Institute computing resources / facilities:
- Any computing infrastructure that is owned by the Institute and maintained by IAIT or an academic or administrative department; includes, but is not limited to, any server, network, workstation, or printer
- Incidental personal use:
- Use of computing resources or facilities in a non-academic but non-resource intensive manner
- Reckless / Negligent behavior:
- Failure to use appropriate measures to protect, monitor or secure use of resources or others' use of resources in your name
- All physical computing resources maintained and operated in public areas; includes but is not limited to any projector, printer, copier, workstation, or phone
- Express permission of the owner of the system being accessed in the context of the method of access
- A program or device that provides on demand and usable information to someone other than the operator/owner
- Intentional use of computing resources for the purpose of degrading the quality of service or negatively impacting the computing experience of another user on or off campus
Illustrative Examples of Potential Computer Use Policy Violations
- Material which could be deemed offensive or pornographic should not be exposed to public view.
- Using the public printers to print fliers, multiple copies of larger documents, personal documents, or other bulk material is not reasonable use of institute equipment. Take large jobs to the print shop.
- In order to use RHIT resources to provide a service to off-campus, unaffiliated people or organizations, faculty must obtain approval from the DEA; students must obtain approval from the SGA.
- To ensure the security of your account, choose a strong password that is hard to guess but easy to remember. The password should include letters and numbers of mixed case and not be based on a word in the dictionary or your name.
- Do not allow others to use your account; never leave a public lab machine logged into your account. You are responsible for all activity on your user account.
- In addition to ensuring the security of your user account, you must also ensure the security of any other systems or accounts to which you have access on the Rose-Hulman network.
- Because many applications can consume large amounts of bandwidth, you are expected to monitor and control your application's usage to avoid exceeding the bandwidth restriction. Failure to do so is in violation of the Computer Use Policy.
- Access to personal files without prior permission from the owner can constitute violation of the Computer Use Policy, even when those files appears to be available.
- Never send harassing or forged emails; do not sign up others for unsolicited emails.
- Institute public machines, such as those in open classrooms and the Library 3rd Floor Public Lab, are provided for academic use.
Ten Commandments of Computer Ethics
- Thou Shalt Not Use A Computer To Harm Other People.
- Thou Shalt Not Interfere With Other People's Computer Work.
- Thou Shalt Not Snoop Around In Other People's Computer Files.
- Thou Shalt Not Use A Computer To Steal.
- Thou Shalt Not Use A Computer To Bear False Witness.
- Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid.
- Thou Shalt Not Use Other People's Computer Resources Without Authorization Or Proper Compensation.
- Thou Shalt Not Appropriate Other People's Intellectual Output.
- Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing.
- Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans.
The "Ten Commandments of Computer Ethics" are authored and published by Dr. Ramon C. Barquin, President of the Computer Ethics Institute, in his paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" (Copyright 1991, Computer Ethics Institute, Author: Dr. Ramon C. Barquin, 1815 H Street, Suite 1100, Washington, DC 20006, 202-296-7147, firstname.lastname@example.org).