Fall and Spring Hours
Monday – Thursday
10:00 am – 6:00 pm
Friday – 10 am to 1 pm
Weekends & Holidays – Closed

Winter Intersession and
Summer Hours
Monday – Thursday

10:00 am to 4:00 pm
Fridays & Holidays

Learning Resource Center
Room 129

Front Desk:
(714) 892-7711 x50111



Learning Resource Center
Using the Resources

All computer accounts (logins) are for the use of a single individual, the person for whom the account was approved. Sharing or loaning accounts is strictly prohibited. Use of these facilities to gain unauthorized access to any other account, at this facility or any other facility, is expressly prohibited.

It may seem that there is no limit to the resources on the Internet, but the network has a limited capacity to handle traffic. This means the more users there are on the network, the more congested the Network becomes. If there are too many users at any given time, the traffic on the network grinds to a crawl. Although the Network may slow down, it will continue to function. The following list will help avoid “gridlock.”

  • Do not tie up the Network with idle activities.
  • Do not play games with others on the Network or on the Internet. Networks are not designed for computer games. It is NOT Nintendo. Play games on your own time and on your own equipment.
  • Do not download huge files from places half a globe away. Only take the information you want and need. The best thing to do is get into the Internet, get what you need, and get out. Remember, there are many students who need to use this system. When there is a wait to use a computer, users will be limited to 2 hours and then will have to log off to allow other students to use the computer.
  • Additionally, you must log off immediately if any staff member tells you to do so. Occasionally the center will be reserved for a class, and you must also log off prior to the center’s closing time so the staff will have adequate time to secure the center and leave in a timely manner.
  • The college has the right to restrict or terminate Network and Internet access at any time for any reason. The college further has the right to monitor Network activity in any form that it sees fit to maintain the integrity of the Network.
  • In order to best serve students, the Center my make changes in policies and procedures without notice.

You are encouraged to use the Network to pursue intellectual activities, seek resources, access libraries and find international friends. We want you to explore this “cyberspace” and discover what is available there. This resource is new to all of us.

When you are using the computer network and communicating with others in remote or even close locations, keep the following in mind: (1) You cannot see them; (2) You cannot tell how old they are; (3) They can tell you anything, and you cannot always be sure what they are telling you is true; and (4) Absolute privacy cannot be guaranteed in a network environment. So, you need to think carefully about what you say and how you say it.

For your own safety and for the safety of others, remember to exercise caution when you are communicating with people in the outside world. Do not give out your home phone number or your address to anyone. In most cases they do not need to have that information. If you feel there is a problem or if you feel uncomfortable with the information someone is giving you, leave that site, or contact a staff member in the center for assistance.

Privacy and security of your credit card number is not guaranteed. Therefore, purchasing online is not recommended.

By the same token, you may not harass other users. You don’t want to run the risk of breaking the law by bothering other people. If a user on the Network asks that you no longer send them mail or in any other way contact them, you are obliged to stop all contact immediately. You may feel you have the right of freedom of expression, but others have the right to be free from harassment.

Legal Issues

The State of California passed a computer crime bill in December of 1979. The bill added section 502 to the Penal Code making it a felony to intentionally access any computer system or network for the purpose of: (1) devising or executing any scheme or artifice to defraud or extort or (2) obtaining money, property, or services with false or fraudulent intent, representations, or promises.

It is also a felony to maliciously access, alter, delete, damage or destroy any computer system, computer network, computer program, or data. Penalties include fines up to $5000 and/or imprisonment in the state prison for up to three years or the county jail for up to one year. Anyone committing acts of this kind will face police charges, and disciplinary action by the college. The person will be punished to the full extent of the law.

Some examples of offenses are removing another user’s accounts, changing other user’s passwords, using an unauthorized account, damaging or deleting files, altering the system, or using the system to make money illegally. You cannot cause damage to any school or District property. This includes the Network system. *Promptly reporting a Network problem by notifying a staff member in the center is encouraged.

The dictionary defines plagiarism as “taking ideas or writings from another person and offering them as your own.” The student who leads readers to believe that what they are reading is the student’s original work when it is not is guilty of plagiarism. Credit should always be given to the person who created the article or the idea.

Be careful when you are using the Internet. Cutting and pasting ideas into your own document is very easy to do. So, be sure that you give credit to the author. That way your instructor will know which ideas are yours, and you won’t be guilty of plagiarism.

Copyright is another issue altogether. According to the Copyright Act of 1976, “Fair Use” means that you may freely use any information that you legally find on the Internet as long as you do so only for scholarly purposes. You may not plagiarize or sell what you find.

