Use of Technology Resources

Use of Technology Resources
College technology resources are to be used to advance Mount Marty College’s mission of education, scholarship and service. Faculty, students and staff may use these resources for purposes related to their studies or research, their teaching, the execution of their duties as College employees, their official business with or for the College, or other College-sanctioned activities in accordance with the College’s Acceptable Use (Appendix B). Mount Marty College encourages the use of technology resources for these primary activities. These resources include, but are not limited to, hardware (including telephones, computers, and traditional media equipment) either owned or leased by the College, software, and consulting time (and expertise) of the staff of Information Technology Services or other College technology support staff. Unless approved in advance by the Vice President and Dean for Academic Affairs, use of College technology resources for commercial purposes is prohibited.

The Mount Marty College campus computer network is intended to provide resources and internet services for educational use by enrolled students, faculty, and staff using college leased/owned computing equipment.

Accessing the Mount Marty College campus network using equipment not leased or owned by the college is expressly forbidden unless such access has been approved for the specific equipment in question by the ITSS Department.

If it is determined that the privilege of using networking resources is being abused by any individual, the ITSS Department reserves the right to limit or disable that user’s network access.

The use of technology resources provided by Mount Marty College for purposes not directly related to the primary activities indicated in the previous paragraph should be considered as secondary activities (i.e. personal or otherwise.) Should such secondary activity in any way interfere with primary activities, they may be terminated immediately.

Many Mount Marty College’s technology resources are shared amongst the entire College community. The use of these shall not violate law or the rights of others. Prohibited activities include, but are not limited to:

1. Activities that violate copyright or other intellectual property rights of others
2. Activities that obstruct usage or deny access to technology resources
3. Activities that could be considered as harassing, libelous or obscene
4. Activities that violate Mount Marty College’s policies
5. Activities that violate local, state or federal laws
6. Unauthorized use of computer accounts
7. Impersonating other individuals
8. Attempts to explore or exploit security provisions, either at Mount Marty College or elsewhere
9. Activities that invade the right to privacy of others
10. Destruction or alteration of data belonging to others
11. Creating, using or distributing computer viruses
12. Allowing other individuals to use your account/password
13. Disruption or unauthorized monitoring of electronic communications or of computer accounts
14. Academic dishonesty (e.g., plagiarism, cheating)
15. Inappropriate and/or widespread distribution of electronic communications (e.g. “spamming”)

Additionally, individuals may wish to use MMC-wide information systems including, but not limited to, the World Wide Web (www), the internet, intranet, and e-mail. Any person providing information through these resources or via connections to the data or telecommunications infrastructure shall also abide by the general policy statements herein. These policy statements apply to information made available actively, as in e-mail, as well as passively, as in the www.

Anonymous information is strictly prohibited. All publications shall contain the electronic mail address of the person making the information available. For example, active information such as e-mail must contain the e-mail address of the sender in the “From” field. Passive information, such as that found on the www, shall contain the e-mail address of the author, owner or sponsor at the bottom of the page.

All information shall carry a date indicating the date the information is being made available. For information made available actively, such as through e-mail, the date would appear in the “Date” field. For passive information, such as that found on the World Wide Web, the date should appear at the bottom of the page labeled as the posting date.