For such a policy to work, it is essential that users observe responsible and ethical behavior in the use of the resources. Proper computing and networking use follows the same standards of common sense and courtesy that govern the use of other public facilities. Improper use violates those standards. Improper use is defined as: Any use of computing and/or networking facilities or services that is unrelated to legitimate instructional, research/creative activity, or administrative requirements; that interferes with another's legitimate access; that violates another's intellectual property rights; and/or that violates any local, state, or federal law.
Users have responsibilities as members of the Hendrix College electronic community. These responsibilities include:
- Respecting an individual's right to privacy and freedom from intimidation, harassment, and unwarranted annoyance;
- Respecting copyright and other intellectual property rights. Unauthorized copying of files or passwords belonging to others may constitute plagiarism or theft. Modifying files without authorization (including altering information, introducing viruses or Trojan horses, or damaging files) is unethical, may be illegal, and may lead to sanctions;
- Maintaining secure passwords;
- Using resources efficiently;
- Recognizing the limitation to privacy afforded by electronic services;
- Learning to use software and information files correctly. Users should maintain and archive backup copies of important work;
- Abiding by security restrictions on all systems and information to which access is permitted. Users should not attempt to evade, disable, or "crack" passwords or other security provisions; these activities threaten the work of others and are grounds for immediate suspension or termination of privileges and possible further sanctions.
The following behavior will be considered to be misuse or inappropriate use of computing resources at Hendrix College:
- Intentionally interfering with the normal operation of computer resources at Hendrix or on any network accessible from computer equipment at Hendrix;
- Excessive use of computer resources, including ignoring posted workstation time limits, using more than one workstation at a time, playing games on workstations when they are needed for College-related assignments or similar activities;
- Attempting to access without authorization, discover the password, or otherwise circumvent the security of computer systems, accounts or files at Hendrix on any network accessible from computer equipment at Hendrix;
- Using computer resources for personal profit making activities not related to the mission of the College;
- Using electronic mail or other forms of computer-based communication to impersonate, deceive, or defraud another user, or to send messages which are harassing, abusive, or obscene;
- Using or copying computer software in a manner, which violates U.S. copyright laws or Software vendor licenses;
- Using computer resources to copy and plagiarize the intellectual output (programs, written assignments, etc.) of other persons;
- Using computer resources to violate any state, federal, or international laws, or the published policies of other host institutions or networks;
- Using computer resources in a manner inconsistent with the "Hendrix Standards of Conduct" as published in the Hendrix Student Handbook.
The Office of Technology Services should be contacted for clarification of these guidelines or to report guideline violations
It is the responsibility of all users to report to the Office of Technology Services any violation of the Code of Computer Resource Use.
The Code is posted in a prominent location in all Hendrix College computer laboratories. Failure to comply with the Code will subject the violator to appropriate conduct action. Whenever there is an indication of abuse of the user's privilege that interferes with the intended functions of the system, or impinges on another user's rights, or is an otherwise irresponsible use of the computer resource, the Office of Technology Services reserves the right to investigate and implement those actions deemed necessary to protect the system and/or other users. Such an investigation will require prior authorization from the appropriate Hendrix College offices: for students, the Vice President for Student Affairs; for faculty, the Vice President for Academic Affairs; and for staff, the supervisor of the staff member.