1. | Prof. Vaheetha Salam (MCA) |
2. | Dr. Manu J Pillai (CSE) |
3. | Mr. Anver Muhammed (CSE), System Admin |
TKM College of Engineering provides campus network and computing facilities including internet access for the use of faculty, staff, students and other authorized individuals involved in research, academics and administrative purposes of the college.
TKMCE IT Usage PolicyThis policy applies to all equipments that are owned or leased by TKMCE and also to any privately owned equipments that may be connected to the network services provided by TKMCE.
Applicability :
The College has extensive Information Technology resources and systems available for academic, research and administrative applications. Faculty, staff, and students are encouraged to become familiar with College technology resources and systems and to use them on a regular basis. Any access or use of IT resources that interferes, interrupts, or conflicts with these purposes is not acceptable and will be considered a violation of this Policy Statement. All users can access internet facility of the college only if they possess a valid user id and password issued by the Campus Networking Centre.
Guidelines
Users are expected to exercise responsible, ethical behavior when using these resources and to adhere to the following guidelines:
The College recognizes the common practice in computing, online or otherwise, involves use of a user name, login, Access ID, or screen name (collectively, user name) that may be different from the User’s legal name. Using someone else’s name or assuming someone else’s identity without appropriate authorization, however, is a violation of the college principles and this IT Policy. Accordingly, Users may not use the IT Resources under false name, identification, email address, signature or other medium of any person or entity without proper authorization.
(ii) PASSWORDSWhen choosing a password for access to the IT Resources, or portions thereof, Users are expected to follow the best practices so as to prevent unauthorized access through any User’s password. Accordingly, Users should avoid using birth dates, names, telephone numbers, admission numbers, sequences etc.
Users agree not to take any actions that constitute inappropriate behavior including, but not limited to the following:
The College authority takes the issue of intellectual property and similar rights seriously. Virtually all members of the faculty and student body have copyrights merely by authoring a paper whether for publication or even through a course assignment. Accordingly, as each User should have an expectation that others will not abuse his or her intellectual property rights. Every User must also respect the intellectual property rights of other Users, all members of the college and all third parties. Accordingly, the college requires every User to adhere to a strict policy of respecting intellectual property rights
The potentially infringing uses may involve:
It is the responsibility of every User to avoid infringing any intellectual property right and to report the infringement of another User if and when it is discovered. Failure to respect such rights, or report infringements, is a violation of this IT Policy and is subject to disciplinary actions.
All Users retain the right of privacy in their personal files and data, electronic mail, and voicemail as long as they are using the IT Resources in a manner consistent with the purposes, objectives and mission of the College and this IT Policy. Likewise, Users are obligated to respect the right of privacy that other Users have in their own systems, data and accounts. In the event the College has reasonable suspicion that a User has violated any civil or criminal law, the College Code of Conduct, the IT Policy, or any other policy, procedure or regulation, the College authority reserves the right to access, inspect, monitor, remove, take possession of or surrender to civil or criminal authorities the offending Content, with or without notice or consent of the User.
The college level activities will be updated in the website only if the document provided by the concerned authority is verified and approved by the website editorial committee. The department level documents will be updated when the document provided by the concerned department member will be verified and approved by the editorial committee.
The management and disposal of e-waste is done through IT Cell and Facility Management Committee (FMC). The e-waste in the campus has to be reported to IT Cell. The cell verifies if the reported items can be rectified or cannot be utilized further. If the items cannot be rectified, it will be intimated to FMC. FMC will take steps for safe collection and disposal of e-waste through government local bodies.
Users understand that any violation of this policy may call for corrective action as deemed necessary by the individual’s (student/employee) supervisor, department head or Principal. Violators may be subject to local, state and/or central prosecution.