About Manchester

Acceptable Use Policy

I. Definitions
AUP – Acceptable Use Policy
ITS – Information Technology Services
Resources (computer resources/network resources) – College-owned PCs, the network and its ability to transmit data, access to and ability to browse the Internet, access to servers like e-mail, network-stored files, etc.
User(s) – Faculty, emeriti, staff, retirees, students and select guests

II. General Policy

The College network, to include the Internet connection and College-owned servers, has been designed as a computer medium in which Users can be productive. In order to maintain an efficient and productive computer network, the College has mandated an "acceptable use policy." As with all College computing policies, this AUP is applicable to the entire campus network, any computing equipment attached to the network and any College-owned computing equipment not attached to the network. The AUP reflects both ethical and legal considerations and indicates privileges and responsibilities of the Users. Users are subject to the provisions of the AUP. Access to the network is a privilege. Any User engaging in activities contrary to the established policies governing computer technology use, including this AUP, may lose network access privileges as outlined in this document or in other published sources. 
All Users must ensure that College computer systems are used only in an efficient, ethical, and lawful manner. Any User action not specifically mentioned in this document but that hinders or jeopardizes the network may be used as grounds for revocation of a User’s network privileges. This policy is subject to amendment without prior notice.

Top up arrow

III. Ownership/Privacy Rights 
All computers, computer systems, electronic media, electronic data, Internet connections, electronic mail, software, networks, manuals, related licenses and all other Resources are the exclusive property of the College and not that of any individual.
Individual Users have no personal privacy or property rights in electronic mail or other communications that they receive or send on College Resources.

The College has the capacity and reserves the right (without further notice) to monitor the use of its computer systems (including e-mail and Internet access) to ensure compliance with this policy. It is the policy of the College to comply with all legal requests for information, including transactional history.
CAVEAT: Personal privacy tools do not effectively eliminate one’s network transactional traces.

Top up arrow

IV. Residence Hall Occupants
Users in residence hall rooms, even when utilizing personally-owned equipment, must abide by the same policies operating in the public labs. For example, a residence hall occupant is responsible for the use of his/her computer in his/her room and will be held responsible for any and all inappropriate activity involving his/her equipment. Residence hall occupants may not tamper with or attempt to repair any network and/or cabling device beyond and including the network wall plate.

Top up arrow

IV. Copyrighted Material
College computer resources are for legal purposes only. All copyrighted material located on College-owned equipment must be registered with the vendor and with ITS. Unregistered copies of copyrighted material found on the network will be deleted. Copyrighted material may not be sent over the network for others to copy. Users are not to use College resources, including the network, to distribute any copyrighted material or create duplicate or mirror Internet sites without express written permission from the copyright holder. Unauthorized copyrighted files will be deleted without warning unless written copyright permission is provided to the Director of ITS or his/her designee. For additional information, see the Copyright Policy.

Top up arrow

V. Security 
All Users are provided with a network ID and password to access College network resources. Users may not provide rights or access to persons unauthorized for network privileges. Forwarding access or sharing network IDs and passwords is strictly prohibited.

Top up arrow

VI. Computer Facility Access
College computer facilities are available to all Users during regular posted hours. College IDs are required to use computer facilities. Those without a valid College ID will be asked to stop using computer facilities. Users must adhere to the rules posted at the various computer facilities.

Top up arrow

VII. Resource Allocation 
College computer facilities are available to all Users to support their activities in College programs. When the demand for computer resources exceeds the supply, the College observes a first-come, first-served policy, according to the following priorities as defined by the nature of the activity:

  • Assigned or supporting course work. This includes projects assigned in class that either by their nature or by specific instructions must be done on the computer. Any other course-related work is also included. Examples include programming projects and assigned computer exercises, course-related Internet research, writing papers and science lab computations.
  • Personal work. This includes projects for the User’s own enrichment or enlightenment, but which are not part of the College program. Examples may include writing letters to friends, preparing résumés or general Internet browsing.
  • Personal activity done mainly for entertainment. This may include instant messaging and/or online games.

The needs of Users completing course work supersede those wishing to do personal work or “play games.” Once a user is logged onto a computer to complete an assigned or supporting course work, that user need not surrender the machine until finished. If a lab is full, users who are not completing course works may be asked to surrender computer access in order to provide access to those completing a coursework.

Top up arrow

VIII. Additional Prohibited Activities 
Fraudulent, harassing, threatening, discriminatory, sexually explicit or obscene messages and/or materials are not to be transmitted, printed, requested or stored on Colleges computer systems.
Users are not to damage, alter or steal College information resources, in the form of data, software or hardware, or take any other actions that may potentially impair the network including, but not limited to, the following:

    • Users may not alter or degrade the abilities of other Users to access the College network or its resources. This may include mass e-mailings, restricting access to servers or the spread of viruses (either through malicious activity or by neglect).
    • Users may not engage in bandwidth-intensive activities or utilize software tools that circumvent College Internet traffic controls. This may include network/multi-session game playing, wide band real-time cameras, downloading of MP3 files and heavy FTP usage or any software application designed to counteract the effects of the “packet shaper.” Users should contact ITS for authorization and verification of questionable usage.
    • Users may not establish any server on the College network. This may include SMTP, Internet, FTP or file servers.
    • Users are prohibited from altering the network settings for any network-attached device.
    • Users are prohibited from using any public or private peer-to-peer network for any reason.

      Top up arrow

      IX. E-mail Usage
      E-mail access is provided to all Users with network privileges. Questionable content, such as hateful or threatening e-mail, is expressly prohibited and could lead to criminal charges. Therefore, any and all applicable College policies and regulations pertain to the use of the e-mail system, especially in regard to e-mail content.
      Some activities seriously degrade system/network performance and are prohibited in all circumstances. Forwarding chain mail and/or sending bulk e-mail are two such activities. A first violation will result in a verbal and/or e-mail warning from the Director of ITS or his/her designee. A second offense will result in a two-week suspension of all network privileges. A third offense will result in a total revocation of network privileges. 
      The Office of the President or any College vice-president may make certain exceptions for messages that must reach large numbers of the College community for reasons of safety or other matters of concern.

      Top up arrow

      X. WWW Publications 
      Use of any part of the College Web site, including personal Web space provided by the College, should conform to generally accepted practices and should coincide with the College mission statement. The content of any User-published material is governed by different College policies and regulations. For example, publication of offensive, hateful or threatening content on the Web is subject to disciplinary action and/or criminal charges.
      Use of any College Web resources for “for-profit” activities is strictly prohibited. For more information regarding this usage, see the WWW Usage Policy.

      Top up arrow

      XI. Penalties
      Violation of any provision of the AUP may lead to corrective action. Such actions may include warnings, revocation of various network privileges for a finite time period, complete revocation of network privileges, termination of employment, and/or expulsion.

      Top up arrow