Institute computing resources / facilities:
- Any computing infrastructure that is owned by the Institute and
maintained by IAIT or an academic or administrative department;
includes, but is not limited to, any server, network, workstation,
- Incidental personal use:
- Use of computing resources or facilities in a non-academic but
non-resource intensive manner
- Reckless / Negligent behavior:
- Failure to use appropriate measures to protect, monitor or
secure use of resources or others' use of resources in your
- All physical computing resources maintained and operated in
public areas; includes but is not limited to any projector,
printer, copier, workstation, or phone
- Express permission of the owner of the system being accessed in
the context of the method of access
- A program or device that provides on demand and usable
information to someone other than the operator/owner
- Intentional use of computing resources for the purpose of
degrading the quality of service or negatively impacting the
computing experience of another user on or off campus
Illustrative Examples of Potential Computer Use Policy
- Material which could be deemed offensive or pornographic should
not be exposed to public view.
- Using the public printers to print fliers, multiple copies of
larger documents, personal documents, or other bulk material is not
reasonable use of institute equipment. Take large jobs to the print
- In order to use RHIT resources to provide a service to
off-campus, unaffiliated people or organizations, faculty must
obtain approval from the DEA; students must obtain approval from
- To ensure the security of your account, choose a strong
password that is hard to guess but easy to remember. The password
should include letters and numbers of mixed case and not be based
on a word in the dictionary or your name.
- Do not allow others to use your account; never leave a public
lab machine logged into your account. You are responsible for all
activity on your user account.
- In addition to ensuring the security of your user account, you
must also ensure the security of any other systems or accounts to
which you have access on the Rose-Hulman network.
- Because many applications can consume large amounts of
bandwidth, you are expected to monitor and control your
application's usage to avoid exceeding the bandwidth restriction.
Failure to do so is in violation of the Computer Use Policy.
- Access to personal files without prior permission from the
owner can constitute violation of the Computer Use Policy, even
when those files appears to be available.
- Never send harassing or forged emails; do not sign up others
for unsolicited emails.
- Institute public machines, such as those in open classrooms and
the Library 3rd Floor Public Lab, are provided for academic
Ten Commandments of Computer Ethics
- Thou Shalt Not Use A Computer To Harm Other People.
- Thou Shalt Not Interfere With Other People's Computer
- Thou Shalt Not Snoop Around In Other People's Computer
- Thou Shalt Not Use A Computer To Steal.
- Thou Shalt Not Use A Computer To Bear False Witness.
- Thou Shalt Not Copy Or Use Proprietary Software For Which You
have Not Paid.
- Thou Shalt Not Use Other People's Computer Resources Without
Authorization Or Proper Compensation.
- Thou Shalt Not Appropriate Other People's Intellectual
- Thou Shalt Think About The Social Consequences Of The Program
You Are Writing Or The System You Are Designing.
- Thou Shalt Always Use A Computer In Ways That Insure
Consideration And Respect For Your Fellow Humans.
The "Ten Commandments of Computer Ethics" are authored and
published by Dr. Ramon C. Barquin, President of the Computer Ethics
Institute, in his paper "In Pursuit of a 'Ten Commandments' for
Computer Ethics" (Copyright 1991, Computer Ethics Institute,
Author: Dr. Ramon C. Barquin, 1815 H Street, Suite 1100,
Washington, DC 20006, 202-296-7147, firstname.lastname@example.org).