The College provides an outstanding set of computing and communication services which grant unparalleled power and freedom to every member of our academic community. With that freedom and power comes the responsibility to use them in a socially responsible way. Like any community, the electronic community of which you are now a member cannot function without some sense of order. Please take a few minutes now to read the guidelines below. It is your responsibility to know and adhere to these regulations. Ignorance of the rules is not an acceptable defense. The latest version of the rules is available online at https://www.trincoll.edu/lits/help-support/security/information-technology-policies-procedures.

Guiding Principles

Purpose and Scope of Service

Trinity College’s voice, data and video communication networks are for the use of Trinity College students, faculty, and staff, and are to be used only for the academic, educational and research purposes of the College. Accounts given to you for accessing the network, e-mail, Web, the Library and other shared systems are provided expressly for your personal use only, and are not to be used by anyone else, including family members.

Giving access to your account to anyone off campus may result in permanent suspension of your access privileges.

Scholarly Integrity and Author’s Rights

“Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to all works of all authors and publishers in all media. It encompasses respect for the right to acknowledgement; right to privacy; and right to determine the form, manner, and terms of publication distribution.

  • “Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, are grounds for disciplinary action.”

(From The Educom Code: http://www.educause.edu/ir/library/html/code.html

Anonymity and Responsibility

It is technically possible to put someone else’s name, e-mail address or telephone number as the sender of a message sent through an electronic network. Because of the relatively impersonal nature of the interaction, opportunities exist for misuse. Making one’s messages appear to come from someone else is a breach of trust and is prohibited.

Exercise caution in letting others use your computer or mobile device or when leaving them unattended. The owner of the computer will be held responsible for any inappropriate use of the device, along with whoever actually committed the offense.

Applicability of Existing Codes of Conduct

Computer and network use on campus are guided by the same principles and subject to the same disciplinary sanctions ( and appeal processes) as are other campus activities. All the rules and regulations of the College, as outlined in the Student Handbook, including any disciplinary action specified, extend to all areas of computer use, both academic and non-academic. Common sense, common courtesy, and consideration of the implications of one’s actions within the context of our academic community are essential, and extend the scope of these guidelines beyond any listing of specific prohibitions. A few analogies may serve to clarify how these principles apply to the new media:

  • Gaining unauthorized access to an account or directory is analogous to breaking into a room or office.
  • Looking at files on a private directory or drive is analogous to going through someone’s desk, which, if unauthorized, is a violation of privacy.
  • Writing a program is like writing an essay and the same rules of intellectual honesty apply.
  • Unauthorized modification of a hard drive or other system is vandalism.
  • Downloading copyrighted software, music, and movies using file-sharing programs or making unlicensed copies of them is theft and is a federal crime.
  • Sending lewd or intimidating messages via the network is harassment.

Network Use Guidelines

While the general principles discussed above provide guidance for virtually all activities on the College’s computer, voice, and video networks, the phenomenal growth of telecommunications systems and services warrant additional attention.

The network use guidelines bring into sharper relief a number of salient issues. All traffic on the campus communications networks must hew to these guidelines. Use of the networks must:

  • Be consistent with the purposes of the networks
  • Not interfere with the work of other users of the networks
  • Avoid wasting campus computing resources
  • Be consistent with applicable state and federal law
  • Be consistent with all other regulations set forth in the Trinity College Student Handbook

Examples and Explication

Here are some examples of activities that would violate one or more of the guidelines. They are meant to be illustrative, not exhaustive.

Examples and Explication

Trinity College’s voice and data communication networks are for the use of Trinity College faculty, students, and staff, and are to be used only for the academic, educational, and research purposes of the College. Usage that is prohibited because it conflicts with the stated purposes of the networks includes, but is not limited to, these examples:

  • Providing your username and password to an off-campus individual for any
    reason is expressly forbidden.
  • Using the College networks to support personal or other business interests, beyond the College’s own efforts, is forbidden. This includes advertising and marketing as well as substantive services. Selling information intended for members of the campus community or selling access to or via Trinity’s networks to outside concerns is forbidden.
  • It is not acceptable to use the printing facilities to produce output not related to the College’s mission (i.e., it is not acceptable to print announcements or fliers for outside agencies, materials for a spouses club, etc.).

Usage that is prohibited because it may interfere with the work of other users includes, but is not limited to, these examples:

  • Usage that is likely to result in the loss or disruption of another persons work or service is prohibited. Examples of prohibited activities include tampering with data, voice, or video network electronics or wiring, or interfering with an active client computer or network server.
  • Use of servers or applications providing a critical network services such as DNS, NAT, DHCP, or PROXY, as well as the use of any unregistered network device, or devices requiring compliance and centralized network management such as switches, routers, and wireless access points are restricted. This policy exists solely for as an effort to prevent interruption of production network services, and as a means for maintaining reliable network operation, performance and security.
  • The intentional introduction of viruses, or malicious tampering with any computer system, is expressly prohibited.
  • Messages which cause an ongoing interruption in the work of another person are strictly prohibited (ex., “broadcast” messages that are sent after the recipient has requested that they stop or are sent indiscriminately to large groups of users). E-mail “chain letters” are expressly forbidden.

