INTERNET AND CAMPUS NETWORK ACCEPTABLE USE POLICY
TKM College of Engineering provides campus network and computing facilities including internet access for the use of faculty, staff, students, and other authorized individuals involved in research, academics, and administrative purposes of the college.
TKMCE IT Usage Policy
1. IT POLICY STATEMENT
This policy applies to all equipments that are owned or leased by TKMCE and also to any privately owned equipments that may be connected to the network services provided by TKMCE.
The College has extensive Information Technology resources and systems available for academic, research and administrative applications. Faculty, staff, and students are encouraged to become familiar with College technology resources and systems and to use them on a regular basis. Any access or use of IT resources that interferes, interrupts, or conflicts with these purposes is not acceptable and will be considered a violation of this Policy Statement. All users can access internet facility of the college only if they possess a valid user id and password issued by the Campus Networking Centre.
2.USER GUIDELINES AND RESPONSIBILITIES
Users are expected to exercise responsible, ethical behavior when using these resources and to adhere to the following guidelines:
(i) User Names
The College recognizes that common practice in computing, online or otherwise, involves use of a user name, login, Access ID, or screen name (collectively, user name) that may be different from the Users legal name. Using someone elses name or assuming someone elses identity without appropriate authorization, however, is a violation of the college principles and this IT Policy. Accordingly, Users may not use the IT Resources under false name, identification, email address, signature, or other medium of any person or entity without proper authorization.
When choosing a password for access to the IT Resources, or portions thereof, Users are expected to follow the best practices so as to prevent unauthorized access through any Users password. Accordingly, Users should avoid using birth dates, names, telephone numbers, admission numbers, sequences etc.
3. PROHIBITED USES
Users agree not to take any actions that constitute inappropriate behavior including, but not limited to the following:
4. INTELLECTUAL PROPERTY, LICENSE AND RESTRICTIONS
The College authority takes the issue of intellectual property and similar rights seriously. Virtually all members of the faculty and student body have copyrights merely by authoring a paper whether for publication or even through a course assignment. Accordingly, as each User should have an expectation that others will not abuse his or her intellectual property rights, every User must also respect the intellectual property rights of others including those of other Users, all members of the college and all third parties. Accordingly, the college requires every User to adhere to a strict policy of respecting intellectual property rights
The potentially infringing uses may involve:
It is the responsibility of every User to avoid infringing any intellectual property right and to report the infringement of another User if and when it is discovered. Failure to respect such rights, or report infringements, is a violation of this IT Policy and is subject to disciplinary actions.
All Users retain the right of privacy in their personal files and data, electronic mail, and voicemail as long as they are using the IT Resources in a manner consistent with the purposes, objectives and mission of the College and this IT Policy. Likewise, Users are obligated to respect the right of privacy that other Users have in their own systems, data, and accounts.In the event the College has reasonable suspicion that a User has violated any civil or criminal law, the College Code of Conduct, the IT Policy, or any other policy, procedure, or regulation, the College authority reserves the right to access, inspect, monitor, remove, take possession of, or surrender to civil or criminal authorities the offending Content, with or without notice or consent of the User.
6. WEBSITE MANAGEMENT POLICY
The college level activities will be updated in the website only if the document provided by the concerned authority is verified and approved by the website editorial committee. The department level documents will be updated when the document provided by the concerned department member will be verified and approved by the editorial committee.
7. ELECTRONIC WASTE MANAGEMENT
The management and disposal of e-waste is done through IT Cell and Facility Management Committee (FMC). The e-waste in the campus has to be reported to IT Cell. The cell verifies if the reported items can be rectified or cannot be utilized further. If the items cannot be rectified, it will be intimated to FMC. FMC will take steps for safe collection and disposal of e-waste through government local bodies.
7. VIOLATION OF POLICY
Users understand that any violation of this policy may call for corrective action as deemed necessary by the individuals (student/employee) supervisor, department head, or Principal. Violators may be subject to local, state and/or central prosecution.
|Prof. Vaheetha Salam||Coordinator|
|Dr. Nadera Beevi. S||Member|
|Prof. Abid Hussain .M||Member|
|Dr. Manu J Pillai||Member|
|Prof. Anantha Padmanabhan N.K||Member|
|Mr. Anzar .T||Member|