Illustrative Examples of Potential Computer Use Policy Violations
- Material which could be deemed offensive or pornographic should not be exposed to public view.
- Using the public printers to print fliers, multiple copies of larger documents, personal documents, or other bulk material is not reasonable use of institute equipment. Take large jobs to the print shop.
- In order to use RHIT resources to provide a service to off-campus, unaffiliated people or organizations, faculty must obtain approval from
the DEA; students must obtain approval from the SGA.
- To ensure the security of your account, choose a strong password that is hard to guess but easy to remember. The password should include letters and numbers of mixed case and not be based on a word in the dictionary or your name.
- Do not allow others to use your account; never leave a public lab machine logged into your account. You are responsible for all activity on your user account.
- In addition to ensuring the security of your user account, you must also ensure the security of any other systems or accounts to which you have access on the Rose-Hulman network.
- Because many applications can consume large amounts of bandwidth, you are expected to monitor and control your application's usage to avoid exceeding the bandwidth restriction. Failure to do so is in violation of the Computer Use Policy.
- Access to personal files without prior permission from the owner can constitute violation of the Computer Use Policy, even when those files appears to be available.
- Never send harassing or forged emails; do not sign up others for unsolicited emails.
- Institute public machines, such as those in open classrooms and the Library 3rd Floor Public Lab, are provided for academic use.