Copies of this CCSF Computer Usage Policy can be found in the college catalogue and the employee's handbook, and on the college website: Each user who uses the CCSF computing facilities and resources is bound by this policy.

Violation of these policies will be dealt with in the same manner as violations of other College policies and may result in disciplinary review. In such a review the full range of disciplinary sanctions is available including the loss of computer use privileges, dismissal from the College, and legal action. Violations of some of the policies below may constitute a criminal offense.

Rights and Responsibilities

CCSF makes computer accounts and resources available for student use in the pursuit of instructional goals, and to faculty and staff to support the institution's mission.

The Computer Usage Policy applies to all users of the CCSF computing resources. This includes administrators, faculty, staff, students and guests on District equipment and networks.

Computer accounts and computer access are privileges, and require the individual user to act responsibly. By using the CCSF accounts, users have agreed to respect the rights of other users and accounts, to use the account only for school-related purposes, and to safeguard the integrity of the system and its related physical resources. Users have further agreed to observe all relevant laws, regulations, policies and contractual obligations of the College.

Other organizations operating computing and network facilities that are reachable via the City College network may have their own policies governing the use of those resources. When accessing remote resources from City College facilities, users are responsible for obeying both the policies set forth in this document and the policies of the other organizations. It is the user's responsibility to be informed of the policies of other outside organizations to which they establish a computer link.


CCSF does NOT guarantee or warranty the confidentiality of user files, including e-mail, except where legally or contractually protected. It is the practice of Information Technology Services (ITS) to respect the confidential nature of user files, but the ITS Department reserves the right to view or alter user files when it is necessary. Any ITS employee must have permission from the appropriate Vice Chancellor prior to investigating or modifying a user file.

User files may also be subject to search under court order if such files are suspected of containing information that could be used as evidence in a Court of law. Student files as kept on ITS facilities are considered educational records as covered by the Family Educational Rights and Privacy Act of 1974 (Title 20, Section 1232(g) of the United States Code, also referred to as the Buckley Amendment).

In addition, a system administrator may access user files as required to protect the integrity of the computer system. For example, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged.

Existing Legal Context

All existing federal and state laws and College regulations apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct.

Misuse of computing, networking or information resources may result in the loss of computing and/or network privileges without notice. This includes both those that ITS administers, and those that may exist in other departments associated with City College of San Francisco and connected to its network. Deliberate violations of these policies will be dealt with in the same manner as violations of other college policies and may result in disciplinary sanctions including, but not limited to, loss of computer use privileges, dismissal from the college, and/or appropriate legal action.

Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable College or campus policies, procedures, or collective bargaining agreements. Complaints alleging misuse of the College's computing resources will be directed to those responsible for taking appropriate disciplinary action as specified under Enforcement below. Illegal reproduction of software protected by U.S. Copyright Law is subject to civil damages and criminal penalties including fines and imprisonment (See CCSF Policy Manual 8.10).


All users must follow all relevant copyright laws. US Copyright law governs printing, scanning, reproduction, and distribution of software and other material in print or online, including text, fonts, graphics, sound, video and others The End User License Agreement (EULA) for a product specifies the conditions under which a user may copy or install the product. The EULA also specifies the number of simultaneous users licensed to use the product.


Computer users must follow Unlawful Discrimination and Harassment Policy including those governing "sexual harassment" & "hostile education environment".

All computer users must follow the Unlawful Discrimination and Harassment Policy as stated in the CCSF "Equal Opportunity Statement" listed in the catalog. ; (EDUCATION CODE SECTION 66270-66271.1)

Any user who files a complaint or otherwise protests against discrimination has the right to be free from any retaliatory action because of the complaint or protest. The CCSF administrator who receives a complaint of discrimination should inform the complainant of this right and that the complainant may file an additional complaint if he or she experiences retaliatory conduct.

Examples of misuse include, but are not limited to, the following activities:

    Breaking into another person's account

  1. Using a computer account that you are not authorized to use by the ITS Department. Knowingly or carelessly allowing someone else to use your account.
  2. Obtaining a password for a computer account that is not your own account.
  3. Using the Campus Network to gain unauthorized access to any computer systems.
  4. Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating running and/or distributing programs that are designed to identify security loopholes and/or decrypt intentionally secure data.
  5. Masking the identity of an account or machine.
  6. Harassment

  7. Using e-mail to harass others.
  8. Posting on Internet services information that may be slanderous or defamatory in nature.
  9. Displaying sexually explicit, graphically disturbing, or sexually harassing images or text in a public computer facility, or location that can potentially be in view of other individuals, except when directly related to CCSF coursework.
  10. Commercial use

  11. Using your account for any activity that is commercial in nature. Commercial activities include, but are not limited to, consulting, typing services, and developing software for sale. Account use to purchase textbooks and course materials, etc. is permitted
  12. Copyright

  13. Violating terms of applicable software licensing agreements or copyright laws.
  14. Changing files

  15. Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner. Files owned by individual users are to be considered private property, whether or not they are accessible by other users.
  16. Modifying of another user's files, which is illegal under California Computer Crime Laws.
  17. System misuse

  18. Sending mass e-mail to a large number of people on the system. It is acceptable, however, to use organization or department mailing lists, listserves, to send e-mail to groups of people on the system.
  19. Knowingly or carelessly performing an act that will interfere with the normal operation of computer systems, including running, or installing, or giving to another user a program intended to damage or to place excessive load on a computer system or network. This includes programs known as computer viruses and worms.
  20. Deliberately wasting/overloading system resources, such as:

Additional System Information


After the appropriate investigation and/or hearing procedures have been followed, the penalties below may be imposed under one or more of the following: City College regulations, California law, the laws of the United States.

This document is subject to revision. The Information Technology Advisory Committee (ITAC) approves changes to the guidelines, as needed.

Revision 1.0.4. Updated 11/16/2012