Sunday, June 22, 2014

RYSS - Unauthorized Use Policy 2009

 

Unauthorized Use Policy

Revised: 06/30/2009

1. Purpose.

This policy sets forth the Center’s policy regarding Unauthorized Use of the TCCC-RYSS Information Technology Network.

2. Scope.

This policy covers all Unauthorized Use of the School Information Technology Network, whether such Unauthorized Use is done by a person who is not an Authorized User, or by an Authorized User who exceeds the limits of that person’s authorization whose use exceeds Authorized Use permitted by the Center, all of whom are referred to in this policy as “Unauthorized Users.”

3. Policy.

All Unauthorized Users are prohibited from using TCCC-RYSS Information Technology Network for any purpose whatsoever. Authorized Users are prohibited from using the TCCC-RYSS Information Technology Network in any way that exceeds the limits of their individual authorization.

4. Enforcement.

Unauthorized Users may be subject to criminal prosecution and/or civil suits in which the Center seeks damages and/or other legal and/or equitable remedies. Unauthorized Users who are employees of the organization may also be subject to disciplinary action, up to and including termination of employment. Unauthorized Users who are Students at the School may also be subject to disciplinary action, up to and including expulsion from the School.