Neill Hall 314
In support of its educational mission, Macalester College owns and maintains a number of information technology resources. These resources include a high-speed local area network, access to shared network software and storage space, public computing facilities, support services, on-line Library databases and access to the Internet. Access to these resources is granted to all Macalester faculty, staff and currently-enrolled students. By sharing and using these resources, users accept full responsibility for their actions and agree that they will use these resources in an ethical manner. In addition, individuals are also subject to federal, state, and local laws governing many interactions that occur on the Internet.
Because we are an academic community, the faculty, students and staff of Macalester College honor intellectual property, respect the privacy of data, and respect the rights of others. As a carrier of information, Macalester College does not subject users' files to prior review. However, the College does make its best effort to educate the community in responsible use and respond when violations are pointed out.
College resources are provided solely for the education and research mission of Macalester and may not be used for commercial or for-profit purposes. Users who express opinions and positions through the College's IT resources must make clear that these opinions and positions are those of the individual who posts them, not of the College. Because the College is the owner of all IT resources granted to users, the College reserves the right to deny use to those who have used them in an irresponsible manner. Offenders may also be subject to disciplinary action through existing structures for faculty, students and staff of the College, as laid out in the relevant College Handbooks.
People who use both on-campus and external network media (including any communication performed on the network for any purpose) must do so responsibly, in a manner that constitutes respectful behavior as laid out in the Faculty, Student and Staff Handbooks. It is unethical not to adhere to this type of behavior, even when communicating with people outside the Macalester community. For example, no form of harassment, as defined in the Student, Faculty and Staff Handbooks, will be tolerated within any media. In addition, all communications must include the sender's complete network address, unless the service explicitly invites anonymous communication. If someone requests you stop communicating electronically with him/her, you are required to do so immediately.
Students accessing "social networking services" such as Facebook, MySpace, Blogger, Twitter, and others should carefully read the terms and conditions set forth by such services. Students are solely responsible for the content of their sites. Neither ITS nor Macalester College assume any responsibility for what students place there. Inappropriate material placed on social networking sites is subject to Macalester College's Responsible Use policy, the Student Conduct Process and the College's Harrassment and Grievance Procedures.
Each information technology resource - those existing on campus as well as external ones to which we are connected - has an owner. Attempts, even unsuccessful ones, to use or access any resource without the permission of the owner is a violation of this policy. All accessors must respect conditions of access and use stipulated by the owner. Although individuals are not the owners of accounts assigned to them (the College is the owner), they are the owners of the files they create, and have rights to privacy and responsibilities to control access by others - you must respect others' rights when you communicate with them over networks.
Anything less than adherence to the letter and spirit of copyright laws and regulations is unethical and possibly illegal. Users must obtain permission of the creator or publisher to copy software written by others. Users must abide by license agreements controlling copying and use of software and data.
Individuals found to be in violation of any portion of this Responsible Use Policy will face disciplinary action including the restriction and possible loss of network and other information technology resource privileges.
Originally adopted by the Computing Advisory Committee, April 1999; updated as needed.