Sunday, June 22, 2014

RYSS–Guest User Policy 2009

 

Guest User Policy

Revised: 06/30/2009

1. Purpose.

The Center promotes sharing and learning within the academic community. In doing so, the Center often grants to Center guests and visitors the right to use its information technology resources in compliance with the TCCC-RYSS Information Technology Policies and Procedures. Such authorized persons are Guest Users and are also Authorized Users to the extent of their authorization.

2. Scope.

This policy applies only to any Guest Users and does not include faculty, staff, or Students.

3. Policy.

A Guest User is an Authorized User when utilizing the Center’s information technology resources in compliance with the TCCC-RYSS’s Information Technology Policies and Procedures and as long as the use remains within the limits of the Guest User’s individual authorization. The Guest User may be authorized to use computers in the Center’s computer labs and selected Software. The Guests may also be permitted to selected areas of the TCCC-RYSS’s Information Technology Network.

4. Enforcement.

Any Authorized User found to be in violation of this policy will be considered an Unauthorized User, and as such are subject to disciplinary action pursuant with the Enforcement section of the Unauthorized Use Policy.