184.108.40.206.2 KCTCS Unacceptable Uses Policy
Since e-mail provides for peer-to-peer communications between participants, it also
has great potential for misuse.
Use of KCTCS e-mail resources is a privilege that may be revoked at any time for inappropriate
Any abuse of acceptable use policies is considered gross misconduct and may result
in revocation of access, notification of KCTCS management, and disciplinary action
up to and including dismissal.
Examples of inappropriate conduct include, but are not limited to:
- a). Accessing another individual s personal e-mail or files without their specific
permission is considered gross misconduct. No one has authority to read another person
s e-mail unless explicitly given authority to do so by the owner of that e-mail
- b). Using e-mail for personal gain or personal business activities in a commercial
connotation such as buying or selling of commodities or services with a profit motive
- c). Using e-mail for any illegal purposes, including initiating or receiving communications
that violate any laws and regulations, including KRS 434.840-434.860 (Unlawful Access
to a Computer) and KRS 512.020 (Criminal Damage to Property Law). This includes malicious
use, spreading of viruses, and hacking. Hacking means gaining or attempting to gain
the unauthorized access to any computers, computer networks, databases, data or electronically
- d). Using e-mail for transmitting statements, language, images or other materials
that are reasonably likely to be perceived as offensive or disparaging of others based
on race, national origin, sex, sexual orientation, age, disability, religious or political
- e). Using abusive or objectionable language in either public or private messages.
- f). Using e-mail for disseminating, soliciting or storing sexually oriented messages
- g). Misrepresenting, obscuring, suppressing, or replacing a user s identity in e-mail.
This includes the use of false or misleading subject headers and presentation of information
in the distribution of e-mail.
- h). Using e-mail for sending or forwarding chain letters.
- i). Distributing or forwarding unsolicited commercial e-mail.
- j). Using e-mail for soliciting money for religious or political causes, or advocating
religious or political opinions.
- k). Using e-mail to distribute personal information to include any information that
constitutes an unwarranted invasion of personal privacy as defined in the Kentucky
Open Records Act, KRS 61.870 or other state and Federal laws.
- l). Using e-mail for copying, disseminating or printing copyrighted materials (including
articles, images, games, or other software) in violation of copyright laws.
- m). Using e-mail for other non-business related activities that will cause congestion,
disruption of networks or systems including e-mail attachments.