Acceptable and Unacceptable Use

Because of the richness of the Internet and the College’s information technology resources, it is not possible to catalog exhaustively all acceptable and unacceptable uses. The lists below are meant to be illustrative. Employees and students should consult with their supervisors or classroom instructors, respectively, about the appropriateness of other uses. In free time areas, users should address questions to lab supervisors or other responsible parties.

In deciding what is and is not an acceptable use, there are two overriding principles: (1) the College’s information technology and telecommunication resources exist to support the College’s mission, and (2) the College is committed to ensuring a positive learning environment for all members of its community. Thus, all users are obliged to demonstrate civility in any and all exchanges and postings, including the content of Web pages, both official and unofficial. The College reserves the right to remove from its telecommunications networks any content judged to be racist, pornographic, cyber bullying, or designed to denigrate members of the College community.

Acceptable Use

  • Gathering and providing research material and data.
  • Analyzing research data.
  • Preparing course materials.
  • Completing class and homework assignments.
  • Enhancing coursework.
  • Enhancing educational approaches and teaching methods.
  • Obtaining and disseminating college related knowledge.
  • Developing and administering targeted demographic surveys.
  • Using WebAdvisor to register online for courses or to access information about one’s own academic performance.
  • Using Datatel’s Colleague or other institutional software within the scope of one’s normal duties

Unacceptable Use

  • Using the network for gambling, any other illegal activity, or any activity prohibited by the College’s acceptable use and related policies and procedures, including but not limited to violations of copyrights, software agreements and other contracts.
  • Using the College systems for commercial or profit-making purposes.
  • Altering system software or hacking in any form.
  • Gaining unauthorized access to resource entities, including use of others’ passwords.
  • Invading the privacy of individuals.
  • Posting anonymous messages.
  • Creating and displaying threatening, obscene, racist, sexist, or harassing material, including broadcasting unsolicited messages or sending unwanted mail.
  • Disobeying lab and system policies, procedures, and protocols (e.g., time limits on workstation usage).
  • Using the network in support of groups outside the College when such use is not in keeping with the mission of the College.
  • Creating and using individual Web pages not primarily focused on the mission of the College.
  • Using WebAdvisor to access information about someone other than oneself.
  • Accessing data or making use of data in Datatel’s Colleague or other administrative systems software not relevant to the scope of one’s job responsibilities.
  • Attaching any network devices not specifically authorized in writing by the Office of Information Technology.