Acceptable Use of Technology Resources

Hendrix College, Technology Services
Policy # 12001
Effective: Monday, April 18, 2022

 The Acceptable Use Policy is intended to describe the appropriate use of access to the Hendrix College network and other technology, including desktop and portable computer systems, fax machines, Internet and World Wide Web access, telephones, voicemail, electronic mail (e-mail), electronic bulletin boards, and networks.

Additional Authority

This Policy applies to all faculty, staff, students, any third-parties contracted by the College, and any other individual or group authorized to access College information systems that store, transmit, or process institutional data.

Responsible Party

Vice-president of Technology Services/CIO

1. Statement

Technology resources at Hendrix College - including desktop and portable computer systems, fax machines, Internet and World Wide Web access, telephones, voicemail, electronic mail (e-mail), electronic bulletin boards, networks, and its intranet - are available to authorized students, faculty, staff, and off-campus constituents. Access to these resources is requested from the Office of Technology Services.

Access is granted with the understanding that the resources will be used as stated in the request and will comply with acceptable use as defined in this policy. 

Acceptable use should always be legal and ethical.  It should demonstrate respect for intellectual property; ownership of data; system security mechanisms; and individuals' rights to privacy, freedom of speech, and freedom from intimidation, harassment, and unwarranted annoyance.  These guidelines are intended to supplement, not replace, all existing laws, regulations, agreements, and contracts which currently apply to use of these resources. The College is not responsible for unacceptable or unethical use of technology resources

2. Acceptable Use

Acceptable use of technology resources include:

  • instruction;
  • independent study;
  • authorized research;
  • independent research;
  • and official work of the offices, units, recognized student and campus organizations, and other agencies of the College.
  • other use of Hendrix-owned or operated technology resources that support the education, research, and service mission of the College, and is also consistent with this policy.

Authorized users are:

  • Faculty, staff, and students.
  • Anyone connecting from a public information service.
  • Others whose access furthers the mission of the College and whose usage does not interfere with other users' access to resources.

In addition, a user must be specifically authorized to use a particular technology resource by the college unit responsible for operating the resource.

All acceptable use of technology resources must conform with: existing College policies, guidelines, and codes of conduct; and existing local, state and federal laws.

Therefore, any misuse or violation of this acceptable use policy will be judged in accordance with those published policies and rules of conduct, including, but not limited to, the Hendrix College Student Handbook, Faculty Handbook , Staff Handbook and local, state and federal laws.

It is your responsibility to be aware of the potential for and possible effects of manipulating information, especially in electronic form, to understand the changeable nature of electronically stored information, and to continuously verify the integrity and completeness of information that you compile or use. You are responsible for the security and integrity of College information stored on your individual computing desktop system.


Users have responsibilities as members of the Hendrix College electronic community. These responsibilities include:

  • Respecting individuals' rights to privacy and freedom from intimidation, harassment, and unwarranted annoyance.
  • Respecting copyright and other intellectual property rights. Unauthorized copying of files or passwords belonging to others may constitute plagiarism or theft. Modifying files without authorization (including altering information, introducing viruses or Trojan horses, or damaging files) is unethical, may be illegal, and may lead to sanctions.
  • Maintaining secure passwords.
  • Using resources efficiently.
  • Recognizing the limitation to privacy afforded by electronic services.
  • Learning to use software and information files correctly. Users should maintain and archive backup copies of important work.
  • Abiding by security restrictions on all systems and information to which access is permitted. Users should not attempt to evade, disable, or "crack" passwords or other security provisions; these activities threaten the work of others and are grounds for immediate suspension or termination of privileges and possible further sanctions.


The following behavior will be considered to be misuse or unacceptable use of technology resources at Hendrix College:

  • Intentionally interfering with the normal operation of technology resources at Hendrix or on any network accessible from computer equipment at Hendrix.
  • Excessive use of technology resources, including ignoring posted workstation time limits, using more than one workstation at a time, playing games on workstations when they are needed for College-related assignments, or similar activities.
  • Attempting to access without authorization, discover the password, or otherwise circumvent the security of computer systems, accounts or files at Hendrix on any network accessible from computer equipment at Hendrix.
  • Using computer resources for personal profit-making activities not related to the mission of the College.
  • Using electronic mail or other forms of computer-based communication to impersonate, deceive, or defraud another user, or to send messages which are harassing, abusive, or obscene.
  • Using or copying computer software or any other copyrighted material (such as music, movies, etc.) in a manner which violates U.S. copyright laws or Software vendor licenses. 
  • Unauthorized distribution of copyrighted materials is illegal and exposes you to civil and criminal penalties.
  • Using computer resources to copy and plagiarize the intellectual output (programs, written assignments, etc.) of other persons.
  • Using computer resources to violate any state, federal, or international laws, or the published policies of other host institutions or networks.
  • Using computer resources in a manner inconsistent with the "Hendrix Standards of Conduct" as published in the Hendrix Student Handbook.

Unacceptable use could result in termination of access to the technology resource, and could result in action being taken against the offender of this policy, including termination of employment or suspension or expulsion from school.

The Office of Technology Services should be contacted for clarification of these guidelines or to report guideline violations.

Whenever there is an indication of abuse of the user's privilege which interferes with the intended functions of the system, or impinges on another user's rights, or is an otherwise unacceptable use of the technology resource, the Office of Technology Services reserves the right to investigate and implement those actions deemed necessary to protect the system and/or other users.

It is the responsibility of all users to report to the Office of Technology Services any violation of these policies.

Any specific policies that exist or are developed relating to use of any technology resources are considered part of this policy.


Date Change