Events
  • Sitting in Sound

    Jul 15| Special Event
    More

    Image: Electronic Sound Bath
     

  • L: Nora Jane Slade, Kate Mouse Mickey Moss, 2014, Photo transfer and fabric paint on sweatshirt, cardboard and found objects. R: Marisa Takal, I Love My Sister, 2016, Oil on canvas, 65 x 50 inches.

    Opening Reception: I Wish I Was a Telephone: Nora Jane Slade and Marisa Takal

    Celebrate the opening of the two-person exhibition of work by Los Angeles-based artists Nora Jane Slade and Marisa Takal.

    Light snacks and refreshments.

    Exhibition on view July 15 - August 19, 2017.

  • Amelia Gray is the author of the short story collections AM/PM, Museum of the Weird, and Gutshot, as well as the novels Threats and, most recently, Isadora, published by Farrar, Straus and Giroux. Her fiction and essays have appeared in The New Yorker, the New York Times, the Wall Street Journal, Tin House, and VICE. She is winner of the New York Public Library Young Lions Award, of FC2's Ronald Sukenick Innovative Fiction Prize, and a finalist for the PEN/Faulkner Award. 

  • Image: BijaRi, On the rooftops of Santa Domingo-Savio neighborhood as part of the project Contando con Nosotros, 2011

    Opening Reception 3-5pm /  Curator and Artist led walk-thru of the exhibition, 3pm  /  Free

  • Talking to Action

    Sep 17| Exhibition
    More

    Image: Eduardo Molinari, Confluencia 2: Los Angeles River, 2016.

    Talking to Action: Art, Pedagogy, and Activism in the Americas is an exhibition and bilingual publication that investigates contemporary, community-based social art practices in the Americas. Talking to Action is part of the Getty’s initiative Pacific Standard Time: LA/LA, a far-reaching and ambitious exploration of Latin American and Latino art in dialogue with Los Angeles.
     

  • Luis J. Rodriguez was Los Angeles Poet Laureate from 2014-2016. The twenty-fifth edition of his first book, Poems Across the Pavement, won a 2015 Paterson Award for Sustained Literary Achievement. He has written fourteen other books of poetry, children’s literature, fiction, and nonfiction, including the best-selling memoir Always Running: La Vida Loca: Gang Days in L.A. Rodriguez is also founding editor of Tia Chucha Press and co-founder of Tia Chucha’s Centro Cultural & Bookstore in the San Fernando Valley. In 2016 Tia Chucha Press produced the largest anthology of L.A.-area poets, Coiled Serpent: Poets Arising from the Cultural Quakes & Shifts of Los Angeles. Rodriguez’s last memoir It Calls You Back: An Odyssey Through Love, Addiction, Revolutions, and Healing was a finalist for the 2012 National Book Critics Circle Award. His latest poetry collection Borrowed Bones appeared in 2016 from Curbstone Books/Northwestern University Press.

  • Raised in Philadelphia, with roots in South Africa and Trinidad, Zinzi Clemmons’ writing has appeared in Zoetrope: All-Story, Transition, The Paris Review Daily, and elsewhere. She has received fellowships and support from the MacDowell Colony, Bread Loaf, the Fine Arts Work Center in Provincetown, and the Kimbilio Center for African American Fiction. She is co-founder and former Publisher of Apogee Journal, and a Contributing Editor to LitHub. She teaches literature and creative writing at the Colburn Conservatory and Occidental College. Her debut novel, What We Lose, as well as a second title, are forthcoming from Viking.

O-Tube

Computer Crimes Policy

Information technology plays an increasingly important role in determining the ultimate success of the College in the accomplishment of goals. It touches every academic discipline and administrative service provided by the College. Students encounter information systems and services from the moment they contact the College by telephone until their eligibility for graduation is computed and their degree awarded. Since basic computer literacy is a fundamental requirement, students invariably encounter computers in the classroom. Computer technology is increasingly used in all majors and programs. Actual techniques and systems used by professionals are simulated in the classroom as much as possible. In all aspects of education, Otis College is committed to excellence, and achieving excellence requires the increased use of technology. 

