Use of Computer Facilities Policy for Students
APPENDIX Q:
Use of Computer Facilities Policy
GENERAL PRINCIPLES
Access to computer systems and networks, including the information placed on or distributed through these systems and networks, owned or operated by Roanoke College imposes certain responsibilities and obligations on the user and is granted subject to College policies and local, state, and federal laws.
Appropriate use always is ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals' rights to privacy and to freedom from intimidation, harassment, and unwarranted annoyance.
GUIDELINES
In making appropriate use of resources* you must:
- revise or remove material found to be in violation of these guidelines.
- comply with local, state, and federal laws for materials made available on the Internet.
- use copyrighted materials only with the prior approval by the copyright holder.
- use resources only for appropriate purposes, such as, but not limited to, assignments given by instructors, college related work, communication. Inappropriate use is described in the section below.
- protect your user id (user account) from unauthorized use. You are responsible for all activities on your user id.
- use only files and data that are your own, that are publicly available, or to which you have been given authorized access.
- use only legal versions of copyrighted software in compliance with vendor license requirements.
- be considerate in your use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, or wasting computer time, disk space, printer paper, manuals, or other resources.
In making appropriate use of resources you must NOT:
- use another person's user id and password at any time.
- allow another person to use your user account.
- access another person's files or data without permission.
- utilize computer programs to decode passwords or access control information.
- attempt to circumvent or subvert system security measures.
- engage in any activity that might be harmful to computers or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files.
- use College systems for partisan political purposes, such as using electronic mail to circulate advertising for political candidates.
- make or use illegal copies of copyrighted software or information, store such items on College systems, or transmit them over College networks.
- use College resources to harass, intimidate, or otherwise annoy another person, for example, by broadcasting unsolicited messages or sending unwanted mail.
- use College resources to create personal web pages containing (1) pornography or (2) abusive and/or profane language.
- waste computing resources, for example, by intentionally placing a program in an endless loop or by printing excessive amounts of paper.
- use the College's systems for personal gain, for example, by selling access to your user id or by performing work for profit in a manner not authorized by the College.
- engage in any other activity that does not comply with the General Principles presented above.
ENFORCEMENT
The College considers any violation of appropriate use principles or guidelines to be a serious offense and reserves the right to copy and examine, and remove any files or information resident on College systems allegedly related to inappropriate use. Students found in violation of these principles or guidelines may have some or all of their computer usage privileges suspended temporarily or permanently by the Director of Information Services.
The privilege of presenting material on the College web site can be revoked, with or without cause, at the College's discretion. Web pages found in non-compliance may be removed immediately by the Web Administrator or upon failure to revise web pages to conform with these guidelines.
Violators are also subject to disciplinary action or other sanctions as prescribed in The Student Handbook and Academic Integrity at Roanoke College. Offenders may also be prosecuted under laws including (but not limited to) the Privacy Protection Act of 1974, The Computer Fraud and Abuse Act of 1986, The Computer Virus Eradication Act of 1989, Interstate Transportation of Stolen Property, The Virginia Computer Crimes Act, Electronic Communications Privacy Act, and the Telecommunications Act of 1996.
Resources include, but are not limited to, workstations, printers and other computer systems, and College network and supporting systems.
ACCESS TO FILES ON COLLEGE INFORMATION SYSTEMS BY DESIGNATED IT STAFF
College policy allows system administrators to view any files, including e-mail messages, in the course of investigations under the following circumstances:
- When necessary to identify or diagnose systems or security vulnerabilities and problems, or otherwise preserve the integrity of the IT Systems; or
- When required by federal, state, or local law or administrative rules; or
- When there are reasonable grounds to believe that a violation of law or a significant breach of College policy may have taken place and access and inspection or monitoring may produce evidence related to the misconduct; or
- When such access to IT Systems is required to carry out essential business functions of the College; or
- When required to preserve public health and safety. System administrators have as part of their jobs the authorizing to do this and to treat any information on the systems as confidential.