This site is not intended for children under the age of 13. This site is safe viewing for all ages; however, we do not enroll students of this age or younger. We will not knowingly collect information from site visitors in this age group.
Active Information Collection
Like many web-sites, this site collects information from its visitors only by asking them specific questions and by permitting them to communicate directly with us via e-mail, or by feedback forms. Some of the information that users submit may be personally identifiable information (that is, information that can be uniquely identified with them, such as full name, address, e-mail address, phone number, and so on).
Passive Information Collection
As users navigate through a web-site, certain information can be passively (that is, gathered without the user actively providing the information) collected through various technologies and means, such as navigational data collection.
At this time this web-site only uses web server log files to collect passive information from each visitor. The information collected does not disclose any personal information about the user. Examples of what is collected may include what web browser is being used, what operating system is being used, and what pages on our web site are visited. None of this information is tied to any individual user.
Use and Disclosure of Information
Links to Other Web-Sites
Use of this site if viewed from on campus may also be subject to our Computer Use Policy.
Electronic Privacy Statement
Thank you for visiting the ASU Mid-South web-site. Your privacy is very important to us, so we do not collect any information about you when you enter our web-site unless you knowingly provide and submit it while on-line.
Our web server automatically recognizes only the Internet domain and IP address from which you access our site and does not record your personal e-mail address or other personal information.
If you choose to share personal information by sending an email message or filling out an electronic form with personal information, such information will only be used for the purposes you authorize when submitting the data. Some of this information may be saved for a designated period of time for statistical or customer service purposes, but will not be disclosed to third parties or to other government agencies, unless required by federal or state law. ASU Mid-South adheres to regulations established by the Family Educational Rights and Privacy Act (FERPA) for the protection of student data.
COMPUTER USE DIRECTIVE
Computer and networking resources are provided by ASU Mid-South to enhance teaching, learning, service, and the activities which support them. ASU Mid-South is committed to a computing system which effectively meets the needs of users.
Individuals who are granted computing accounts or use the computer resources of the College accept responsibility with the access which is granted. Each user is expected to use accounts or resources for the educational or administrative purposes approved by the College. Activities beyond these stated purposes are strictly prohibited.
The Computer Use Administrative Directive for ASU Mid-South is stated below. Violations of this directive will be reviewed through established College judicial and administrative procedures and may result in a loss of access as well as other disciplinary or legal actions. Users may use the same procedures to challenge actions which restrict computer usage.
Users shall access only those computer resources which have been authorized for their use and must identify computing work with their own names or other approved IDs so that responsibility for the work can be determined and users can be contacted in unusual situations.
Access to the Internet is a privilege granted by ASU Mid-South; it is not an automatic right which accompanies the payment of tuition and/or fees. Users shall act in a considerate and responsible manner.
Users should minimize the impact of their work upon the work of others. One should not infringe on others’ use of the facilities or deprive them of system resources. Recreational activities such as downloading music, video, and game files or joining in chat rooms are not allowed because they consume substantial network resources.
Configurations of lab hardware and software shall not be altered. This would include but is not limited to the following:
Modifying backgrounds, wallpapers, icons, etc.;
Downloading and installing screen savers;
Installing Yahoo Messenger, ICQ, or other programs.
Intentional introduction of a computer virus is a serious offense subject to the strictest disciplinary regulations of the College. Any user who is notified that a virus was detected on a diskette, must destroy the diskette or have an Information Systems staff member disinfect the diskette immediately.
Inappropriate use of computer resources includes but is not limited to the following:
Sending or displaying obscene or offensive messages, pictures, language, graphics, songs, etc.;
Forwarding messages that have been identified as ‘virus infected’;
Harassing or insulting others;
Using someone else’s account;
Eating or drinking in the computer labs.
Users are responsible for the use of their computer and e-mail accounts. They should take advantage of available system protection measures such as passwords and be sure to log out to prevent unauthorized usage of their accounts.
Users shall use computer resources only for authorized purposes. This directive shall not prevent informal communication among students, faculty, and staff. However, accounts shall not be used for private consulting or personal gain.
Users shall not attempt to copy or destroy programs or files that belong to the College or other protected sources without prior authorization from the Vice President of Information Systems. Programs and data provided by the College may not be taken to other computer sites; individually owned programs and programs acquired at other computer sites cannot be used at the College without authorization.
Users of software owned by the College must agree to abide by the limitations included in the copyright and license agreements entered into with vendors. Furthermore, it is the user’s responsibility to become familiar with the specific copyrights and licensing agreements for each product before using it. It is unlawful to copy most software products. If other arrangements are made with a vendor, users must abide by stated provisions.
Those users who have access to privileged or sensitive information may not disclose that information for any purposes other than approved official College business.
Network administrators may review files and communications to maintain system integrity and ensure that users are using the system responsibly. Users should not expect that files will be private.
2000 West Broadway
West Memphis, AR 72301