Computer Use Policy
This policy applies to all computing equipment, networks, network connections, software, and services provided, maintained, or operated by the Office of Information Technology for MacMurray College. In short, it applies to all MacMurray computing facilities and services. The Office of Information Technology is the only authorized provider of computing network services on campus. Permission to administer new or additional network services is granted solely by the Office of Information Technology. Any unauthorized service may be disabled by whatever means are necessary without notice.
Computing facilities are provided by MacMurray to support and enhance the educational experience for every student. They also are intended to assist the faculty's professional activities and to provide administrative support for MacMurray. Therefore, their misuse harms every member of the MacMurray College community. Since everyone benefits from efficient system management, the Office of Information Technology staff encourages suggestions of ways to improve operations.
Each user is responsible for his or her actions as well as for the results of those actions. This policy is not an exhaustive set of rules designed to cover every situation. Rather, it is a guide to help individuals define ethical, professional computing system use. No one should assume that any system use not specifically excluded by this policy is legitimate or that it will be treated as such. Any use outside the purposes for which the computing facilities are provided or that endangers or degrades their use or has the potential to do so, is contrary to this policy. For instance, individual or class accounts cannot be used for activities such as summer employment or consulting for profit.
All MacMurray students should be familiar with the standards of conduct that are printed in the student handbook, The Maggie .
Anyone uncertain about what constitutes legitimate computer system use should contact a member of the Office of Information Technology staff through the Help Desk.
- Computer facilities and accounts are owned by the College and must only be used for purposes consistent with these guidelines. Individuals are responsible for any use made of their accounts or of material stored in their accounts. Therefore, they must not give their ID or password to others or store sensitive unprotected files in their accounts. This implies that they should select passwords that are not easily deciphered, change passwords regularly, and use file protection features to prevent unauthorized use. Trying, by any means, to learn the ID and/or password of another user, to access another's account, or trying to gain unauthorized privileges are not ethical system uses.
- Users must not employ computing facilities to affect another's work, either on campus or off, intentionally or through reckless system use. This includes sending or making accessible offensive, annoying, or harassing material; loading software or data from untrustworthy sources without checking for viruses; installing or creating viruses on the MacMurray College computing system; sending messages or programs designed to degrade system performance for another; game playing; damaging or violating others' data, programs, or files; seeking to gain the use of excessive system resources or unauthorized privileges; altering public files or modifying systems or software without authorization; accessing, copying or altering private files; sending messages, files or information that purport to come from others; and interfering with the management or operation of computing facilities.
- MacMurray College endorses the statement of Software and Intellectual Rights developed by EDUCOM:
"Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media. It encompasses respect for the right to acknowledgment, right to privacy, and right to determine the form, manner, and terms of publication and distribution."
"Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access and trade secret and copyright violations, may be grounds for sanctions against members of the academic community."
Each user is responsible for his or her actions as well as for the results of those actions.
Viewing or using files, programs or data without authorization is an invasion of privacy, even if that material appears to be legally and/or electronically unprotected. So also is copying, providing, receiving or using copyrighted software in ways inconsistent with licensing agreements. Users must realize that unauthorized access or use of computing resources may be a criminal or civil offense.
- Electronic communications such as email services must be used only for purposes consistent with these general guidelines. Fraudulent, harassing or obscene messages and/or materials, and chain letters must not be sent, forwarded or stored. Users must be aware that email is not private or secure. While the College does not censor or edit messages, any individual who authors, stores, or forwards messages is responsible for their subsequent use and distribution. Users must be aware that writing, storing, or distributing some material may violate State and/or Federal laws that govern pornography and sexual harassment.
- Computer resources and facilities are limited. Therefore, every user must employ them wisely. If another is waiting to use equipment for a task more urgent than yours, please give way. Users should not run excessive copies of class materials and should rarely use College facilities to print non-class related materials. Announcements for campus organizations and activities should be reproduced through the web sites or by Xeroxing, not through the College's computing facilities. Network connections are not to be used to play games on remote computer facilities or for those at remote facilities to play games on MacMurray facilities. Since network resources must serve everyone, unauthorized or excessive use of network capacity cannot be tolerated.
- Workstations and terminals should not be moved or relocated without express permission of the Office of Information Technology. Out-of-service equipment should be reported to the Office of Information Technology. Under no circumstances should a user attempt to repair such facilities.
- Computer users must not bring food or drink into any computer lab; nor should they use tobacco in any lab.
- Use of the computer facilities for entertainment, such as chatting or casual Web browsing should not be done during time of heavy lab use. Academic or course-related work is the highest priority; the next is serious individual productive work; last is use of the computer facilities for entertainment.
MacMurray College reserves the right to examine files, accounting information, and backups generated by use of its computing system. Normally, a user will be notified and invited to be present when the examination is made. However, examination may be made without notification in cases the Office of Information Technology deems to threaten system integrity or to constitute illegal activity.
MacMurray College also reserves the right, without notice, to limit or restrict any individual's use of the system; to copy, remove, or otherwise alter data, files or systems resources which may undermine system use; to audit any emails created on the MacMurray College computing system whether on campus or from a remote site; and to otherwise protect its computing facilities. MacMurray disclaims any responsibility for data loss or interference with files resulting from its efforts to maintain the privacy and security of its computing facilities. Any individual who receives a message that his or her access has been suspended should immediately contact a member of the Office of Information Technology staff.
MacMurray College also reserves the right, without notice, to terminate unauthorized computing services or information services operated on MacMurray systems or equipment for users whether on or off campus. Such services violate this policy and appropriate disciplinary and/or legal action will be taken.
Violations of this policy are treated in the same way as other disciplinary infractions. Normally, a violation first will be discussed with the individual involved. Then, if necessary, it will be referred to the Judicial Officer for consideration and action in accordance with the disciplinary policy of MacMurray. Actions can result in disciplinary probation, expulsion or, in extreme cases, legal action. MacMurray disciplinary actions may be taken in addition to or regardless of the results of legal action. Users are obliged to notify faculty, Office of Student Life staff, or Office of Information Technology staff of any instance of unethical computer use that comes to their attention. Failure to do so is an admission of shared responsibility for such actions and their results. The longer the violations of ethical computer use continue, the more harm they do to the MacMurray College community.