Purpose and Origin of This Document
All computing resources of Mississippi College are considered property of Mississippi College and should be used in a manner which is consistent with the Mission Statement and the principles of the University. The term computing resources includes all Mississippi College owned or licensed computer hardware, and software, network accounts, email accounts, and computer files, and use of the university network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network. Access to these resources includes (but is not limited to) Mississippi College faculty, visiting faculty, staff, students, alumni, guests, external individuals, and organizations accessing network services via Mississippi College’s computing facilities. Each user bears the responsibility of following the guidelines set forth in this document, which addresses what is and is not proper use of the University’s computing resources. Users are also subject to federal, state, and local laws governing many interactions that occur on the Internet. This policy does not cover every possible situation, and it is subject to change as state and federal laws change.
Authorized and Secure Access
Users may access only those resources for which they have been specifically authorized. Access privileges do not extend to another individual.
Computing resources should be used only in the manner intended. Mississippi College supports the educational, instructional, research, and administrative activities of the University and these resources may not be used for commercial purposes or monetary gain.
Users are responsible for the resources entrusted to them, including the computer, network address, software, and other hardware. They should make appropriate use of protection features (such as usernames and passwords) and take precautions against others obtaining access.
Ethical Issues
Users must abide by all applicable copyright laws and licenses. Mississippi College has entered into legal agreements or contracts for many software and network resources which require these users to comply with those agreements. Users must observe the copyright law as it applies to music, videos, games, images, texts, and other media in both personal use and in production of electronic information. Users must not use, copy, or distribute copyrighted works (including, but not limited to, Web page graphics, sound files, film clips, trademarks, software, and logos) unless they have a legal right to use, copy, distribute, or otherwise exploit the copyrighted work. Violations of authorial integrity, including plagiarism, unauthorized access, and copyright violations may be grounds for disciplinary actions and/or legal prosecution by the copyright owner. Users should not search for, access, or copy emails, programs, files, or data not belonging to them, unless permission has been granted by the author/owner.
Malicious Conduct
Access to Mississippi College’s network is shared widely and is limited, requiring that resources be utilized with consideration for others who also use them. Users must not attempt to modify system facilities or purposefully disrupt, damage, or degrade system performance, nor should they attempt to subvert the restrictions associated with their computer accounts. Mississippi College may choose to set limits on an individual’s use of a resource through quotas, time limits, and other mechanisms to ensure that these resources can be used by others who need them.
Disciplinary Action
Abuse of computing privileges will be subject to disciplinary action. Computing privileges may be lost and violators will be subject to the usual judicial procedures of the University. Mississippi College reserves the right to examine and retain all email and computer files and to revoke access to any user at any time, regardless of enrollment or employment status.
Disclaimer
This policy does not preclude enforcement under the laws and regulations of the State of Mississippi and/or the United States of America. Internet access is also subject to the Acceptable Use Policies of those sites which a user may traverse. Any questions concerning ethical or legal use of computing facilities should be directed to the Chair of the Information Technology Committee.
Approved by the Information Technology Committee, October 13, 2016