- Computing resources and facilities are provided by the Rose-Hulman Institute of Technology (RHIT) for the following uses:
- Support and enhance the educational mission of the Institute
- Support and enhance the educational experience of every student
- Assist the faculty, staff, and students in their academic, research, and professional activities
- Provide administrative support for the Institute
All RHIT computing resources and facilities (computers and file servers, internet access, internal network access, printing services, public lab computers, etc.) are shared among all faculty, staff, and students. Individual users are expected to ensure that their activity does not preempt or hinder some other user's activity. Furthermore, all use must be responsible (ethical and legal), based on criteria outlined in this document.
Misuse of the RHIT computing resources harms every member of the RHIT community. The general policy of the Institute published in the Student Handbook offers excellent guidance about responsible use of Institute computing resources and facilities:
The Institute values its reputation for moral leadership as much as its reputation for academic excellence and expects all persons associated with it to maintain the reputation. The Institute's Code of Ethics is simple and direct: Rose-Hulman expects its students to be responsible adults and to behave at all times with honor and integrity.
The Institute, whenever possible, gives all legitimate users the discretion to determine how best to shape their own use of the computing resources and facilities within the guidelines of this policy. Users are responsible for their actions, the consequences of those actions, and the consequences of negligent inaction. As such, users whose judgment leads to activities inconsistent with the guidelines of this policy risk disciplinary action and possible imposition of restrictions to enforce the guidelines of this policy.
The guidelines set forth in this policy are not a comprehensive list of what is or is not allowed but rather a guide to help individuals exercise good judgment and responsible system use. No one should assume that any system use not specifically excluded by this policy is legitimate or that it will be treated as such. Any use that endangers or degrades the computing facilities or has the potential to do so is contrary to this policy. The Institute enforces the principles in this document as well as the specific guidelines enumerated below.
While responsible incidental personal use (personal email, network browsing, game playing, etc.) of the computing system is acceptable, the primary purpose for its existence is to support the educational and academic missions of the Institute. Incidental personal use must not interfere with the educational mission of the Institute or the incidental personal use being exercised by other users.