Policy Statement on Use of Computer Accounts for Alumni

General Principles

Access to computer systems and networks, including the information placed on or distributed through these systems and networks, owned or operated by Roanoke College imposes certain responsibilities and obligations on the user and is granted subject to College policies and local, state, and federal laws.

Appropriate use always is ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals' rights to privacy and to freedom from intimidation, harassment, and unwarranted annoyance.

Guidelines

In making appropriate use of resources* you must:

  • protect your user id (user account) from unauthorized use. You are responsible for all activities on your user id.
  • access only files and data that are your own, that are publicly available, or to which you have been given authorized access.
  • use resources only for appropriate purposes, such as, but not limited to college related work and communication. Inappropriate use is described in the section below.
  • revise or remove material found to be in violation of these guidelines.
  • comply with local, state, and federal laws.
  • use copyrighted materials only with the prior approval by the copyright holder.

In making appropriate use of resources you must NOT:

  • use College resources to harass, intimidate, or otherwise annoy another person, for example, by broadcasting unsolicited messages or sending unwanted mail-including solicitations for products or service.
  • use the College's systems for personal gain, for example, by selling access to your user id or by performing work for profit in a manner not authorized by the College.
  • use computer programs to decode passwords or access control information.
  • allow another person to use your user account.
  • use another person's user id and password at any time.
  • use another person's files or data without permission.
  • attempt to circumvent or subvert system security measures.
  • engage in any activity that might be harmful to computers or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files.
  • use College systems for partisan political purposes, such as using electronic mail to circulate advertising for political candidates.
  • make or use illegal copies of copyrighted software or information, store such items on College systems, or transmit them over College networks.
  • engage in any other activity that does not comply with the General Principles presented above.

Enforcement

The College considers any violation of appropriate use principles or guidelines to be a serious offense and reserves the right to copy and examine, and remove any files or information resident on College systems allegedly related to inappropriate use. Alumni found in violation of these principles or guidelines may have some or all of their computer usage privileges suspended temporarily or permanently by the Director of Information Technology.

Offenders may be prosecuted under laws including (but not limited to) the Privacy Protection Act of 1974, The Computer Fraud and Abuse Act of 1986, The Computer Virus Eradication Act of 1989, Interstate Transportation of Stolen Property, The Virginia Computer Crimes Act, Electronic Communications Privacy Act, and the Telecommunications Act of 1996.

Access to Files on College Information Systems By System Administrators

College policy allows system administrators to view any files, including e-mail messages, in the course of investigations under the following circumstances:

  • When necessary to identify or diagnose systems or security vulnerabilities and problems, or otherwise preserve the integrity of the IT Systems; or
  • When required by federal, state, or local law or administrative rules; or
  • When there are reasonable grounds to believe that a violation of law or a significant breach of College policy may have taken place and access and inspection or monitoring may produce evidence related to the misconduct; or
  • When such access to IT Systems is required to carry out essential business functions of the College; or
  • When required to preserve public health and safety. System administrators have as part of their jobs the authorizing to do this and to treat any information on the systems as confidential.