ACCEPTABLE USE OF INFORMATION TECHNOLOGY RESOURCES
Information technology resources are central to the educational mission of Colorado College. All CC students, faculty, and staff members are encouraged to use these resources, provided that they respect the rights of others, abide by all College policies and applicable state and federal laws, and assume shared responsibility for safeguarding the College's information technology environment. The central principles that govern the acceptable use of College information technology resources can be summarized as follows:
1. Colorado College's computing resources may not be used for any activity that is illegal, unethical, or contrary to the educational goals of the College.
GENERAL USE POLICIES
Common sense and respect for others are excellent guides to what constitutes appropriate behavior in the use of CC computers and networks. Prohibited conduct falls into several areas, including but not limited to unauthorized access, copyright violations, acts of destruction, invasion of privacy, and harassment. The policies listed below are not exhaustive, but should convey to users a broad sense of what behavior constitutes illegal, unethical, or inappropriate online conduct. As in other aspects of College life, you are bound by the policies and guidelines published in the Colorado College Pathfinder, Colorado College Handbook, and the various handbooks for Faculty, Staff, and Administrators. By using CC?s information technology resources, you agree that you are familiar with these policies and will abide by those policies as well as this computing policy and any modifications made thereto in the future.
UNAUTHORIZED ACCOUNT OR SYSTEM ACCESS
Users may not access computers, software, data or information, or networks without proper authorization, regardless of whether any damage is done or whether the computer, software, data, information, or network in question is owned by the College.
1. You may not access or use, or attempt to access or use, any computer accounts other than your own assigned account or any computer system for which you have not been granted access. In other words, users should use only their own files, those that have been designated as public, or those that have been made available to them with the knowledge and consent of the owner. The College?s Academic Honor System and its prohibitions against plagiarism and cheating, among other things, applies to student use of any files and information obtained on CC?s computing resources used in the preparation of academic coursework.
MISUSE OF COMPUTING RESOURCES
Every user is expected to use the computing facilities in a responsible manner which does not waste "soft" resources (e.g., computer time) or "hard'' resources (e.g., paper, disk space, documentation materials.) The College?s policy regarding Misuse of College Resources applies to your use of all CC computing resources.
1. No person may store or use programs on College-owned systems that violate or hamper another person's use of computing resources. Examples of such programs are ones that attempt to obtain another user's password, acquire another user's files, circumvent system security measures, or crash the computer system.
COPYRIGHT AND LICENSE PROTECTIONS
The author of a text or the creator of a graphic, program, or application is protected by copyright law unless s/he specifically releases that work into the public domain. In accordance with the College?s policies governing the treatment of copyrighted materials, users should always obtain written permission from the original author(s) before copying electronic materials that are not in the public domain.
1. No user may copy, or attempt to copy, any proprietary or licensed software provided by or installed on College- owned resources. Copyright laws and license agreements protect much of the software and data that resides on the College?s computer facilities. Unauthorized duplication of software may subject users and the College to both civil and criminal penalties under the United States Copyright Act.
Computing resources may not be used to intimidate, threaten, or harass other individuals.
1. Colorado College's computing resources may not be used for any activities that violate the College?s Anti- Discrimination Policy, Student Code of Conduct, workplace standards, or state or federal laws.
VIOLATION OF PRIVACY
Respect the privacy of other users.
1. Files, tapes, disks, email, information, programs, and data owned by individual users should be considered private, whether or not the information is accessible by other users.
SUSPENSION OR REVOCATION OF ACCESS
Users suspected of violating these policies may be temporarily denied access to CC?s information technology resources during investigation of the alleged abuse. The use of CC?s information technology resources is a privilege. If a user is found to be in violation of these policies, this privilege may be revoked through temporary or permanent denial of access to such resources.
ADDITIONAL CONSEQUENCES OF MISUSE
Abusers of the College?s information technology resources will be subject to existing disciplinary procedures under current College policies in accordance with the abuser?s campus status. When appropriate or required by law, the College may request or provide assistance to law enforcement agencies to investigate suspected illegal activities.
*Continue with registration only if you agree to the above policies.
To connect to the Colorado College Network, you are required to register
and download a scanning application to your computer called "Bradford Dissolvable Agent" which
will verify that your system meets the established network security policies.
Please enter the required information below and click the Register button to run a scan on your machine. (When prompted, select "Open" or "Run" to complete the scan.)
* Please note that the requested username and password is the same as you would use for your email account.
|If you have any questions, please contact the Help Desk at 389-6449|