Computer resources at Hendrix College are available to authorized students, faculty, staff, and off-campus constituents. Access to these resources is obtained from the Director of Technology Services. Access is granted with the understanding that the resources will be used as stated in the request and in keeping with the idea that one’s interest ceases when it invades the rights of personal and/or institutional property, demonstrates a potential for loss, creates the possibility for embarrassment or litigation to the individual and/or institution, or because of an otherwise irresponsible use of a limited resource. It is the policy of the Office of Technology Services to avail these resources to as many users as possible and, to the extent possible, keep the number of restraints and restrictions on the individuals to a minimum consistent with the ability to provide service to all who request use.
For such a policy to work, it is essential that users observe responsible and ethical behavior in the use of the resources. Proper computing and networking use follows the same standards of common sense and courtesy that govern the use of other public facilities. Improper use violates those standards. Improper use is defined as: Any use of computing and/or networking facilities or services that is unrelated to legitimate instructional, research/creative activity, or administrative requirements; that interferes with another’s legitimate access; that violates another’s intellectual property rights; and/or that violates any local, state, or federal law.
Users have responsibilities as members of the Hendrix College electronic community. These responsibilities include:
•Respecting an individual’s right to privacy and freedom from intimidation, harassment, and unwarranted annoyance;
•Respecting copyright and other intellectual property rights. Unauthorized copying of files or passwords belonging to others may constitute plagiarism or theft. Modifying files without authorization (including altering information, introducing viruses or Trojan horses, or damaging files) is unethical, may be illegal, and may lead to sanctions;
•Maintaining secure passwords;
•Using resources efficiently;
•Recognizing the limitation to privacy afforded by electronic services;
•Learning to use software and information files correctly. Users should maintain and archive backup copies of important work;
•Abiding by security restrictions on all systems and information to which access is permitted. Users should not attempt to evade, disable, or "crack" passwords or other security provisions; these activities threaten the work of others and are grounds for immediate suspension or termination of privileges and possible further sanctions.
The following behavior will be considered to be misuse or inappropriate use of computing resources at Hendrix College:
•Intentionally interfering with the normal operation of computer resources at Hendrix or on any network accessible from computer equipment at Hendrix;
•Excessive use of computer resources, including ignoring posted workstation time limits, using more than one workstation at a time, playing games on workstations when they are needed for College-related assignments or similar activities;
•Attempting to access without authorization, discover the password, or otherwise circumvent the security of computer systems, accounts or files at Hendrix on any network accessible from computer equipment at Hendrix;
•Using computer resources for personal profit making activities not related to the mission of the College;
•Using electronic mail or other forms of computer-based communication to impersonate, deceive, or defraud another user, or to send messages which are harassing, abusive, or obscene;
•Using or copying computer software in a manner, which violates U.S. copyright laws or Software vendor licenses;
•Using computer resources to copy and plagiarize the intellectual output (programs, written assignments, etc.) of other persons;
•Using computer resources to violate any state, federal, or international laws, or the published policies of other host institutions or networks;
•Using computer resources in a manner inconsistent with the "Hendrix Standards of Conduct" as published in the Hendrix Student Handbook.
The Office of Technology Services should be contacted for clarification of these guidelines or to report guideline violations.
It is the responsibility of all users to report to the Office of Technology Services any violation of the Code of Computer Resource Use.
The Code is posted in a prominent location in all Hendrix College computer laboratories. Failure to comply with the Code will subject the violator to appropriate conduct action. Whenever there is an indication of abuse of the user’s privilege that interferes with the intended functions of the system, or impinges on another user’s rights, or is an otherwise irresponsible use of the computer resource, the Office of Technology Services reserves the right to investigate and implement those actions deemed necessary to protect the system and/or other users. Such an investigation will require prior authorization from the appropriate Hendrix College offices: for students, the Vice President for Student Affairs; for faculty, the Vice President for Academic Affairs; and for staff, the supervisor of the staff member.
Technology Services manages the Acxiom Computer Center, located in the Jennings L. Snoddy wing of the Bailey Library and the Othaout Technology Center (OTC) in the Student Life and Technology Center. The Acxiom Computer Center houses 40 computers, a digital scanner, and two laser printers. The lab is open 24 hours a day, seven days a week. The OTC houses 30 computers and allows you access to color printing, 3D printing, and poster printing.
Other open computer labs on campus are provided by Natural Sciences (Reynolds Hall, 12 Power Macintosh computers) and Economics and Business (Mills Building, seven systems running Microsoft Windows). Numerous other computer labs are located in departments on campus and are available for students taking classes in that department.
Students can have internet access from their residence hall rooms 24 hours a day, as well as the 24-hour access from the Bailey Library Lab. The internet can be accessed through any device connected to the Hendrix College network.
Wireless connectivity is available in all residence halls, classroom buildings and most outdoor spaces on campus to any wireless device that supports the WPA2 encryption (sorry, most gaming consoles cannot be connected to our wireless network).
PUBLIC ACCESS CATALOG (PAC)
The Hendrix Library has automated its card catalog and circulation systems. Users of the PAC system can search for specific materials by author, subject, title, date, and/or key word and determine if the materials are currently available. PAC is available on the Hendrix College Network.