Acceptable Use Policy
The College expects that all persons who make any use of College computing hardware, software, networking services or any property related to the use of these facilities, will abide by the following acceptable use policy statement:
College information technology resources are provided with the understanding that the entire College community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.
The following activities are considered to be serious violations of acceptable use of the College network, and are subject to disciplinary action:
- Forging messages or otherwise altering electronic communications for the purpose of trying to hide the identity of the user or to impersonate another person
- Accessing or using a protected computer account assigned to another person, or sharing a password to a protected account with another person
- Attempting to access data, computer systems and/or networks on or off the College's campus for which there is no authorization, or all other forms of "hacking" activity
- Attempting to alter system software or hardware configurations without authorization
- Misusing, using excessively or abusing computer equipment, software or supplies
- Acting in ways that deny or interfere with the access and utilization rights of others
- Using any computer network or computing resources to access or transmit material or participate in activities that include but are not limited to, obscenity, child pornography, defamation, solicitations and theft
- Using or forwarding offensive or obscene language communications
- Violating copyright laws, including unauthorized reproduction of and/or using copyrighted images, text, music and videos
- Violating software licenses through unauthorized use, copying, and/or dissemination of software applications
- Using any computer network or service for a purpose other than scholarship (research and/or learning), legal entertainment or limited personal communications. For example, utilizing the College's resources on behalf of any commercial, political, religious or other non-academic organization is prohibited
- Being involved in software theft or piracy, data theft or other actions, which violates the intellectual property or privacy rights of others
- The installation and running of any server service, or device which hosts such service, without prior authorization from the Assistant Dean of Students and the Information Technology Office. Servers include, but are not limited to, e-mail (SMTP), Web and secure Web (HTTP and HTTPS), FTP, DHCP, IRC, ICQ, P2P, WINS and DNS.
Copyright Infringement Notice
No one is authorized to perform, exhibit, reproduce, transmit or otherwise distribute copies of copyrighted motion pictures, sound files or other copyrighted materials. Doing so constitutes copyright infringement under the Copyright Act, Title 17 United States Code Section 106(3). This conduct may also violate the laws of other countries, international law and/or treaty obligations.
Individuals who violate this policy will be subject to disciplinary action or referral to law enforcement authorities. Information Technology personnel are authorized to monitor suspected violations and to examine items stored on any College storage medium by individuals suspected of violating this policy.
You must accept the Hood College Acceptable Use Policy to use the network.