Student Handbook

Computing-Acceptable Use Policy

Alma’s computer resources provide a vital service to all segments of the college. In using the system, therefore, we ask that you do so conscientiously. The individual and the college have fundamental rights and responsibilities to foster the mission of the educational community.

Alma College recognizes the ownership rights of users’ own intellectual work and that all files (programs, documents, mail messages, directories, etc.) are the private property of individuals who create them or to whom they are legally sent or assigned. As such, electronically stored information is considered confidential; examination or disclosure of the contents is permitted only when authorized by the owner of the information, approved by the appropriate college official, or as required by local, state or federal laws.

It is a most serious offense for any user to attempt to degrade the performance of the college computer/information system, to seek to penetrate its security, or in any way to deprive or attempt to deprive other users of resources or access to the computer. The intent of the following list is to give an overview of unacceptable uses of Alma College’s computing resources without exhaustively enumerating all such uses and misuses.

Computer misuse includes, but is not limited to:

  1. Using a computer account belonging to another individual.
  2. Tampering with the operation of Alma College’s computing systems or other computer resources available through the network, including equipment and programs. (i.e., wireless routers, etc.)
  3. Using Alma’s computer resources for commercial purposes and/or for personal profit not in line with the college’s educational mission.
  4. Reading, modifying, copying or deleting programs or data without proper authorization.
  5. Using network resources to send or publish abusive, obscene, or otherwise harassing communications.
  6. Using computing resources in such a manner as to cause congestion and performance degradation of the network.
  7. Specifying false or misleading identification when required to do so for any purpose associated with use of the systems.
  8. Failing to adhere to the current MichNet Acceptable Use Policy

When a violation of computer use policy is suspected, Information Technology Services personnel may examine or disclose the contents of electronically stored information only with reasonable cause and with explicit authorization of the senior administrative staff (president, vice-presidents). Personnel may also intervene when required by state or federal officials. Persons discovered in violation of Alma College’s Computer Use Policy or any other provisions established by Information Technology Services shall be reported to the appropriate college, state or federal judicial authorities and subject to disciplinary or criminal action.

Last updated 10/1/2013