• Limit term or shared computers in the library and labs and defer to non-
• Clean old files and documents off of shared resources such as file servers and
electronic mail boxes.
• Make considerate use of computer resources in public areas. Refrain from
accessing programs that produce loud noises or which contain graphic material
that may offend others.
• Users will make every attempt to avoid the unintentional spread of computer
viruses through awareness of the problem and by having their disks checked on
a regular basis.
Access to communication systems and networks owned or operated by Bluefield College
implies certain responsibilities and obligations. Access is granted subject to college policies
and local, state, and federal laws. Acceptable use is ethical, reflects academic honesty,
and shows restraint in the consumption of shared resources. It demonstrates respect for
intellectual property, ownership of data, system security mechanism, and individual rights
to privacy and to freedom from intimidation and harassment.
In making appropriate use of resources, you MUST:
• Use resources for authorized purposes;
• Protect your user ID and the system from unauthorized use. You are responsible
for all activities taking place under your user ID or that originate from your
• Access only information that is your own, that is publicly available, or to which
you have been given authorized access;
• Use only legal versions of copyrighted software in compliance with the vendor
• Be considerate in your use of shared resources. Refrain from monopolizing
systems, overloading networks, degrading services, or wasting computer time,
connect time, disk space, printer paper, manuals, or other resources; and
• Conform to instructions/warning signs given in all lab areas. In making
appropriate use of resources you MUST NOT:
• Use another person’s system, user ID, password, files, or data without permission;
• Use computer programs to decode passwords, gain access to confidential
information, or control confidential information;
• Attempt to circumvent or to subvert security measures;
• Engage in any activity that might be harmful to systems or to any information