Usage that is prohibited because it wastes computing and/or network resources includes, but is not limited to, these examples:

  • Network bandwidth is to be considered a vital, shared resource. Any application that might cause congestion of the networks or otherwise interfere with the work of others is not allowed. Such applications include any e-mail “chain letters”, excessive “broadcast” messages to lists or individuals, and excessive transfer or downloading of large files.
  • Disk storage space on College-owned networked computers is a limited resource. Personal files (including work in progress) will not be saved on public-access personal computers. Files saved on personal accounts, must be academic discipline-related and are subject to review by Information Technology Services staff.
  • It is not acceptable to print multiple copies of output on public printers.

Usage that is prohibited because it conflicts with state or federal law includes, but is not limited to, these examples:

  • Messages that harass an individual or group are strictly prohibited and senders will be prosecuted.
  • Users of the Trinity networks may not share copyrighted material for which they do not have the license to share. This includes computer programs (“software”), audio files, video files, electronic texts, and all other media.
  • A personal, single-copy software license is not a license to share the software. It is each individual’s responsibility to make sure that she or he has the proper license to use a specified software package or media file. A good rule of thumb is to never use software or media that you did not purchase.
  • Copying licensed software that you did not purchase is software piracy. Software piracy is a federal crime. Do not copy other students’ software, and do not offer your own software for copying.

Unless explicitly noted, all software on the Internet should be considered copyrighted work. Therefore, students are prohibited from downloading software and/or modifying any such files without permission from the copyright holder or as granted in a license agreement or other contract defining use.

  • Exchanging digital copies of music files, often in the MP3 format, has become popular. Posting on the network or in any other way exchanging copies of songs from commercial music CDs is illegal. Musicians and their recording companies do not provide you with a license to share copies of their music when you purchase an audio CD. On several occasions in the past, Trinity College was officially contacted by lawyers from the Recording Industry Association of America when such copies were traced to our campus. The RIAA and related groups vigorously defend the copyrights on their properties and have taken legal actions against students to preserve these rights.
  • Even more fundamental is the Colleges expectation that all members of our campus community will respect the value of intellectual and creative labor, which is the essence of our enterprise. The copyright law is simply a manifestation of this principle, one that all students and staff members must scrupulously respect.
  • More information on copyright issues can be found at the Business Software Alliance: http://www.bsa.org/anti-piracy/ and the Software & Information Industry Association: http://www.siia.net. Information on MP3 (music) files can be found on the Recording Industry Association of America’s Web site, http://www.riaa.com. See also the EDUCOM code, cited at the beginning of this document.

There are a number of legal downloading alternatives, and a list of the most common ones is available online from EDUCAUSE: http://www.educause.edu/legalcontent

 

Be consistent with the regulations set forth in the Student Handbook.

As mentioned in the guiding principles above, existing codes of conduct are directly applicable to computer and network usage. Usage that is prohibited because it is not consistent with the Student Handbook includes, but is not limited to, these examples:

  • It is not acceptable to alter, disable, or remove any software that resides on a machine in the Trinity public computing areas or is accessible via Trinity’s network resources.
  • The intentional introduction of virus, or malicious tampering with any computer system, is expressly forbidden.
  • It is not acceptable to attempt to discover or obtain via coercion, hacking, or any other method, user accounts and passwords. It is also against the policy for any unauthorized parties to use the network administrative accounts.
  • It is not acceptable to use another person’s Trinity ID card and/or name to gain access to public computing resources, including printing resources.
  • It is not acceptable to physically tamper with, tap, disable, or remove any equipment, wiring, or networking hardware from the public computing areas, classrooms, dormitory rooms, or equipment areas. This covers computing, voice, and video network systems equally.

Racial and Sexual harassment via the network: Trinity College has explicit policies set forth in the Student Handbook regarding racial and sexual harassment. Neither of these transgressions will be tolerated on Trinity’s networks and all incidents will be dealt with firmly, according to established procedures.

Personal accounts on Trinity’s networks are for the personal use of the specified individual only and are not to be shared. Giving your username and password to anyone, on or off campus, is expressly forbidden. An individual is ultimately responsible for all violations committed under his/her user ID, no matter if he/she claims the violation was committed by someone else who had authorized or unauthorized access to his/her user ID. If an individual suspects his/her user password has been compromised, it is that individual’s responsibility to report it to ITS (students should call x2007, faculty and staff should call x2100) as soon as it is discovered.

(Parts of the preceding were originally derived from policies at several academic institutions, including the Massachusetts Institute of Technology and the Software Publishers Association.)

College Name, Seal, and Other Identifiers Policy

All members of the College community are expected to exercise prudence and discretion in the use of the College’s name, seal, and other identifiers. Students and recognized organizations may use the College’s name for purposes of identification but may not use their affiliation with Trinity College to imply that the College endorses their activities. In circumstances presenting the potential for implication of the College’s support, endorsement, association with, or opposition to any activity, event, program, policy, product, or the like, a disclaimer must be provided.

The use of the College seal is restricted to official purposes and documents, including diplomas, letterhead, legal contracts, and certain official printed materials. The College seal alone may not be used as the College logo, nor should it be used as a standalone element. The College seal and logo may not be altered in any way. The College seal may not be used for private purposes, including, but not limited to, personal or organizational stationery, business cards, surveys, or personal Web sites. Further, persons or organizations wishing to produce products
that bear the College’s name, seal, or other graphic identifiers (including photographs), must first obtain permission from the Office of Communications.