Academics >  Information Technology >  IT Policies > 

Information Technology Policies
Information Technology Cluster Policies
  • Primary Purpose
  • Computing Policies

  • Inappropriate Use of College Computers and Network Systems
  • Respecting Privacy
  • Obeying Copyright
  • Sharing of Limited Resources
  • Civil Standards of Communication

  • Violations of the Code of Academic Integrity
  • College Computers or Network Systems

  • Violations of the campus Code of Conduct
  • College Computers or Networks
  • Electronic Communications Services

  • Illinois College Web Page Policies
  • General Web Page Policies
  • Policies
  • Guidelines

  • Information Technology Cluster Policies

    Primary Purpose

    The primary purpose of the Computing Facilities at Illinois College is to further the educational and research missions of the Illinois College community. By providing computing resources and services, Illinois College has made a serious and substantial investment in its students, faculty, and staff. We all have an obligation to respect that investment.

    Computing Policies

    1. Illinois College reserves the right to limit access to its networks.

    2. Where feasible, Illinois College will remove or limit access to material on Illinois College-owned computers that violates other applicable Illinois College policies or code, contractual obligations, or state and federal laws.

    3. Where time is of the essence, temporary restrictive actions may be taken by systems or network administrator(s) pending decisions of Illinois College Administrators or other appropriate authorities, or until the matter is finally adjudicated.

    Back to Top

    Inappropriate Use of College Computers and Network Systems

    The computing facilities are not to be used for the following activities:

    • Illegal or fraudulent purposes
    • Entertainment
    • Large Mailings
    • Tying up work stations
    • Large print jobs
    • Forged mail or postings
    • Personal or commercial gain
    • Printer is not to be used as a copier
    • Giving out passwords
    • Software piracy
    • Unlicensed copying of copyrighted material

    Respecting Privacy

    Only authorized users have access to administrative data. Examining and /or making unauthorized changes to this data are direct violations of Illinois College's standards of ethical conduct.
    Unauthorized access to another person's account to view their files is also a violation of these standards. This includes, but is not limited to, accessing the files of another student, professor, or colleague.

    Obeying Copyright Laws

    It is against the law to copy commercial software that has not been placed in public domain or distributed as freeware. Software piracy injures all of us. It reduces the incentives for the software industry to invest in new software projects; it substantially reduces the willingness of vendors to support computing at Illinois College through attractive discount programs and it makes us vulnerable to criminal prosecution. But worse than any of these, software piracy is morally wrong - indeed, it is ethically indistinguishable from shoplifting or theft.

    Sharing of Limited Resources

    While Illinois College enjoys a high-quality computing environment, during peak periods demand for computing resources may exceed supply. Be sensitive to the needs of all those who seek to use Illinois College's resources, and limit your use of these resources to performing only the most essential academic tasks during periods of peak demand.

    Back to Top

    Civil Standards of Communication

    Within the broad context of free academic discussion and debate, communications between members of the College community are expected to reflect high ethical standards and mutual respect and civility. It makes no difference whether the communication medium is a face-to-face exchange or a local or nation computer network. The use of obscene, racist, or sexist language clearly violates the ethical standards of the Illinois College community and is as inappropriate for computer-mediated communication as for other forms of College discourse.

    Violations of the Intellectual Integrity Related to use of Computers or Network Systems

    Related to the Use of College Computers or Network Systems

    1. Accessing, or attempting to access, another individual's or entity's data or information without proper authorization regardless of the means by which this is accomplished; and to give another individual the means with which to access such data or information.

    2. Supplying, or attempting to supply, false or misleading information or identification in order to access computers or network systems, or to access data or information stored in or transmitted across computers or network systems.

    3. Improperly obtaining another's password; or improperly obtaining or using another's password to access computers or network systems, or to access data or information stored in or transmitted across computers or network systems.

    4. Inspecting, modifying, distributing or copying proprietary data or software without proper authorization. It is also a violation to give another individual the means by which to inspect, modify, distribute or copy proprietary data or software.

    5. Subverting or obstructing, or attempting to subvert or obstruct, the operation of any computer or network system such as by introducing a virus, worm, or other rogue program in the system; or modifying, altering or otherwise tampering with the system's hardware or software; or hoarding computer or network resources.

    6. Initiating or encouraging the promulgation of chain letters or other types of electronic broadcast messages.

    Back to Top

    Violations of the Campus Code of Conduct

    Policy on Responsible Use of Electronic Communications Services

    The College may restrict the use of its computers and network systems for electronic communications, that is, the communicating or posting of information or material by way of electronic mail, bulletin boards, or other such electronic tools, when faced with evidence of violations of other College policies or codes, or state or federal laws.

    The College reserves the right to limit access to its networks through College-owned or other computers, and to remove or limit access to material posted on College-owned computers. The College encourages all members of its community to use electronic communications in a manner that is respectful to others. The College also wishes to enforce its policies regarding harassment and the safety of individuals; to protect the College against seriously damaging or legal consequences; to prevent the posting of proprietary software or the postings of electronic copies of literary works in disregard of copyright restrictions or contractual obligations; to safeguard the integrity of computer, networks, and data, either at the College or elsewhere.

    Computers and network systems offer powerful tools for communication among members of the College community and of communities outside of the College. When used appropriately, these tools can enhance dialogue and communications. When used unlawfully or inappropriately, however, these tools can infringe on the beliefs or rights of others. The College cannot protect individuals against the existence or receipt of material that may be offensive to them. As such, those who make use of electronic communications are warned that they may willingly or unwillingly come across or be recipients of material they find offensive. The College cannot control the posting of material on computers it does not own, even if such computers are attached directly to College networks. The college may, however, limit access to such networks.

    Furthermore, the College, cannot, in general, prevent the transmission of electronic communications across its networks based on the content of material transmitted, whether or not such material originates inside or outside of the College.

    Back to Top

    Illinois College Web Page Policies

    General Web Page Policies

    Illinois College allows any student or organization that has an account to create their own World Wide Web Home Page. The views and ideas expressed in these pages are not necessarily those of Illinois College. The students or the creators of organization's pages accept full responsibility for their content. Any student or organization found not following the guidelines of the Illinois College computing policies, the Web Page Policies or the Community Standards and expectations as listed in the Blue Book under Illinois College Policies and Procedures can have their web page taken away from them by the Web Administrators. Following is a list of those policies and guidelines.

    Back to Top

    Policies:

    1. The account is to be used as stated in the Illinois College Computing Policies.

    2. Each student is responsible for maintaining his/her own web page.

    3. As stated in the Illinois College Computing Facilities Use Policy, where time is of the essence, temporary restrictive actions may be taken by systems or network administrator(s) pending decisions of the Deans Office through the Disciplinary Procedures of the College, or until the matter is finally adjudicated.

    Guidelines:

    1. The copying of someone else's work for the use on your page is plagiarism. Any page found with plagiarized material can be shut down. This is also a violation of the Intellectual Integrity policy of Illinois College.

    2. Copyrighted material is not to be displayed on any web page, unless the student or organization has written consent of the owner of the copyright.

    Back to Top

        
    Illinois College Facebook Illinois College Twitter Illinois College Instagram Illinois College YouTube    Contact Us  Directions  Login  Site Map
    Illinois College   |  1101 West College Avenue, Jacksonville, Illinois 62650   |   217.245.3000   |   info@mail.ic.edu
    search login