Computer Usage Policy of Salem Academy and College
This policy provides guidelines for and promotes the responsible and ethical use of the shared computing resources of Salem Academy and College. It is in the best interests of the community as a whole that computing resources be used in a manner which protects the equipment and the rights of all users.
This general policy applies to all computer and computer communication facilities owned, leased, operated, or contracted by Salem. This includes word processing equipment, microcomputers, minicomputers, mainframes and associated peripherals and software, regardless of whether used for administration, research, teaching, or other purposes. This policy also extends to any use of campus facilities to access computer facilities elsewhere.
Those responsible for campus computing facilities not administered by Information Technology, may have additional regulations consistent with this policy to control their use. System administrators are responsible for publicizing any additional regulations concerning the authorized and appropriate use of the equipment for which they are responsible.
As in all aspects of life, a user of computing facilities should act in a manner consistent with ordinary interpersonal and ethical obligations. Cheating, stealing, making false or deceiving statements, plagiarism, vandalism and harassment are just as wrong when done in the context of computing as they are in all other aspects of conduct. Individuals should use only those computing facilities they have been authorized through ordinary channels to use.
Specifically, but not exclusively, users should refrain from:
- Granting or attempting to gain unauthorized access to the computer on which students records reside
- Using the computer for commercial activities without prior written permissionUsing applications which affect bandwidth to the extent they inhibit or interfere with the use of the network by others are not permitted
- Chain letters, Spamming (the sending of mass unsolicited e-mail either off-campus or to Salem Academy and College addresses), and the transmission of extremely large files may be considered interference.
- Using the computer access privileges of others, or giving lab combinations and/or modem numbers to other users, admitting users who are not students, faculty or staff
- Accessing, copying, or modifying the files of others without their explicit written permission
- Illegal use of any kind, including the illegal copying of licensed software, texts, or music. This includes making copies of commercial applications and the sharing and downloading of music files. Not only are these practices illegal, but they also expose Salem to potential virus infections since illegal sites are not necessarily monitored for virus activity
- Interfering with the normal operation of computing systems or the legitimate use of computing facilities by authorized users
- Violating the restrictions for computing systems they use, on- or off-campus
- Attempting to subvert the restrictions associated with campus computing facilities
- Using electronic media to harass or threaten others, either on or off campus, in any way
- Connecting network devices or running network services on any PC. Network devices such as hubs and wireless access points should not be installed on a network as they can disrupt regular network traffic. Additionally, PCs should not be set up to share files with others. This could be construed as illegal file sharing and also potentially exposes your personal files to others (including hackers).
- Take reasonable measures to protect your account information, lab combinations, and any other information related to access to Salem data resources.
- Use best practices for securing their computer accounts:
- Use strong passwords, i.e., passwords that are at least eight characters long and contain upper-case, lower-case, and numeric characters
- Avoid passwords that are the same as your login name, first or last name, or any word that would be easy to guess
- Remember your password, do not write it down
- Lock your workstation if you are going to leave it for longer than a few minutes
- Utilize current anti-virus software. Anti-Spyware is also recommended. This is extremely important since an infected computer not only has a negative impact on the performance of the PC, you may lose important data, it might also affect the performance of our network and affect other institutions if the virus generates large volumes of Email
Reasonable suspicion of a violation of the principles or practices described in this policy statement may result in disciplinary action. Such action will be taken through appropriate Academy and College channels such as administrative procedures, the Honor Cabinet, or other supervisory authority to which the individual is subject. Violation of local, State or Federal statutes may result in civil or criminal proceedings.
With due regard for the right of privacy of users and the confidentiality of their data, system administrators have the right to suspend or modify computer access privileges, examine files, passwords, accounting information, printouts, tapes and any other material that may aid in maintaining the integrity and efficient operation of the system. Users whose activity is viewed as a threat to the operation of a computing system, who abuse the rights of other users or who refuse to cease improper behavior may have, at the very least, their user privileges revoked. In the event that access to a system is revoked, users will be provided a copy of their files.
Computer Lab Use Agreement
It is the view of the Computing Services staff and the Information Technology Advisory Council that the following rules and guidelines promote the good of the student computing community, and in the spirit of the total Salem community.
I understand that the computer labs at Salem College belong to the College and are made available only to students, faculty, and staff.
I understand that using the labs is a privilege.
I agree to practice proper computer and Internet etiquette and to abide by the following rules governing lab use:
1) No food or drinks may be brought into the labs
2) No tobacco products in the labs
3) Class-related work takes precedence over ANY other use of the computers
4) Only one login per person to a computer at a time is allowed
5) The entry code to lab doors may not be given to anyone else. The door to the lab shall be kept closed. The door may not be opened by someone inside the lab to admit someone who does not have the combination
6) No activity that creates an environment not conducive to studying - i.e. loud talking, music or the use of cell phones