messages are an irresponsible 
								waste of computing resources and an 
								inconsiderate nuisance. 
								
								Students must not send offensive, demeaning, 
								insulting or intimidating e-mail messages, or 
								anything that harasses or disparages others. 
								Sending such messages can result in disciplinary 
								action. 
								
								Students must not violate copyright laws, 
								trademark laws, or other laws in sending e-mail 
								messages, publishing web pages or posting to 
								newsgroups and discussion lists. 
								
								Students may use the College’s institutional 
								mail lists only with appropriate authorization.
 
							Approved Disciplinary 
							Sanctions for Abuse of IT Privileges 
 Dammam Community College provides state-of-the-art 
							facilities in information and communication 
							technologies. In addition to advanced computers 
							deployed in academic buildings, the provision of 
							e-mail and Internet access to students is intended 
							to promote knowledge and skills. Students are 
							expected to ensure high ethical standards in 
							utilizing these services with genuine commitment to 
							practices that commensurate with the values of the 
							Islamic society, and the excellence desired by this 
							College. To promote the optimum use of these 
							educational resources and to benefit from the 
							services provided, it is essential to outline 
							policies and procedures with appropriate 
							disciplinary actions in the event of violations.
 
 A student who violates these policies will be 
							subject to disciplinary action by the DCC IT 
							Disciplinary Action Committee and/or the Student 
							Affairs Committee, which may include loss of 
							computing privileges, suspension and/or expulsion.
 
 The disciplinary actions listed below will be the 
							general framework used for handling all violations 
							and will be reviewed annually to ensure better 
							compliance.
 
							Approved Penalties  
								
									
										| 
										Violations | 
										Penalties |  
										| 
										1.      Access to internet sites 
										contravene ethical values (pornographic 
										sites)      
										1.1  Repeated entry into pornographic 
										sites to obtain pictures or films and 
										dissemination of such material through 
										the DCC either via e-mail or placed on 
										the shared/public files. | (1) Discontinue 
										computer ID for computing facilities or 
										Internet services of the College for at 
										least one month and not more than one 
										semester.    (2) Written 
										undertaking not to commit such offence 
										in the future. DCC IT will take a 
										written undertaking and a copy of the 
										undertaking will be kept in the 
										student's file in Student Affairs.   (13) The publication 
										of the violation in DCC News without 
										mentioning names.    (4) Based on the 
										extent of violation the possibility of 
										transferring the case to the Student 
										Affairs Committee, that will identify 
										his accountability or transfer the case 
										to competent bodies outside the DCC. |  
										| 
										2.      Violation of the rights and 
										privacy of others (personal or moral) 
										 
										 2.1  Inappropriately acquires user 
										accounts and passwords of others.   
										 2.2  Sends electronic messages that can 
										be generalized as false propaganda, 
										harm, demean, threaten others or incite 
										others to do so.    
										2.3  Circulation and transmission of 
										articles containing materials not 
										commensurate with the values of the 
										Kingdom or the DCC.    
										2.4  To use DCC computing facilities for 
										promotions or advertising, or 
										business.    
										2.5  Violations of copyright and 
										intellectual property, and abuse of 
										trademarks. | (1) Discontinue 
										computer ID for computing facilities or 
										Internet services of the DCC for at 
										least one month and not more than one 
										semester.    (2) Written 
										undertaking not to commit such offence 
										in the future. DCC IT will take a 
										written undertaking and a copy of the 
										undertaking will be kept in the 
										student's file in Student Affairs.   (13) The publication 
										of the violation in DCC News without 
										mentioning names.    (4) Based on the 
										extent of violation the possibility of 
										transferring the case to the Student 
										Affairs Committee that will identify his 
										accountability or transfer the case to 
										competent bodies outside the DCC. Note that the 
										violations of intellectual property 
										rights, including copyright, are 
										governed by a special law. |  
										| 
										3.      Theft of computer equipment and 
										accessories   
										3.1  Theft devices, equipment and 
										accessories from computing facilities, 
										or participating in, or inciting such 
										activity, or hiding equipment. | (1) When a student 
										abuses computing resources, all of his 
										computing privileges will be suspended 
										immediately to protect the computing 
										resources and to assure reliable service 
										to the rest of the community.  This will 
										continue until the issuance of the 
										recommendations of the Student Affairs 
										Committee. (2) Based on the 
										extent of violation the possibility of 
										transferring the case to the Student 
										Affairs Committee that will identify his 
										accountability or transfer the case to 
										competent bodies outside the DCC. |  
										| 
										4.      Destroy computer systems, 
										devices and networks, or degrade the 
										efficiency of their performance    
										4.1   Deliberate damage or tampering 
										with the devices, equipment and 
										accessories installed in computing 
										facilities.    
										4.2   Deliberately sending destructive 
										computer Viruses/Trojans/Worms to 
										systems, networks and devices.    
										4.3  Deliberate influence on the 
										performance of computers and networks of 
										the DCC or affect the speed or decrease 
										the efficiency of transport loads across 
										the networks. | 
										(1) Discontinue computer ID for 
										computing facilities or Internet 
										services of the DCC for at least one 
										semester and not more than one academic 
										year. 
										(2) Written undertaking not to commit 
										such offence in the future. DCC IT will 
										take a written undertaking and a copy of 
										the undertaking will be kept in the 
										student's file in Student Affairs. 
										(13) The publication of the violation in 
										DCC News without mentioning names. 
										(4) Based on the extent of violation the 
										possibility of transferring the case to 
										the Student Affairs Committee that will 
										identify his accountability or transfer 
										the case to competent bodies outside the 
										DCC. |  
										| 
										5.      Violations affecting the 
										national integrity of the DCC 
										community    
										5.1    Design and publish Web pages, 
										including links to sites or materials or 
										information inconsistent with the proper 
										use of the network, DCC regulations and 
										values of higher education.    
										5.2    Participation or hosting or 
										supervision of sites or forums affecting 
										the national integrity of the DCC 
										community.    
										5.3    Disseminating wrong or inaccurate 
										or distorted information about the DCC 
										through the use of DCC computer network. |  Remarks:
 
 (1) In case of repeated violation by the 
							student after being warned, more severe punishment 
							will follow including stopping access to all 
							computing resources and possible recommendation to 
							the Student Affairs Committee to suspend the student 
							from the DCC for a specified period.
 
 (2) DCC IT will have formed a monitoring cell to 
							ensure the proper use of the computer, network and 
							IT facilities.  The cell will be charged with 
							continuous follow-up to detect and report 
							violations, and proactively prevent the circulation 
							and proliferation of prohibited material using DCC 
							IT resources.
 |