Acceptable Use Policy

Acceptable Use Policy

 

General Statement: This policy outlines the conditions under which Maui College computers and network resources may be used.  The policy covers usage by faculty and staff, as well as student. Computer and network access in computing labs, microcomputer classrooms, the library, and via student central server accounts is a privilege, not a right. Access to computers and network resources is granted for academic purposes. Like other publicly-funded resources, computing facilities and network access cannot be used for commercial purposes without proper written authorization from Maui College.

Copyright Laws: Unauthorized copying or transfer of copyrighted materials, including software is prohibited. Therefore copying of most software which resides on microcomputer classroom, lab or library systems or servers is likely a copyright violation. Software that can be legally copied is available and so-designated on UHMC info, UHINFO and other web sites. However, such software should only be downloaded to a diskette provided by the student (or to the student’s central computing system account); such as software should never be downloaded to the hard drive of a system in a microcomputer classroom or lab.

Etiquette: The user is expected to respect the rights of others in the local and worldwide network computing communities. Refrain from the use of inflammatory, profane, or obscene speech. Do not encourage or trick anyone into viewing, or listening to, something that the individual might find offensive. A good guideline for acceptable language and behavior in a microcomputer classroom or lab is that language and behavior which would normally be used in making a classroom presentation. Use good judgment when employing email mass distribution lists; is it highly unlikely that all UHMC students or all faculty share your particular interests or sense of humor, or welcome additional email clutter into their busy schedules.

Privacy: Computer account storage areas, email and chat conversations are considered private. However if abuse of computer access privileges or illegal activities are suspected, authorized personnel may examine communications to ensure compliance with this Acceptable Use Policy. Reposting personal communications without the original author’s consent is a violation of the author’s privacy and is prohibited. This does not apply to material which has been placed in public forums such as newgroups or list services. Do not reveal your personal address or phone number or those of your friends and colleagues in campus or other electronic communications; it is not prohibited to do such, but it is a wise practice to ensure safety and privacy.

Safety: Computing Services, library and lab personnel will do their best to protect the user from harassment or unsolicited contact. Threatening or unwelcome communications should be reported to Computing Services, Library, or Lab personnel. On the other hand, since the Internet contains a great deal of material that might be considered offensive, you must take responsibility for your own network browsing.

Vandalism: Illegal activities such as tempering with the hardware or software, unauthorized entry into computer systems, modification or destruction of computer files that are not owned by the user, are considered a crime under both state and federal law. Attempts to gain system-level access, introduction of viruses or other destructive programs, forging email or sending of chain letters or “mail bombs” is prohibited. Changing configurations of microcomputers or terminals in classrooms, the library or labs is prohibited. Unless told to do so by an instructor, changing classroom, library or lab microcomputer graphical user interfaces is prohibited. For example, do not change background colors, screen savers, or add personal shortcuts.

Student Computing Access Accounts: A student using central computing systems or servers is also expected to:

Delete email or other material to remain within his or her allotted disk storage.
Keep the password and account private by not sharing it with anyone.
Not allow any other individual or group to use the account for any reason.
Notify Computing Services if any breach in security is detected or suspected.
Unsubscribe from list services prior to absences of more than three weeks,

Policy Violations

Activities which are criminal state and federal law will be reported to the appropriate authorities. Non-criminal abuses of computer access and network privileges are grounds for termination of student computer accounts and/or access to lab or library facilities.

Disclaimer

Computing Services, lab or library personnel, and faculty will not be responsible for any damages suffered by those using computing equipment, facilities and network access. This includes loss of data resulting from the user’s own errors or omissions, delays, nondeliveries, misdeliveries, or service interruptions—even if such are caused by negligence of Computing Services, library or lab personnel. Computing Services, library and lab personnel are available for assistance to trouble-shoot problems; instruction in the use of computers or particular software applications is not their function. (Student are expected to enroll in credit or non-credit courses or workshops to learn about computers or the use of particular applications.