Policies @ HRC
- GREEN POLICY
- INTERNET USAGE POLICY
This document describes policies and procedures followed by Hans Raj College for conducting their operations and activities in an environmentally responsible and sustainable manner.
“HARITMA” the environment awareness society of Hans Raj College is actively involved in creating awareness among the students and the staff of the college about the various issues concerning the impact of our activities on the environment. It conducts seminars; tree plantation drives etc regularly. It also actively encourages:
- Compliance with all central and state, environmental laws and regulations.
- Prevention of pollution by minimizing the generation of wastes where possible, reducing consumption, recycling materials, and disposing of wastes in an environmentally responsible manner.
- Regularly review the environmental impact of our activities, endeavor to reduce our overall environmental impact and prevent waste using best practice techniques.
- Conserve energy and other natural resources. In order to achieve this goal the college already has a paper recycling plant and plans to tap solar energy to meet our energy needs and also to have a rain water harvesting system.
- Minimize the production of hazardous waste.
- Continue to review and minimize the impacts of our activities
Employees and students shall:
- Turn off lights when not in use and use natural light when possible.
- Turn off, not just log off, all computers, terminals, speakers and other office equipment at the end of every work day.
- Activate the power down features on your computer and monitor to enter into a low-power or sleep mode when not in use.
- Unplug equipment that drains energy even when not in use (e.g., cell phone chargers, fans, coffee makers, desktop printers).
- Use compact fluorescent light bulbs (CFLs) as opposed to incandescent lights whenever possible.
- Use the stairs when possible.
- Reduction of Materials Consumption
- Avoid using paper by distributing and storing documents electronically.
- Print and photocopy only what you need and double side your jobs when possible.
- Tell staff and colleagues that you prefer double-sided documents.
- Use the back side of old documents for faxes, scrap paper, or drafts.
- Minimize Toxics and Hazardous Waste
- Do not pour toxic or hazardous substances down the drain.
- Reduce the use of toxic chemicals and use less toxic alternatives wherever possible.
- Design experiments, when possible, to use less toxic or hazardous substances.
- Purchase chemicals in the smallest quantities needed to avoid over-ordering.
Panel Discussion are often held to appraise students of the changes in Environmental Laws so that they have updated information on various policy changes.
Students are involved in minor projects to study the environmental quality parameters in and around campus.
Cyclothons are held to create awareness related to contemporary environmental problems and mitigation strategies that can help combat the problems.
The Hans Raj College provides access to the College’s Internet Systems for its employees and students. This Internet Acceptable Use and Safety Policy governs all electronic activity of users using and accessing the college’s internet systems.
“The College’s Internet Systems” means college-provided devices, Internet connections (including wireless connections) provided by the college. A user is deemed to access and use the College’s Internet Systems through any electronic activity conducted on the College’s Internet Systems using any device (whether or not such device is a College-provided device).
“College provided devices” means any electronic device provided by the College such as: desktop computers and laptops.
Employees and students use of this internet facility of the college is governed by this policy.
By using the College’s Internet Systems, a user agrees to follow this policy and all applicable College regulations, policies and guidelines. All users must report any misuse of the network or Internet or receipt of any communication that violates this policy to a teacher, supervisor or other appropriate Department personnel.
Students and employees have access to:
Electronic mail (e-mail) communication with people all over the world.
Information, online databases and news from a variety of sources and research institutions.
Discussion groups on a wide-variety of topics.
Variety of web-based and software programs to publish content to the web.
Online courses and curriculum, academic software and electronic learning resources.
Accounts and Access Restrictions
All users must protect the College's and University’s E-Resources from unauthorized access. Specifically, all users must:
Take responsibility for the security and integrity of information stored on any personal or assigned desktop, laptop, or handheld system;
Take care to access E-Resources only from secure environments and to log out of sessions before leaving any computer unattended;
Take all appropriate precautions when accessing confidential or restricted College data to protect the data from unauthorized disclosures and from threats to its accuracy or integrity;
Comply with requests from the IT Staff and other authorized personnel to cease use of E-Resources that compromises the E-Resources or the College; and,
Cooperate with system administrators during investigations of improper use.
Prohibited Uses of the College’s Internet System
Users may not engage in any of the activities prohibited by this policy when using or accessing the College’s Internet Systems.
If a user is uncertain whether behavior is prohibited, he or she should contact a teacher. The College reserves the right to take immediate action regarding activities that
create security and/or safety issues for the College, students, employees, network or computer resources, or
College determines are inappropriate.
Below is a non-exhaustive list of examples of prohibited behavior:
Causing harm to others, damage to their property or property of college, such as:
Using, posting or distributing profane, lewd, vulgar, threatening, or abusive language in e-mail messages, or professional social media sites.
Accessing, using, posting, or distributing information or materials that are pornographic or otherwise obscene, advocate illegal or dangerous acts, or advocate violence or discrimination.
Accessing, posting or distributing harassing, discriminatory, inflammatory, or hateful material, or making damaging or false statements about others;
Sending, posting, or otherwise distributing chain letters or engaging in spamming;
Damaging computer equipment, files, data or the Internet System in any way, including spreading computer viruses, vandalizing data, software or equipment, or engaging in conduct that could interfere or cause a danger of disruption to the College’s educational or business environment;
Downloading, posting, reproducing or distributing music, photographs, video or other works in violation of applicable copyright laws.
Engaging in plagiarism.
Extend the network by introducing a hub, switch, router, wireless access point, or any other service or device that permits more than one device to connect to any College network;
Malicious tampering, phishing or hacking activities.
Making unauthorized copies of licensed software;
Intentionally seeking information about passwords belonging to other users;
Attempting to gain access to material that is blocked by the college;
Accessing, copying, or modifying another user’s files without authorization;
Disguising a user’s identity;
Using the password or identifier of an account that does not belong to the user; or
Engaging in uses that jeopardize access into others’ accounts or other computer networks.
Alter, remove, or forge email headers, addresses, or messages, or otherwise impersonate or attempt to pass oneself off as another;.
Using the College’s Internet Systems on behalf of any elected official, candidate, candidates, or a political organization or committee.
Engaging in criminal or other unlawful activities.
The use of College Internet Systems is a privilege, not a right, and inappropriate use will result in cancellation of those privileges. The administration, teachers and/or staff may request the site system administrator to deny, revoke or suspend specific user access.