Skip over navigation Accessibility and access key information Home page Search mac.edu Site map Employee directory Email the webmaster About MacMurray College Admission Academics Athletics Student/campus life Resources Alumni Giving

Computer Use Policy

Computing facilities are provided by MacMurray College to support and enhance the educational experience for every student as well as assist faculty and staff in professional activities according to the College's mission. Therefore, their misuse harms every member of the MacMurray College community. To this end, the Office of Information Technology staff encourages proper systems use and is open to suggestions of ways to improve operations.

Below are guidelines for proper usage of computing facilities at MacMurray College. This policy is not an exhaustive set of rules designed to cover every situation. No one should assume that any system use not specifically excluded by this policy is legitimate or that it will be treated as such. Anyone uncertain about what constitutes legitimate computer systems use should contact a member of the Office of Information Technology staff.

  1. The Office of Information Technology is the only authorized provider of computing network services on campus. Permission to administer new or additional network services is granted solely by the Office of Information Technology. Any unauthorized service may be disabled by whatever means are necessary without notice.
  2. Workstations and terminals should not be moved or relocated without express permission of the Office of Information Technology. Out-of-service equipment should be reported to the Office of Information Technology.
  3. Users should not install additional software on workstations and terminals without approval from the Office of Information Technology. Software will only be approved on a business-case basis.
  4. Computer resources and facilities are limited. Academic or course-related work is the highest priority. If another user is waiting to use equipment for a task more urgent than yours, please give way.
  5. Computer facilities and accounts are owned by the College and must only be used for purposes consistent with this policy.
  6. Users are responsible for any use made of their accounts or of material stored in their accounts. To avoid misuse, do not share your account information with anyone.
  7. Trying, by any means, to learn the username and/or password of another user, to access another's account, or trying to gain unauthorized privileges is a violation of this policy.
  8. MacMurray College is not responsible for personal files. Users should not place personal files within network resources like shared drives, and files stored locally on a computer should be removed or backed up by the owner to prevent unexpected loss.
  9. Users must not employ computing facilities to affect another's work, either on campus or off, intentionally or through reckless system use.
  10. Viewing or using files, programs, or data without authorization and copying, providing, receiving, or using copyrighted software in ways inconsistent with licensing agreements is an invasion of privacy. Users must realize that unauthorized access or use of computing resources may be a criminal or civil offense.
  11. Users must not bring food, drink, or tobacco into any computer lab.
  12. MacMurray College reserves the right to examine files generated by use of its computing system.
  13. MacMurray College reserves the right to limit or restrict any individual's use of the system.
  14. MacMurray College reserves the right to terminate unauthorized computing services or information services operated on MacMurray systems or equipment.

Violations of this policy are treated in the same way as other disciplinary infractions. Actions can result in disciplinary probation, expulsion, or, in extreme cases, legal action. MacMurray College disciplinary actions may be taken in addition to or regardless of the results of legal action. Users are obliged to notify faculty or Office of Information Technology staff of any instance of unethical computer use that comes to their attention. Failure to do so is an admission of shared responsibility for such actions and their results.

This policy is subject to change at any time. Any changes to this policy will be posted to this page.

This policy was last modified on July 16, 2013.