Computer Resources Use Protocol

Purpose

Access to computing resources is intended to provide members of the College community support for education, research, and necessary administrative activities. Use of the campus computing resources must be consistent with the purpose and the mission of the College. Campus computer systems are not intended for personal gain or profit.

Accessibility

All web pages hosted on College web servers must comply with standards for accessibility by persons with disabilities as required by local, state, or federal law or regulation.

Ethical Use of Computers

All users of College computing resources must respect the rights of other computing users, the integrity of the physical facilities and controls, and all pertinent license and contractual agreements. All use of resources shall be consistent with College policies and procedures and with all applicable federal, state, and local laws.

Acceptable Uses of Resources

The following are examples of acceptable and unacceptable uses of computing resources, including, but not limited to, email, all campus networks, and the Internet. This listing is not intended to be inclusive.

Examples of acceptable uses

  • Activities promoting educational collaboration and information sharing
  • Research and collaboration by students and faculty related to course work
  • Communication with scholars and educators in connection with teaching and research
  • Grant administration and application
  • Involvement in professional organizations related to the user鈥檚 teaching, research, or professional activities

Examples of unacceptable uses

  • Engaging in any illegal activity
  • Commercial profit-making activities or advertising
  • Sending chain letters
  • Engagement in an activity intended to affect network performance or cause congestion of the network
  • Malicious use
  • Using another person's username/password, with or without consent
  • Using electronic communications to forge an academic document
  • Using electronic communications to steal another individual鈥檚 work or otherwise misrepresent one鈥檚 own work
  • Forging, fraudulently altering, or willfully falsifying Email headers or electronic information generated as,
  • maintained as, or otherwise identified as College records in support of electronic communications
  • Intentional introduction of a computer 鈥淰irus鈥 or other disruptive/destructive program into the system

Privacy

Each user account is protected from unauthorized access by requiring the use of a unique password to identify the legitimate user. No user will snoop, hack, or be involved in any other actions interfering with the privacy of others. Users must abide by the system鈥檚 security mechanisms in a manner that preserves the privacy of themselves and others. The College will make all reasonable attempts to maintain the integrity of the system, however, it shall not be held liable for intentional invasions by others. Although information passing over the College network or stored in user accounts may be accessed by system personnel for purposes of network management, the content of files and transmissions will not be viewed, monitored, or altered without the express consent of the user, except in those cases where the College has reasonable cause to believe that an account or system is being used by other than an authorized user or is being used in violation of applicable federal, state, or local law or of College procedures, protocols, or policy.

Piracy

The copying of copyrighted materials (including incorporation into or attachment to an electronic work product), whether from software, hard copy, or otherwise, is prohibited without the express written consent of the copyright owner. Unlicensed software may not be installed on College equipment. Local-regional-internet network use

The College鈥檚 computer resources include an electronic network of computers linked together via a complex system of electronic components, computers, cabling, and information. These systems are also joined to the outside world via external networks including SUNYNet, NYSERNET, and the INTERNET.

Users of these resources are bound by the College鈥檚 policies and the policies of the aforementioned networks. Copies of applicable use policies will be available in the Campus Technology Office (201) and the library.