Page 70 - FKCC Student Handbook 2012 13 final for web

70
knowingly deleting any author attributions, legal notices or
proprietary designations or labels in a file that the user mails or
sends;
using, distributing, advertising, transmitting, or otherwise making
available any software program, product, or service that is designed
to violate this AUP or the AUP of any other Internet Service Provider,
including, but not limited to, the facilitation of the means to spam.
Security Violations
Constituents are responsible for ensuring and maintaining security of their
systems and the machines that connect to and use IP Service(s), including
implementation of necessary patches and operating system updates.
IP Services may not be used to interfere with, gain unauthorized access to, or
otherwise violate the security of FKCC’s (or another party’s) server, network,
network access, personal computer or control devices, software or data, or other
system, or to attempt to do any of the foregoing. Examples of system or network
security violations include but are not limited to:
unauthorized monitoring, scanning or probing of network or system
or any other action aimed at the unauthorized interception of data or
harvesting of e-mail addresses;
hacking, attacking, gaining access to, breaching, circumventing or
testing the vulnerability of the user authentication or security of any
host, network, server, personal computer, network access and control
devices, software or data without express authorization of the owner
of the system or network;
impersonating others or secretly or deceptively obtaining personal
information of third parties (phishing, etc.);
using any program, file, script, command or transmission of any
message or content of any kind, designed to interfere with a terminal
session, the access to or use of the Internet or any other means of
communication;
distributing or using tools designed to compromise security
(
including but not limited to SNMP tools), including cracking tools,
password guessing programs, packet sniffers or network probing
tools (except in the case of authorized legitimate network security
operations);
knowingly uploading or distributing files that contain viruses,
spyware, Trojan horses, worms, time bombs, cancel bots, corrupted
SCHOOL POLICIES