COMPUTER LAB:
S. K. Karan, Coordinator D.N.CFaculty, staff, and students must use good judgment in the use of all computing resources, including but not limited to Internet access and e-mail use. E-mail messages must be appropriate in type, tone and content. Employee and student use of e-mail and the Internet must be able to withstand public scrutiny without embarrassment to the College. Computing and telecommunications may be used only for legal purposes and may not be used for any purpose which is illegal, unethical, dishonest, damaging to the reputation of the College or likely to subject the College to liability.

Any activity that would negatively affect the use of the network by others (e.g., games, excessive chat ); Removing hardware, software, or manuals from the Computer Lab without authorization is an offence Violating College security, damaging College systems, or using computing privileges to gain unauthorized access to any College computer system and/or any computer systemon the Internet Do not connect or disconnect any cables. Do not force diskettes in or out of floppy drives. Report any problems to the Lab Technician. No food, drink are allowed in the Lab. Work quietly and do not disturb others. Ask permission to work at an available computer if a class is in progress in the lab. S. K. Karan, Coordinator D.N.CClean up the work area around your station when you leave. Do turn off the machines when Leaving the lab. No bags are allowed in the Lab Any student found breaking the labs rules will be suspended from using the lab for two weeks.

The right to privacy of e-mail and other electronic files against unwarranted or unreasonable entry or search is a basic tenet of College policies. The user requests or gives permission to the College to access an account; Pursuant to a valid search warrant or court order; An emergency situation exists in which the physical safety and/or wellbeing of a person(s) may be affected or College property may be damaged or destroyed. Responsibility for authorizing access lies with the Principal or Vice Principals; Reasonable grounds exist to suspect that a violation of law or College policy is occurring. Access will take place only after a reasonable effort has been made to obtain consent. Responsibility for authorizing access lies with the Principal or Vice Principals; If necessary to maintain the integrity of the computer system or to protect the rights or property of the College. Responsibility for authorizing access lies with the Principal or Vice Principals.