Use of College information technology resources is permitted based on acceptance of the following specific responsibilities and the understanding that computer use may be monitored.
Use only information technology resources for which you have permission. Example: It is unacceptable to…
- use resources you have not been specifically authorized to use;
- use your own personal computer, laptop, or any other device to connect to the network with a wired connection. (access to the Wallace network with a personal device through the appropriate wireless portal is permitted);
- use someone else’s account and password or share your account and password with someone else;
- access files, data, or processes without authorization; and
- purposely seek out, exploit, or seek to exploit security flaws to gain system or data access.
Use information technology resources only for their intended purpose. Example: It is unacceptable to…
- send forged e-mail;
- use electronic resources to harass or stalk other individuals;
- send bomb threats or hoax messages;
- send chain letters that may interfere with the system’s efficiency;
- intercept or monitor any network communications not intended for you;
- use computing or network resources for commercial advertising or other commercial purposes;
- attempt to circumvent security mechanisms;
- use privileged access for other than official duties;
- use former privileges after graduation, transfer, or termination; and
- use network resources to download news, music, graphics, or other communications not related to College activities.
Protect the access and integrity of information technology resources. Example: It is unacceptable to…
- knowingly release a virus that damages or harms a system or network;
- prevent others from accessing an authorized service;
- attempt to deliberately degrade performance or deny service;
- corrupt or misuse information;
- alter or destroy information without authorization; and
- engage in spamming (sending an annoying or unnecessary message to a large group of people).
Respect the privacy of others. Example: It is unacceptable to…
- access or attempt to access another individual’s password or data without explicit authorization;
- access or copy another user’s electronic mail, data, programs, or other files without permission;
- use obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful language;
- continue sending e-mail messages to someone after being told to stop; and
- post derogatory information or statements about a person.
Abide by applicable laws and College policies and respect the copyrights and intellectual property rights of others, including the legal use of copyrighted software. Example: It is unacceptable to…
- illegally upload or download copyrighted music, movies, software, etc.;
- make more copies of licensed software other than the license allows;
- plagiarize works that you find on the Internet; and
- deliberately upload, download, distribute, or possess pornographic material.