 
Legal Precedence and Definitions

Senate Bill 304 (Computer Crime) has been Chaptered (1076) and incorporated in the Penal Code and has a direct bearing on existing campus policy concerning appropriate use of computer resources. The legislation provides that ". . . a community college, state College, or academic institution accredited in this state is required to include computer-related crimes as a specific violation of college or College student conduct policies and regulations that may subject any student to specified disciplinary sanctions . . ." The Trustees have implemented this portion of the legislation by adding the following to Title 5, Section 41301 relating to Student Discipline:


(n) Engaging in any computer offenses listed in California Penal Code Section 502 on a computer system, computer network, or any data, software or programs owned, leased, or operated by a campus of Otis College.Penal Code Section 502 provides that it is a crime to knowingly access and without permission alter, damage, delete, destroy, or otherwise use any data, computer, computer system, or computer network in order to defraud, deceive, or extort, or wrongfully control or obtain money, property, or data, or to knowingly access and without permission take, copy, or make use of any data from a computer, computer system, or computer network, or to knowingly access and without permission add, alter, damage, delete, or destroy any data, software, or program, or to knowingly and without permission disrupt or cause the disruption of computer services, or to knowingly and without permission provide or assist in providing a means of accessing a computer, computer system, or network or introduce a computer contaminant.

Penal Code Section 502 also provides the following definitions of terms:

  1. Access means to gain entry to, instruct, or communicate with the logical, arithmetical, or   memory function resources of a computer, computer system, or computer network.
  2. Computer network means any system, which provides communications between one or more computer systems and input/output devices including, but not limited to, display terminals and printers connected by telecommunication facilities.
  3. Computer program or software means a set of instructions or statements, and related data, that when executed in actual or modified form, cause a computer, computer system, or computer network to perform specified functions.
  4. Computer services include, but are not limited to, computer time, data processing, or storage functions, or other uses of a computer, computer system, or computer network.
  5. Computer system means a device or collection of devices, including support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, one or more of which contain computer programs, electronic instructions, input data, and output data, that performs functions including, but not Limited to, logic, arithmetic, data storage and retrieval, communication and control.
  6. Data means a representation of information, knowledge, facts, concepts, computer software, computer programs or instructions. Data may be in any form, in storage media, or as stored in the memory of the computer in transit or presented on a display device.
  7. Supporting documentation includes, but is not limited to, all information, in any form, pertaining to the design, construction, classification, implementation, use, or modification of a computer, computer system, computer network, computer program, or computer software, which information is not generally available to the public and is necessary for the operation of a computer, computer system, computer network, computer program, or computer software.
  8. Injury means any alteration, deletion, damage, or destruction of a computer system, computer network, computer program, or data caused by the access.
  9. Victim expenditure means any expenditure reasonably and necessarily incurred by the owner or lessee to verify that a computer system, computer network, computer program, or data was or was not altered, deleted, damaged, or destroyed by the access.
  10. Computer contaminant means any set of computer instructions that are designed to modify, damage, destroy, record, or transmit information within a computer, computer system, or computer network without the intent or permission of the owner of the information. They include, but are not limited to, a group of computer instructions commonly called viruses or worms, which are self-replicating or self-propagating and are designed to contaminate other computer programs or computer data, consume computer resources, modify, destroy, record, or transmit data, or in some other fashion usurp the normal operation of the computer, computer system, or computer network.

Policy

It is illegal to knowingly access and without permission alter, copy, damage, delete, destroy or otherwise use any computer data, computer system or computer network in order to defraud, deceive, or extort, or wrongfully control or obtain money, property, software, or data or introduce a computer contaminant. Such activities could result in College disciplinary action, legal action, including fines and/or imprisonment, and/or victims of computer crime may bring civil suit for injury.


Any incident of suspected computer misuse as defined in this policy should be reported to the Public Safety Department. Offices which may be involved in the College's response to reported instances of computer misuse, in addition to Public Safety, include: Personnel and Employee Relations, Vice President for Academic Affairs, Vice President for Student Affairs, Vice President for Information Systems, and academic departments.

Otis College Ranked 6th in Nation by The Economist