Northeast Stata Logo Northeast Stata Logo Students
Policies and Procedures Manual
Side Navigation Divider
***** ARCHIVED POLICY MANUAL *****

This site contains archived versions of Northeast State Community College policies.

For the most up-to-date policies, please visit the Northeast State PolicyTech website.

Videos, how-to guides, and links to both the archived and current policy sites, please visit the Northeast State Policies webpage.

This archived site is no longer being updated as of February 11, 2025.

Chapter 3: Student Affairs

03:02:02   Respect for Others
  1. A user shall not attempt to obstruct usage or deny access to other users.
  2. Users shall not transmit or distribute material that would be in violation of existing Tennessee Board of Regents (TBR) or Northeast State Community College policies or guidelines using Northeast State information technology resources.
  3. Users shall respect the privacy of other users, and specifically shall not read, delete, copy, or modify another user’s data, information, files, email or programs (collectively, “electronic files”) without the other user’s permission. Users should note that there should be no expectation of privacy in electronic files stored on the resident memory of a computer available for general public access, and such files are subject to unannounced deletion.
  4. Users shall not intentionally introduce any program or data intended to disrupt normal operations (e.g. a “computer virus” or “worm”) into Northeast State information technology resources.
  5. Forgery or attempted forgery of email messages is prohibited.
  6. Sending or attempts to send unsolicited junk mail or chain letters is prohibited.
  7. Flooding or attempts to flood a user’s mailbox is prohibited.                                                      


Back to Top

Divisional Review Responsibilities Checklist: Information Technology

Revision History: April 2014; Edited Feb. 2020