ĐĎॹá>ţ˙ CEţ˙˙˙B˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙ěĽÁ%` đżQbjbj•Ů•Ů .,÷ł÷łQ˙˙˙˙˙˙¤¤¤¤¤¤¤¤¸ ,¸!2DDDDDŽ       $A"hŠ$ţ´ ¤´ ¤¤DDŰÉ ×××j¤D¤DŽ ׎ ×׎*h¤¤f D8 uuɉ.’Ž ß 0!˘ħ%ˇ§% f §%¤f (×´ ´ Í !¸¸¸„ <ĸ¸¸<¸¸¸¤¤¤¤¤¤˙˙˙˙ Attachment 1 (Computing Workstation/Network Resources Use Policy) Computer and Network Use Agreement Appropriate use of system computing resources means Respecting the rights of other computer users Protecting the integrity of the physical and software facilities Complying with all pertinent license and contractual agreements Obeying all NSHE regulations and state and federal laws. Students enrolled in NSHE courses will be treated as NSHE students and therefore must abide by NSHE policies. Inappropriate use of computing or networking resources may result in the loss of computing privileges. If a violation of appropriate use occurs, a warning will first be given, notifying the individual that their action violates policy or law and that their access will be suspended if the action continues. All NSHE Code and campus bylaws shall be followed if the need to suspend computing privileges from faculty, staff, or students occurs. However, if the security and operation of the computing systems or networks are jeopardized, access may be immediately cancelled. In congruence with NRS 281.481, NSHE employees shall not use the NSHE computer resources to . . . Benefit their personal or financial interest. Personal use shall not interfere with official institutional use. An employee who intentionally or negligently damages NSHE computing resources shall be held responsible for the resultant expense. An NSHE account given to students, faculty, and staff is for the use only of the person to whom it is given. Unauthorized access or privileges are not allowed. In electronic communication such as mail, the user should not misrepresent his or her identity. No user should attempt to disrupt services of the computing and network systems, including the knowing propagation of computer viruses or the bombardment of individuals, groups, or the system with numerous repeated unwanted messages. Privacy Issues The NSHE provides security measures to protect . . . The integrity and privacy of electronic information such as administrative data, individual data, personal files, and electronic mail. All FERPA (Family Educational Rights and Privacy Act) requirements are followed. That users must not circumvent security measures. Internet You should be aware that the NSHE agreement with the provider for Internet access prohibits: Attempted unauthorized access or destruction of any customers' information. Knowingly engaging in any activities that will cause a denial-of-service to any customers. Using products and services to interfere with the use of the network by other customers or authorized users, or in violation of the law or in aid of