Computer Resource Usage Policy
Purpose: The purpose of this policy is to define student, faculty, and staff expectations related to the appropriate use of Malone computing and networking resources.
I. General Computer and Network Usage Practices
1. All computer use should be performed in a manner which promotes the mission of Malone and is consistent with all principles of Malone's Community Agreement, particularly with respect to practicing integrity and accountability. The Academic Integrity Policy, as stated in the Malone Catalog, applies to all computer usage.
2. Computing and network resources are the property of Malone and should be used primarily for Malone-related business and academic activities. Students, faculty, and staff should not do excessive non-Malone-related work or printing on Malone computer equipment.
3. Students and employees, in order to be aware of Malone information and to provide timely service to others, should review and respond to email messages within a reasonable time from date of receipt. Under normal circumstances a reasonable time period would be within two (2) working days.
4. Never assume your email messages are private, or that they can be read by only yourself or the recipient. Malone reserves the right to monitor your use of Malone's computers and peripherals, email and Internet system to the extent necessary to protect Malone and other persons, including the members of the Malone community. Do not send messages that would compromise your integrity as the sender or the integrity of the receiver if they were viewed by others. Do not forward or post Malone-related email messages that you have received to news media or list servers without the author's permission. Email may not be used for advertising or broadcasting unsolicited messages.
5. Computing and network resources are not to be used to store or send fraudulent, harassing, slanderous, or other objectionable or inappropriate material or messages. Obscene, pornographic, or offensive material is not permitted to be accessed, sent, or stored on Malone computing resources. Malone recognizes that some legitimate academic research may require access to materials that may otherwise be prohibited. Request for such access must be submitted to the Provost for approval.
II. Compliance with Federal, State and Local Law
1. Electronic communications must not be used for illegal purposes. Examples include: harassment or stalking of other users; destruction or damage to electronic equipment, software, or data belonging to other users; sending email from false usernames; intentional disruption or unauthorized monitoring of electronic communications including the use of password grabbers or network monitors; attempting to gain unauthorized access to other computers or networks. Accessing credit card numbers or passwords to computers or user accounts is also illegal.
2. Malone computer users are prohibited from copying or downloading software without paying the required license fee. Transferring copyrighted materials to or from any system or via the Malone network without express consent of the owner is a violation of Federal and State laws. Examples of illegal copying include:
- Making a personal copy of software licensed to Malone
- Installing software on a computer without first obtaining a license for that software
- Copying files such as books, music, movies, or other licensed or copyrighted material
3. All computer software used on Malone-provided computer resources must be approved by the Information Technologies Department to ensure proper software licensing is maintained.
III. Malone's Right to Limit, Monitor, Copy and Regulate Any and All Usage of its Electronic Communications and Equipment
1. Malone reserves the right to limit, monitor, copy and regulate all use of Malone computers, devices, printers and network including but not limited to email and web site access. For anyone who is employed by Malone, this right extends to accessing and copying voicemail messages which are saved to email as a file. This is essential to protect Malone against claims of illegal use of its system, to protect students, faculty and staff, and to ensure compliance with this policy.
2. Suspected violations of this policy should be reported immediately to the Director of Information Technologies.
3. Malone reserves the right to shut down any user account without prior notification if inappropriate network activity is detected.