This establishes guidelines and codes of conduct appropriate to the use of computer resources at Marygrove College.
Computing and networking resources are provided for Marygrove College students, faculty and staff (the college community) for a wide variety of purposes. These resources are limited, and how each individual uses them may impact the work of other members of the community and beyond, as our campus network is connected (through the Internet) to other networks worldwide. It is important that everyone using these resources be aware of what constitutes proper use and behavior.
The following guidelines are suggested behavior for the use of Marygrove computer resources.
- Marygrove College computer resources are provided for Marygrove College business, only
- The use of computing resources should be consistent with the instructional, research, communications or university related activities and objectives of the college
- Ownership of intellectual and creative property including data and ideas must be honored in accordance with the United States Copyright Act of 1976 and relevant state and federal laws
- Access to the Marygrove College computing network and the Internet is limited to members of the Marygrove College community
- Individuals within the college community are not permitted to provide privileged access to the campus network to those outside this designated community
- The college-computing network is not to be used for for-profit activities, or for private or financial gain
- Having access to a Marygrove College computer account means that you have general responsibility for the computing activity which takes place in that account. The college’s connection to the Internet does not allow you to abuse that connection. You are responsible for any files stored in your accounts, or for computing activity generated from those accounts.
The following are considered computer violations:
- Annoyance: Items such as electronic chain letters, games, bulk mailing of e-cards, jokes, etc. which can severely disrupt computing and network performance, may not be distributed
- Break-ins: An attempt to gain access to computer systems (on or off campus) for which one has not been granted access
- Forging, Password Sharing, Password Stealing: Attempts may not be made to impersonate another individual by sending forged information, such as e-mail
- Harassment: Computers can not be used to violate the standards of conduct established by Marygrove College. This includes using the computer to annoy, harass, terrify, intimidate, threaten, offend or bother another person by conveying obscene language, pictures, or other materials or threats of bodily harm to the recipient or the recipient’s immediate family
- Tampering: A deliberate attempt to disrupt the performance of a computer system or a network, on or off campus. This includes an attempt to "break" system security
- Virus: Intention release or creation of virus or computer program that could cause harm or destruction of another’s computer files. In addition, the College encourages responsible behavior and recommends scanning all executable programs. Virus scanning software is available on all machines on campus.
- Theft: By the copyright laws of the United States, and most other nations, virtually all information in computer files is copyrighted
- Violations of the acceptable usage policies of Marygrove’s Internet Service Providers
- Lab Environment – Each user has the right to a reasonably quiet environment in designated computing labs. Each user is expected to exercise good judgment regarding noise levels in considerations of others. Lab assistants and consultants are responsible for maintaining the appropriate environment
The following information is focused on the privacy of files and e-mail.
- Electronic mail is inherently insecure. Mail messages may be passed through many systems, which are not under the control of the college on the way to their destination. Messages may be intercepted and read by third parties during the process of delivery
- The content of e-mail or other files is generally considered confidential, and the system administrator will not look at user files unless requested by the user, a system problem requires it, a possible infraction of college policy, procedure, or the law requires investigation, or as otherwise required by law
- Marygrove College has possession of e-mail and other files. Review and/or disclosure of files may be required by the Freedom of Information Act and may be subject to release pursuant to a subpoena. The ability to retrieve specific mail that has been deleted varies with the location where the mail is stored and deletion is not guaranteed. Use of e-mail for confidential transmission is at the user’s risk, and the user should not assume that e-mail is private
Violations and Sanctions
Users who violate the policies outlined in this document and/or the code of student conduct are subject to sanctions. If a user is found in violation of a these policies, Technology Services will notify the appropriate supervisor (Vice President of Student Affairs for students) for suitable action. The supervisor must report back to Technology Services (and for employees, the Director of Human Resources) the remedy for the violation. Users should also be aware that they may be subject to prosecution according to Michigan Law and legal action by the owners and licensors of proprietary software for violation of copyright laws and licensing agreements
Policy adopted by Senior Staff 12/19/2000