any unlawful act. NevadaNet Inappropriate Use It is not appropriate to use NevadaNet for any purpose that violates NSHE Code, federal or state laws and/or regulations. It is not appropriate to use the NevadaNet network in a manner that results either directly or indirectly in interference or disruption to NevadaNet Participants’ services or equipment. Such inappropriate uses include, but are not limited to: Distribution of email or other traffic containing non NSHE related commercial advertising, chain letters, or other non-business related activities e.g. use of NevadaNet as an open forum for the unsolicited distribution of a personal position or grievance Providing NevadaNet connectivity to other parties through reselling, trading, bartering, or any other means Establishing or maintaining personal or non-NSHE related commercial business endeavors Propagation of computer worms or viruses Using the network to make unauthorized entry to other computational, information, or communications devices or resources Legal References Reproduction or distribution of copyrighted works, including, but not limited to, images, text or software, without permission of the owner is an infringement of U.S. Copyright Law, 17 U.S.C.A. et.seq., and is subject to civil damages and criminal penalties including fines and imprisonment under federal law. Distribution or receipt of child pornography, under 18 U.S.C. 2252, is also illegal under federal law. Use of computer resources to facilitate pyramid schemes is also illegal conduct under 18 U.S.C. Section 1302. Software piracy (illegal copying or violating license agreements)(first offense) is punishable, pursuant to 17 U.S.C. et.seq., by a jail term of up to ten years and fines of up to $250,000 per offense. Sound recording duplication is also protected from copying by the federal copyright statutes. 18 U.S.C. 1030 makes it a federal crime to: Steal information from computers belonging to financial institutions or federal agencies or steal information from computers used in interstate commerce. Access government computers without authorization. Damage computer systems or system data (either by reckless or intentional conduct). Traffic in stolen computer passwords. Engage in extortionate threats to damage computer systems. Sending electronic mail that threatens other persons or property is illegal under 18 U.S.C. section 1030. Commercial use of NSHE computer resources is prohibited by Nevada Revised Statutes Section 197.110 (2). ABCeiv‡ŠŹËŐƒ…˘Ł¤€‘žŸPQöîöçÝĎžŞžĎžŞžĎ˜ĎlZlZlŞžĎžVhpy)#hpy)B*CJOJQJ^JaJph)hŔ Îhpy)B*CJOJQJ^JaJph,hŔ Îhpy)B*CJOJQJ\^JaJph#hŔ Îhpy)5CJOJQJ^JaJ&há 8hpy)5CJOJQJ\^JaJ há 8hpy)CJOJQJ^JaJhpy)CJOJQJ^JaJhTÖhpy)5\ hpy)5\hpy)hpy)5hpy)hpy)5\BCfghižĚ M † ‡ 1 2 • – Ä Ĺ ‹ ďâďâââââŐŐŐŐĚźâââŻâź & F7$8$H$gdpy)$„Đ7$8$H$^„Đa$gdpy) 7$8$H$gdpy) & F7$8$H$gdpy) „Đ7$8$H$^„Đgdpy)$„Đ7$8$H$^„Đa$gdpy)Qý‹ Œ vw†‡˝žEF˜™ËĚŐÖ34€ďďćŮŮĚ̿̿̿ćŮćĚ̲Ľ „87$8$H$^„8gdpy) & F7$8$H$gdpy) & F7$8$H$gdpy) „Đ7$8$H$^„Đgdpy) „Đ7$8$H$`„Đgdpy) 7$8$H$gdpy)$„Đ7$8$H$^„Đa$gdpy)ÜÝ„…Ł¤‚ňéňéÜÜËżŻ˘‰y‰y$„7$8$H$^„a$gdpy)$ & F Ć@ Ř „Ř 7$8$H$^„Ř a$gdpy) „ 7$8$H$^„ gdpy)$„ 7$8$H$^„ a$gdpy) $7$8$H$a$gdpy)„Đ„Đ7$8$H$^„Đ`„Đgdpy) „Đ7$8$H$^„Đgdpy) 7$8$H$gdpy) & F7$8$H$gdpy)‚ÚŰ€‘’ČÉ01ijČÉőöćÖćÖćÉŔ°°°°°°°ŁŁŔ „Đ7$8$H$^„Đgdpy)$„Đ7$8$H$^„Đa$gdpy) 7$8$H$gdpy) „Đ7$8$H$`„Đgdpy)$„7$8$H$^„a$gdpy)$ & F Ć@ Ř „Ř 7$8$H$^„Ř a$gdpy)ö‘ÄĹ@A|}çčPQňĺňĺňĺňĺňĺňĺňă „Đ7$8$H$^„Đgdpy) & F7$8$H$gdpy),1h°Đ/ °ŕ=!°"°# $ %°°Đ°Đ Đ†œ@@ń˙@ py)NormalCJ_HaJmH sH tH DAň˙ĄD Default Paragraph FontRió˙łR  Table Normalö4Ö l4Öaö (kô˙Á(No ListQ,˙˙˙˙BCfghižĚ M†‡12•–ÄĹ‹Œvw†‡˝žEF˜™ËĚŐÖ3 4 €  Ü Ý „ …   Ł ¤      ‚ Ú Ű €‘’ČÉ01ijČÉőö‘ÄĹ@A|}çčPS˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜ 0€€˜ 0€€˜ 0€€˜ 0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜ 0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€˜ 0€€˜0€€Ű €PSŠĐ00HŠĐ00ŠĐ00ŠĐ00€ŠĐ0 0 § 00çQ‹ ‚öQQđ8đ@ń˙˙˙€€€÷đ’đđ0đ( đ đđB đS đżË˙ ?đ… Ž Á Ę ? H Š ˛ ˛ ť  ' TZS™Ł÷üŮŕS333iPSSmU\¨ž6Ü˙˙˙˙˙˙˙˙˙cl+ŒšRá˙˙˙˙˙˙˙˙˙Í"Â"şťř•˙˙˙˙˙˙˙˙˙ě\yBzž ˙˙˙˙˙˙˙˙˙äfkWśuş˙˙˙˙˙˙˙˙˙h„ „˜ţĆ ^„ `„˜ţOJQJo(‡hˆHˇđh„p„˜ţĆp^„p`„˜ţOJQJ^Jo(‡hˆHoh„@ „˜ţĆ@ ^„@ `„˜ţOJQJo(‡hˆH§đh„„˜ţĆ^„`„˜ţOJQJo(‡hˆHˇđh„ŕ„˜ţĆŕ^„ŕ`„˜ţOJQJ^Jo(‡hˆHoh„°„˜ţĆ°^„°`„˜ţOJQJo(‡hˆH§đh„€„˜ţĆ€^„€`„˜ţOJQJo(‡hˆHˇđh„P„˜ţĆP^„P`„˜ţOJQJ^Jo(‡hˆHoh„ „˜ţĆ ^„ `„˜ţOJQJo(‡hˆH§đ„ „˜ţĆ ^„ `„˜ţOJQJo(‡hˆHˇđ€„p„˜ţĆp^„p`„˜ţOJQJ^Jo(‡hˆHo€„@ „˜ţĆ@ ^„@ `„˜ţOJQJo(‡hˆH§đ€„„˜ţĆ^„`„˜ţOJQJo(‡hˆHˇđ€„ŕ„˜ţĆŕ^„ŕ`„˜ţOJQJ^Jo(‡hˆHo€„°„˜ţĆ°^„°`„˜ţOJQJo(‡hˆH§đ€„€„˜ţĆ€^„€`„˜ţOJQJo(‡hˆHˇđ€„P„˜ţĆP^„P`„˜ţOJQJ^Jo(‡hˆHo€„ „˜ţĆ ^„ `„˜ţOJQJo(‡hˆH§đh„@ „˜ţĆ@ ^„@ `„˜ţOJQJo(‡hˆHˇđh„„˜ţĆ^„`„˜ţOJQJ^Jo(‡hˆHoh„ŕ„˜ţĆŕ^„ŕ`„˜ţOJQJo(‡hˆH§đh„°„˜ţĆ°^„°`„˜ţOJQJo(‡hˆHˇđh„€„˜ţĆ€^„€`„˜ţOJQJ^Jo(‡hˆHoh„P„˜ţĆP^„P`„˜ţOJQJo(‡hˆH§đh„ „˜ţĆ ^„ `„˜ţOJQJo(‡hˆHˇđh„đ„˜ţĆđ^„đ`„˜ţOJQJ^Jo(‡hˆHoh„Ŕ!„˜ţĆŔ!^„Ŕ!`„˜ţOJQJo(‡hˆH§đh„ „˜ţĆ ^„ `„˜ţOJQJo(‡hˆHˇđh„p„˜ţĆp^„p`„˜ţOJQJ^Jo(‡hˆHoh„@ „˜ţĆ@ ^„@ `„˜ţOJQJo(‡hˆH§đh„„˜ţĆ^„`„˜ţOJQJo(‡hˆHˇđh„ŕ„˜ţĆŕ^„ŕ`„˜ţOJQJ^Jo(‡hˆHoh„°„˜ţĆ°^„°`„˜ţOJQJo(‡hˆH§đh„€„˜ţĆ€^„€`„˜ţOJQJo(‡hˆHˇđh„P„˜ţĆP^„P`„˜ţOJQJ^Jo(‡hˆHoh„ „˜ţĆ ^„ `„˜ţOJQJo(‡hˆH§đh„ „˜ţĆ ^„ `„˜ţOJQJo(‡hˆHˇđh„p„˜ţĆp^„p`„˜ţOJQJ^Jo(‡hˆHoh„@ „˜ţĆ@ ^„@ `„˜ţOJQJo(‡hˆH§đh„„˜ţĆ^„`„˜ţOJQJo(‡hˆHˇđh„ŕ„˜ţĆŕ^„ŕ`„˜ţOJQJ^Jo(‡hˆHoh„°„˜ţĆ°^„°`„˜ţOJQJo(‡hˆH§đh„€„˜ţĆ€^„€`„˜ţOJQJo(‡hˆHˇđh„P„˜ţĆP^„P`„˜ţOJQJ^Jo(‡hˆHoh„ „˜ţĆ ^„ `„˜ţOJQJo(‡hˆH§đě\yBäfkWcl+mU\Í"Â"˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙                                             ĺ Rpy)5TŐ?@Aţ˙˙˙ý˙˙˙Dţ˙˙˙ţ˙˙˙ţ˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙Root Entry˙˙˙˙˙˙˙˙ ŔFćńŤ´uÉF€Data ˙˙˙˙˙˙˙˙˙˙˙˙1Table˙˙˙˙Ç%WordDocument˙˙˙˙.,SummaryInformation(˙˙˙˙˙˙˙˙˙˙˙˙2DocumentSummaryInformation8˙˙˙˙˙˙˙˙:CompObj˙˙˙˙˙˙˙˙˙˙˙˙q˙˙˙˙˙˙˙˙˙˙˙˙ţ˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙ţ˙ ˙˙˙˙ ŔFMicrosoft Office Word Document MSWordDocWord.Document.8ô9˛q