Skip to main content

ITS Policies

Students at computers

Nazareth College's Computing Code of Conduct

The rules that comprise this Code of Conduct apply to all areas of computer use at Nazareth College, including all computers, storage devices, networks, and network devices owned or managed by the College, including any for which the college contracts with a third party. The Director of Information Technology Services is responsible for publishing, and in concert with other members of the college community, enforcing this Code.

A variety of computer resources are currently available at Nazareth, from local area networks that provide access to PC and Mac based software, to wide area networks such as the Internet. All users are required to follow this Code of Conduct when using these resources.

Any information stored on college computers, or with third party providers under contract by the college, is stored digitally in multiple live and backup sources and, aside from the usual difficulties of guaranteeing confidentiality, is always subject to "discovery" by means of subpoena. Although the college may seek appropriate legal counsel, users should assume that the college will cooperate with outside agencies investigating violations of local, state, or federal law, including but not limited to copyright infringement (this should be specifically noted with respect to downloaded music, videos, etc.).

Procedures such as deleting files and reviewing accounts to ensure effective use of and access to computing resources may be necessary during the normal operation of the College's computer systems. If either as a result of this routine work, or as the outgrowth of a reasonable report or request from other individuals or agencies. the Director of Information Technology Services determines that a possible violation of this Code has occurred, he/she may authorize that an account or other technology asset be investigated by Information Technology Services staff.

Violation of the Code or abuse of the privilege of using Nazareth's computer resources can lead to:

  • Loss in computing privileges
  • Suspension or other college disciplinary action
  • Criminal Prosecution

Rules of Conduct

The Nazareth College Computing Code of Conduct includes, but is not limited to, the following rules. Questions about the Code should be directed to the Director of Information Technology Services.

  1. You may not give out your password.
  2. You may not let another person use your account.
  3. You may not possess or attempt to possess another user's password
    • Exceptions to (1), (2) and (3) may be permitted, but only for academic or administrative reasons and with approval by the Director of Information Technology Services. All individuals are responsible for the security of the accounts and equipment assigned to them, and of equipment owned by them and connected to college owned facilities. Any policy or security violation traced back to a certain account or resource will be assumed to be the responsibility of the person assigned or owning that resource, regardless of who committed the violation. Only institutionally approved individuals, and only in their roles as server or shared-resource managers for other users, are excluded.
  4. You may not copy, retain, or distribute copyrighted or proprietary material without written consent of the copyright holder. This applies to computer software, documentation, music and video files, and other tangible assets protected under U.S. copyright and patent laws. This includes the use of the college network as a vehicle for copyright infringement, regardless of ownership of the computer or storage medium involved, and regardless of the college's arrangement with any third party to provide or manage its network. Regardless of whether any profit is made from copyrighted material, it is illegal to provide uncontrolled access to such material (as would usually be the case in peer-to-peer file sharing programs)
  5. The number of simultaneous users for a piece of software may not exceed the number authorized in the copyright, purchase, or license agreement for that software.
  6. You may not use false or misleading identification to gain access to any computing resource.
  7. You may not use any computing resource that you are not authorized to use.
  8. You may not use an account for any purpose other than that for which you are authorized.
  9. You may not use any computer resource, including any Internet accessible resource, for personal profit or commercial gain or to act on behalf of any political party or candidate for public office. Employees who are engaged in professional fee-based consulting relationships, where the professional nature is related to their professional position at Nazareth, may use Nazareth computing resources for communication with existing clients, but not for advertising or promoting.
  10. You may not change, copy, delete, read or otherwise access files or software without permission of the owner (in the case of user files) or system administrator (in the case of system specific files).
  11. You may not attempt to prevent others from accessing any Nazareth College computing resource. This includes, for example, monopolizing a computer that contains software needed for course work, deliberately crashing or slowing down any system, posting of mass mailings or chain letters, or executing additional log ins.
  12. You may not attempt to bypass accounting or security mechanisms, or attempt to circumvent protection schemes or uncover security loopholes. If you find a security loophole, you are required to report it to the Director of Information Technology Services immediately.
  13. You may not use any Nazareth College computing resource, including the network itself, to attack, disable, or gain unauthorized access to any other computing resource either on or off the Nazareth campus.
  14. All personally owned equipment connected to the Nazareth college network must be running an effective and currently updated anti-virus software package and must have all operating system patches installed.
  15. You may not attempt to harass others using any Nazareth College computing resource or any computer system to which the College is connected. This includes, for example, sending annoying, libelous or threatening messages.
  16. You may not use any computing resource to violate any rules in the Nazareth College Student Handbook, Academic Integrity Policy, faculty or staff manuals, or other college policy statements, or any local, state or federal laws.
  17. You may not attempt to compromise the privacy of others. This includes, but is not limited to, the installation of traffic sniffers, key loggers, etc. or any other hardware or software designed to capture information which you are not authorized to have.
  18. Individuals who store sensitive or confidential information on their computers are accountable for that information and must make sure the appropriate security (encryption, etc.) is in place.
  19. You must follow the code of conduct of any local area or wide area network (including the Internet) to which the College is connected.
  20. The college reserves the right to remove any technical resource (computers, software, network devices, etc.) that it deems a security or network risk

Web Access Policy

Nazareth College has an approved policy of restricting access to certain web sites or web resources for two specific reasons:

  • If it is expected that permitting access to these sites or resources will create a substantial load (excessive bandwidth usage) on the institution's internal network or Internet access conduit, and the resource that is being accessed has limited educational benefit. Examples of this kind of site are high volume music download sites, and personal videoconferencing or voice communications.
  • If the Internet site or resource requires that special ports be opened in the institution's firewall, thereby creating added security risks for unauthorized intrusions. Again, this is for sites or resources that have limited educational benefit. Examples of this kind of site are some highly interactive computer games.

The college does not currently restrict access to sites based on content or on potential copyright issues. It is, however, incumbent upon every individual using Nazareth College resources to adhere to the Nazareth College Computing Code of Conduct, which includes issues related to content and copyright.

Since the college's network and internet connection are shared by many, and the costs of providing "unlimited" bandwidth are very high, it is felt that this policy provides the best balance between openness and functionality, and affordability.

Warranty Policy

It is your responsibility to ensure that you have a warranty service provision for your computer. Nazareth employees will not be in a position to service your computer or install devices/software for you.

Virus Protection Policy

Due to the increasing number of computer viruses and spyware infections, IT Services expects that ALL computers brought to campus have anti-virus/anti-spyware software installed and you keep the software updated regularly. A subscription may be required to keep your software updated. Please be aware that IT Services reserves the right to disconnect student computers from the campus network if they are found to be infected with a computer virus. The College's current standard for anti-virus software is Symantec Endpoint, but other industry-standard packages (McAfee, Kaspersky,etc) are also acceptable.

Personal tools