Information systems (including computers, computer accounts, printers, networks, software, electronic mail, Internet access) at Defiance College are provided for the use of Defiance College students, faculty and staff in support of the College’s academic and administrative programs. All students are responsible for seeing that these systems are used in an effective, efficient, ethical, and lawful manner. The use of information systems is a privilege, not a right, and may be revoked at any time for misuse.
- All computer equipment, accessories and systems owned by the College are to be used for College related activities only. All access to the College’s computing resources, including the issuing of accounts and hardware or software purchases must be approved through the Computer Services Office.
- It is the student’s responsibility to maintain the physical/hardware and logical/software security of any device connecting to the Defiance College network including, but not limited to, the operating system, the security and software patches and updates, and an up to date antivirus software package.
- Use of College computing resources is subject to all College policies and procedures. No copyrighted material is to be illegally obtained or redistributed. You are responsible for any network activity originating from your computer. Thus, be aware that the illegal sharing of copyrighted material with others is your responsibility whether knowingly or not and subjects you to disciplinary action as well as possible civil and criminal liabilities.
- A summary of the penalties for violation of Federal copyright laws can be found on the Defiance College website at http://copyright.defiance.edu/fed-penalties.
- A description of Defiance College’s policy with respect to unauthorized peer-to-peer file sharing including disciplinary actions can be found on the Defiance College website at http://copyright.defiance.edu/dc-actions.
- Eating and drinking are prohibited in the computer labs.
- Information systems are not to be used for commercial purposes, non-college related activities or to access inappropriate Internet sites. Records, including all information created through the use of information systems, are property of the College.
- Fraudulent, harassing, obscene, or unauthorized messages and/or files are not to be sent, printed, posted, requested, or stored. Chain letters or other forms of mass mailings are prohibited.
- Use of campus information systems requires one’s own valid user ID and password.
- Students are not to modify the current file configurations or change the system setting. Files should be saved on student’s removable media or on the student’s allotted network drive.
- A computer, computer account, or electronic mail account assigned to an individual may not be used by others. Each individual is responsible for proper use and protection of the network account, including proper password protection.
- Information system accounts expire in accordance with the terms of the account. Expired accounts and files associated with them will be deleted.
- Users of College computing resources should have no expectation of privacy in such use. The College expressly reserves the right to monitor or access its systems and the information stored thereon for any reason it deems appropriate, including routine maintenance and investigation of misconduct. Further, Defiance College may electronically disclose any content or records to satisfy any law, regulation or governmental request, as well as to properly operate and protect its members. Defiance College reserves the right at its sole discretion to review, modify or refuse to post any material or information. Notwithstanding the foregoing, Defiance College will not intentionally monitor or disclose any private mail messages unless permitted or required by law. Defiance College reserves the right to remove any content that it believes to be unacceptable or undesirable.
- No one should deliberately attempt to degrade the performance of an information system, including but not limited to computers, servers, and networks.
- Loopholes in information systems, security systems, or knowledge of a special password, are to be reported immediately to authorized Computer Services personnel and are not to be used to damage information systems, obtain extra resources, take resources from another user, or gain access to systems for which proper authorization has not been given. Using programs or tools designed to check for computer system or network security vulnerabilities such as port scanning is prohibited.
- Some computer software is licensed to Defiance College from vendors. Defiance College does not own this software or related documentation; it is protected by copyright. Any copyrighted software is not to be duplicated or downloaded from campus information systems. The use of software on a local area network or on multiple computers must be in accordance with the license agreement.
An individual’s use of information systems is a privilege, not a right, and may be revoked at any time for misuse immediately upon the discovery of a possible violation of these policies. Such suspected violations will be confidentially reported to the Provost and the Dean of Students. Further action may be taken by Defiance College or law enforcement in accordance with the severity of the action(s) in question.
This page has been formatted for printing.
Defiance College | Defy the Ordinary
701 N. Clinton St.
Defiance, OH 43512
© 2007-2012 Defiance College. All Rights Reserved.