Last Updated: Friday, August 10, 2012
found this helpful.
Computer resources at Hendrix College are available to authorized students, faculty, staff, and off-campus constituents. Access to these resources is obtained from the Director of Information Technology. Access is granted with the understanding that the resources will be used as stated in the request and in keeping with the idea that one's interest ceases when it invades the rights of personal and/or institutional property, demonstrates a potential for loss, creates the possibility for embarrassment or litigation to the individual and/or institution or because of an otherwise irresponsible use of a limited resource. It is the policy of the Office of Information Technology to avail these resources to as many users as possible and, to the extent possible, keep the number of restraints and restrictions on the individuals to a minimum consistent with the ability to provide service to all who request use.
For such a policy to work, it is essential that users observe responsible and ethical behavior in the use of the resources. Proper computing and networking use follows the same standards of common sense and courtesy that govern use of other public facilities. Improper use violates those standards. Improper use is defined as: Any use of computing and/or networking facilities or services that is unrelated to legitimate instructional, research/creative activity, or administrative requirements; that interferes with another's legitimate access; that violates another's intellectual property rights; and/or that violates any local, state, or federal law.
Users have responsibilities as members of the Hendrix College electronic community. These responsibilities include:
- Respecting individuals’ rights to privacy and freedom from intimidation, harassment, and unwarranted annoyance.
- Respecting copyright and other intellectual property rights. Unauthorized copying of files or passwords belonging to others may constitute plagiarism or theft. Modifying files without authorization (including altering information, introducing viruses or Trojan horses, or damaging files) is unethical, may be illegal, and may lead to sanctions.
- Maintaining secure passwords.
- Using resources efficiently.
- Recognizing the limitation to privacy afforded by electronic services.
- Learning to use software and information files correctly. Users should maintain and archive backup copies of important work.
- Abiding by security restrictions on all systems and information to which access is permitted. Users should not attempt to evade, disable, or "crack" passwords or other security provisions; these activities threaten the work of others and are grounds for immediate suspension or termination of privileges and possible further sanctions.
Violations of the Terms of Usage
The following behavior will be considered to be misuse or inappropriate use of computing resources at Hendrix College:
- Intentionally interfering with the normal operation of computer resources at Hendrix or on any network accessible from computer equipment at Hendrix.
- Excessive use of computer resources, including ignoring posted workstation time limits, using more than one workstation at a time, playing games on workstations when they are needed for College-related assignments, or similar activities.
- Attempting to access without authorization, discover the password, or otherwise circumvent the security of computer systems, accounts or files at Hendrix on any network accessible from computer equipment at Hendrix.
- Using computer resources for personal profit-making activities not related to the mission of the College.
Using electronic mail or other forms of computer-based communication to impersonate, deceive, or defraud another user, or to send messages which are harassing, abusive, or obscene.
- Using or copying computer softwareor any other copyrighted material (such as music, movies, etc.) in a manner which violates U.S. copyright laws or Software vendor licenses.
- Unauthorized distribution of copyrighted materials is illegal and exposes you to civil and criminal penalties.
- Using computer resources to copy and plagiarize the intellectual output (programs, written assignments, etc.) of other persons.
- Using computer resources to violate any state, federal, or international laws, or the published policies of other host institutions or networks.
- Using computer resources in a manner inconsistent with the "Hendrix Standards of Conduct" as published in the Hendrix Student Handbook.
- The Office of Information Technology should be contacted for clarification of these guidelines or to report guideline violations.
It is the responsibility of all users to report to the Office of Information Technology any violation of the Code of Computer Resource Use.
The Code is posted in a prominent location in all Hendrix College computer laboratories. Failure to comply with the Code will subject the violator to appropriate disciplinary action. Whenever there is an indication of abuse of the user's privilege which interferes with the intended functions of the system, or impinges on another user's rights, or is an otherwise irresponsible use of the computer resource, the Office of Information Technology reserves the right to investigate and implement those actions deemed necessary to protect the system and/or other users. Such an investigation will require prior authorization from the appropriate Hendrix College offices: for students, the Vice President for Student Development; for faculty, the Vice President for Academic Affairs; and for staff, the supervisor of the staff member.