Background Image
Previous Page  77 / 86 Next Page
Show Menu
Previous Page 77 / 86 Next Page
Page Background


• Limit term or shared computers in the library and labs and defer to non-

recreational users.

• Clean old files and documents off of shared resources such as file servers and

electronic mail boxes.

• Make considerate use of computer resources in public areas. Refrain from

accessing programs that produce loud noises or which contain graphic material

that may offend others.

• Users will make every attempt to avoid the unintentional spread of computer

viruses through awareness of the problem and by having their disks checked on

a regular basis.

General Principles

Access to communication systems and networks owned or operated by Bluefield College

implies certain responsibilities and obligations. Access is granted subject to college policies

and local, state, and federal laws. Acceptable use is ethical, reflects academic honesty,

and shows restraint in the consumption of shared resources. It demonstrates respect for

intellectual property, ownership of data, system security mechanism, and individual rights

to privacy and to freedom from intimidation and harassment.


In making appropriate use of resources, you MUST:

• Use resources for authorized purposes;

• Protect your user ID and the system from unauthorized use. You are responsible

for all activities taking place under your user ID or that originate from your


• Access only information that is your own, that is publicly available, or to which

you have been given authorized access;

• Use only legal versions of copyrighted software in compliance with the vendor

license requirements.

• Be considerate in your use of shared resources. Refrain from monopolizing

systems, overloading networks, degrading services, or wasting computer time,

connect time, disk space, printer paper, manuals, or other resources; and

• Conform to instructions/warning signs given in all lab areas. In making

appropriate use of resources you MUST NOT:

• Use another person’s system, user ID, password, files, or data without permission;

• Use computer programs to decode passwords, gain access to confidential

information, or control confidential information;

• Attempt to circumvent or to subvert security measures;

• Engage in any activity that might be harmful to systems or to any information