Suppose, for example, that you find a copy of Microsoft Works on the Internet. Could you legally copy it? The answer is NO. This is copyrighted software. You have to purchase software packages before you use them legally. Suppose you find an article about the use of Microsoft Works on the Internet. Can you legally copy it? The answer is yes, as long as you give credit to the author and do not sell the article for profit.

Acceptable Use Policy Summary

By using our network you acknowledge that the college does not have control of the information on the Internet. Sites accessible via the Internet may contain material that is illegal, defamatory, inaccurate or potentially offensive to some people. While the Golden West College Student Computer Center’s intent is to make Internet access available to further its students’ educational goals and objectives, account holders will have the ability to access other materials as well.

The college believes that the benefits to educators and students from access to the Internet, in the form of information resources and opportunities for collaboration, far exceed any disadvantages of access.

  1. By using our network you also agree to the following terms:
  2. You have read, understand and agree to abide by the information and requirements contained in this document.
  3. You will not use the college’s network for illegal purposes of any kind.
  4. You will not install software other than onto your own disk.
  5. You will not use the college’s Network to transmit threatening, obscene, or harassing materials. The District will not be held responsible if you participate in such activities. You agree that the college is not responsible for such behavior on your part.
  6. You will not use the Network to interfere with or disrupt network users, services or equipment. Disruptions include, but are not limited to, distribution of unsolicited advertising (spamming), propagation of computer worms and viruses, and using the network to make unauthorized entry to any other machine accessible via the network.
  7. It is assumed that information and resources accessible via the college’s Network are private to the individuals and organizations which own or hold rights to those resources and information unless specifically stated otherwise by the owners or holders of rights. Therefore, you will not use the college’s Network to access information or resources unless permission to do so has been granted by the owners or holders of rights to those resources or information.
  8. You will not attempt to access the school’s network from a location other than the Student Computer Center.
The College, The Internet, and YOU

1. Introduction The Golden West College Student Computer Center and the Internet represent powerful educational resources which will allow you to find information in this world-wide electronic network. You can connect to businesses, major universities, national libraries, other schools and other students around the world.

You need to learn the correct procedures and rules for using the network of information services. By using our computers, you agree to obey the guidelines. If you do not follow the guidelines, you will not be allowed to continue to use the system.

2. The Internet The Internet is a global network made up of many smaller contributing networks to support the open exchange of information among many different kinds of institutions all over the world. This system gives immediate access to information. It’s like being able to open every book in any library from your computer. You can look at (and print out) articles, documents and pictures that you can use in your classes. The intent of the Golden West College Student Computer Center is to use connections on the Internet only for purposes consistent with our approved curriculum. So, anyone who uses the network illegally or improperly will lose the privilege of using it.

3. WHO IS WATCHING? The Internet is a public place. You must always remember that you are sharing this space with many other users. Potentially millions of individuals at the same time may be interacting across the network. Your actions can be monitored by others on the network. Email, while it seems as private as sending a letter to an individual via the US MAIL, is NOT PRIVATE. Additionally, if you use a particular service on the network, chances are good that someone knows the connections that you are making, knows about the computer shareware that you have borrowed, and knows what you looked at while you were in the system. Because these connections are granted to you as part of the larger scope of the curriculum, the college reserves the right to monitor all traffic on the network. We do this to make sure that the Network continues to function properly for all of its users.

4. Student Conduct Codes The network Acceptable Use Policy is an extension of the college’s student code. These rules apply to vandalism of computer equipment, unauthorized access to information, computer piracy, hacking, and any tampering with hardware or software. These rules also apply to the electronic use of harassing and abusive or obscene language. You may not use the network to annoy, harass, or offend other people (flaming). Other types of damage and information loss to a computer system are viruses and worms. If you are responsible for a computer becoming infected with viruses or worms, you will be held liable.

5. Ethical Issues The moral and ethical issues involving the use of world-wide information systems deal with the appropriate access to information, the type of information, and the behavior of the user. The Golden West College Student Computer Center wants to provide you with a stimulating educational environment, but at the same time, we must be sensitive to all students and their needs, such as students in viewing range of the computer you are using. The college wants you to use this valuable educational tool, but at the same time we cannot condone the use of inappropriate information on the Internet. We simply acknowledge the fact that these materials exist and then ask you to actively avoid them. The network is designed to achieve and support instructional goals, and any information that does not support classroom learning is to be avoided.