Use of Technology Resources
College technology resources are to be used to advance Mount Marty College’s
mission of education, scholarship and service. Faculty, students and staff may
use these resources for purposes related to their studies or research, their
teaching, the execution of their duties as College employees, their official
business with or for the College, or other College-sanctioned activities in
accordance with the College’s Acceptable Use (Appendix B). Mount Marty College
encourages the use of technology resources for these primary activities. These
resources include, but are not limited to, hardware (including telephones,
computers, and traditional media equipment) either owned or leased by the
College, software, and consulting time (and expertise) of the staff of
Information Technology Services or other College technology support staff.
Unless approved in advance by the Vice President and Dean for Academic Affairs,
use of College technology resources for commercial purposes is prohibited.
The Mount Marty College campus computer network is intended to provide resources
and internet services for educational use by enrolled students, faculty, and
staff using college leased/owned computing equipment.
Accessing the Mount Marty College campus network using equipment not leased or
owned by the college is expressly forbidden unless such access has been approved
for the specific equipment in question by the ITSS Department.
If it is determined that the privilege of using networking resources is being
abused by any individual, the ITSS Department reserves the right to limit or
disable that user’s network access.
The use of technology resources provided by Mount Marty College for purposes not
directly related to the primary activities indicated in the previous paragraph
should be considered as secondary activities (i.e. personal or otherwise.)
Should such secondary activity in any way interfere with primary activities,
they may be terminated immediately.
Many Mount Marty College’s technology resources are shared amongst the entire
College community. The use of these shall not violate law or the rights of
others. Prohibited activities include, but are not limited to:
1. Activities that violate copyright or other intellectual property rights of
2. Activities that obstruct usage or deny access to technology resources
3. Activities that could be considered as harassing, libelous or obscene
4. Activities that violate Mount Marty College’s policies
5. Activities that violate local, state or federal laws
6. Unauthorized use of computer accounts
7. Impersonating other individuals
8. Attempts to explore or exploit security provisions, either at Mount Marty
College or elsewhere
9. Activities that invade the right to privacy of others
10. Destruction or alteration of data belonging to others
11. Creating, using or distributing computer viruses
12. Allowing other individuals to use your account/password
13. Disruption or unauthorized monitoring of electronic communications or of
14. Academic dishonesty (e.g., plagiarism, cheating)
15. Inappropriate and/or widespread distribution of electronic communications
Additionally, individuals may wish to use MMC-wide information systems
including, but not limited to, the World Wide Web (www), the internet, intranet,
and e-mail. Any person providing information through these resources or via
connections to the data or telecommunications infrastructure shall also abide by
the general policy statements herein. These policy statements apply to
information made available actively, as in e-mail, as well as passively, as in
Anonymous information is strictly prohibited. All publications shall contain the
electronic mail address of the person making the information available. For
example, active information such as e-mail must contain the e-mail address of
the sender in the “From” field. Passive information, such as that found on the
www, shall contain the e-mail address of the author, owner or sponsor at the
bottom of the page.
All information shall carry a date indicating the date the information is being
made available. For information made available actively, such as through e-mail,
the date would appear in the “Date” field. For passive information, such as that
found on the World Wide Web, the date should appear at the bottom of the page
labeled as the posting date.