Technology Policies

Student Usage

澳门金沙投注_任你博-官网 Guidelines for Responsible Computing

The Maryland Institute College of Art (澳门金沙投注_任你博-官网) provides access to computing and information resources for students in support of the college's dedication to the education of professional artists and to the development of an environment conductive to the evolution of art. Access to these resources is a privilege.

Computing resources include host computer systems, college-sponsored computers and workstations, communication networks, software, and electronic files. Access to computing resources carries with it certain responsibilities and should reflect the academic honesty and discipline appropriate for the shared community of network and computer resources.

Proper use demonstrates respect for intellectual property, ownership of data, systems security mechanisms, and each individual's rights to privacy and to freedom from intimidation, harassment, and unwarranted annoyance. Attempts to compromise the security of the network or its connected systems are prohibited. Any attempt at this, or the introduction of viruses, worms, Trojan horses, or other forms of hacking or electronic subversion will result in the immediate loss of access. Further college, civil, or criminal action may be taken as appropriate.

The computer systems and networks at 澳门金沙投注_任你博-官网 are a college resource and are provided as a scholarship tool only. Users of the system do so at their own risk. In particular, they assume the risk of malfunction, destruction, corruption, alteration, or mis-transmission, of any information, software or hardware, whether due to negligence on the part of 澳门金沙投注_任你博-官网 or its employees, forces beyond 澳门金沙投注_任你博-官网's control (such as fire, flood, or other "acts of god"), or any other cause. Users agree to hold the college blameless for any direct or consequential damages whatsoever, which may arise from the use of the system.

 

Responsibilities of Students
Use of the college's information technology resources is a privilege. Each user must accept the responsibility for his/her actions and agree to:

  • Be considerate in use of shared computing resources. Refrain from monopolizing systems, overloading networks with excessive data, or wasting computer time, connect time, disk space, printer paper, or other resources.
  • Avoid interfering with the purposes and goals of the network, avoid disrupting the network host systems, and avoid disrupting network services.
  • Act responsibly so as to ensure the integrity and lawful use of computing and information resources.
  • Respect the rights of others and not threaten, harass, intimidate, or engage in unlawful activity.
  • Abide by all applicable licenses, copyrights, contracts, and other restricted or proprietary information.
  • Acknowledge the right of the college to restrict or rescind computing privileges in accordance with this and other applicable 澳门金沙投注_任你博-官网 policies when the user has exhibited inappropriate behavior in the use of computer facilities.
  • Recognize that the same standards of intellectual and academic freedom developed for faculty and student publications in traditional media are applicable to publications in computer media. Web pages, electronic mail, and electronic files may not contain copyrighted material without the approval from the owner of the copyright.
  • Use appropriate language, behavior, and style.
  • Advertising and marketing from commercial organizations is not permitted. Similarly, 澳门金沙投注_任你博-官网-owned computing and network resources should not be used for operating a business or other unauthorized commercial purposes.
  • Understand that system administrators may examine electronic files, electronic mail, and printer listings for the purpose of diagnosing and correcting problems with the system.
  • Contact Campus Tech (X2201) whenever you have computer problems or requests.

 

Inappropriate Behavior 

The following types of activities are examples of behaviors that are unethical, unlawful, and/or inappropriate:

  • Attempting to alter system, hardware, software, or account configurations.
  • Accessing or monitoring another individual's accounts, files, software, electronic mail, or computer resources without the permission of the owner.
  • Misrepresenting your identity, role or the identity of any other person in any type of electronic communication.
  • Misrepresenting or implying that the content of a personal home page constitutes the views or policies of 澳门金沙投注_任你博-官网.
  • Misusing the college's computing resources so as to reduce their efficiency or to affect access to the detriment of other users.
  • Producing chain letters or broadcasting messages to individuals or lists of users, or producing any communication which interferes with the work of others.
  • Breaching or attempting to breach computer security systems, whether with or without malicious intent.
  • Engaging in any activity that might be harmful to systems or to any stored information such as creating or propagating viruses, worms, Trojan Horses, or other rogue programs, disrupting services, or damaging files.
  • Violating copyright and/or software license agreements.
  • Using computing resources to threaten or harass others or transmitting obscene or fraudulent messages.
  • Using computing resources for commercial or profit-making purposes without the written authorization from 澳门金沙投注_任你博-官网
  • Disobeying lab, system, or 澳门金沙投注_任你博-官网 policies, procedures, or protocol.
  • Installing or operating computer games on 澳门金沙投注_任你博-官网 owned computers for purposes other than academic instruction.
  • Downloading or posting to 澳门金沙投注_任你博-官网 computers, or transporting across 澳门金沙投注_任你博-官网 networks, material that is illegal, proprietary, in violation of 澳门金沙投注_任你博-官网 contractual agreements; or in violation of 澳门金沙投注_任你博-官网 policy.
  • Violating local, State, or Federal laws.