The Key: Student Handbook, 2017

Page 104

RULES GOVERNING STUDENT LIFE

It should be noted that system administrators of various on-campus and off-campus computing resources and those responsible for access to those facilities may promulgate additional regulations to control their use, if not inconsistent with this policy. System administrators are responsible for publicizing any additional regulations concerning the authorized and appropriate use of the equipment for which they are responsible. RESPONSIBILITIES As in all aspects of the College community, a user of computing resources should act honorably and in a manner consistent with ordinary ethical obligations. Cheating, stealing, making false or deceiving statements, plagiarism, vandalism, and harassment are just as wrong when done in the context of computing as they are in all other aspects of College conduct. Individuals should use only those computing resources they have been authorized through ordinary channels to use. They should use these facilities: • In a manner consistent with the terms under which they were granted access to them • In a way that respects the rights and privacy of other users • So as not to interfere with or violate the normal, appropriate use of these resources and • In a responsible and efficient manner. College computing resources are not to be used for commercial purposes or non-Collegerelated activities without prior written permission from appropriate College officials. Individuals should respect the rights and privacy of other authorized users. Thus they should respect the rights of other users to security of files, confidentiality of data, and the ownership of their own work. Users should refrain from: • Using the computer access privileges of others • Accessing, copying, or modifying the files of others without their explicit written permission • Any activity which violates local, state, or federal statute, and • Sending harassing or libelous electronic messages. ELEMENTS All users must agree to, and abide by, the Appropriate Use of Electronic Resources Policy of Hampden-Sydney College. “User” is defined as

103

any individual with authorized access to College computing and communications systems (data/ telecommunications network). • The User is responsible for being the sole beneficiary of electronic access to which he/ she has been explicitly assigned (your email or web account, for example). • The User agrees never to grant/authorize access to his/her explicitly assigned electronic access (no sharing of accounts or passwords). • The User may not be paid, or otherwise profit, from the use of any College-provided computing resource or from any output produced from it. Further, the User may not promote any commercial activity using College resources. Commercial activities include, but are not limited to: advertisements, chain letters, and electronic commerce (Example: You cannot use the network connection in your residence hall or office to run or promote a business). Exceptions are made for single-item “For Sale” advertisements which may be of interest to the College community. • College-owned computing resources may not be used for any activities that violate local, state, or federal statute (see “Enforcement” below). • The User agrees to obtain written permission from photographed individuals prior to posting those images to sites within the hsc. edu domain. • The User agrees to abide by official copyright policy of the College. ABUSE OF CAMPUS TELEPHONE/ TELECOMMUNICATIONS SYSTEM Gaining access to any other person’s telephone/voice mail, denying any other person(s) access to their telephone/voice mail, and the like, are violations of the Code of Student Conduct, as is sending lewd, obscene, threatening, or other inappropriate messages through the telephonetelecommunications system. Simply put, a student should use only his own telephone-voice mail system. ENFORCEMENT John B. Fuqua Computing Center consistently strives to enable users to employ technological resources in pursuit of fulfilling the College’s overall mission. Additionally, the Computing Center bears the responsibility of protecting the privacy of


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.