| |||||||||||||||
|
Computing Policies - Computing Agreement Computer Ethics, Copyrights, and Intellectual Property Computers and networks provide access to resources on and off campus. Such open access is a privilege and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, contractual obligations, and College policies. Every member of the Mills community who receives accounts to use College computing systems agrees to protect their own work and respect the work and privacy of other members of the community. Each individual is responsible for the content of files in their personal accounts. When publishing personal web pages, each user is responsible for obtaining permission from, and giving proper credit to, the owner of all copyrighted materials used. Personal web pages are not routinely monitored by College staff nor do they necessarily represent College viewpoints or policies. Any file residing on Mills-owned equipment may be subject to search under court order. In addition, system administrators may access user files or monitor network traffic as required to protect the integrity of computer systems and to enforce current policy. The U.S. Congress has passed "The Higher Education Opportunity Act (H. R. 4137)" which requires U.S. colleges to prevent uploading and downloading of copyrighted works through peer-to-peer (P2P) file sharing on campus networks. In order for Mills college to stay in compliance with the law, all inbound and outbound P2P traffic is now blocked at Mills' network's edge. Please note however that as the legislation does not pertain to legal music downloading, services such as iTunes, Rhapsody or Napster are still allowed on our network. Access to computing resources is contingent upon degree of affiliation with Mills College. Students graduating, withdrawing, or being academically disqualified will cease to have full access to their computing resources at Mills. Likewise, individuals whose employment is severed for any reason will cease to have access to computing resources. Examples of Misuse of Computing and Network Resources Examples of misuse include, but are not limited to, the activities in the following list:
Use of Computing Resources Implies the I understand that I am responsible for my conduct when using Mills College equipment and services to access electronic files and resources. Misuse of computing, networking, or electronic information resources is not condoned and I understand that I will be held accountable for my conduct under applicable College policy, legal contractual agreement, and under both state and federal law. I understand that my login name is permanently assigned to me. I agree to use it for as long as I have access to Mills systems. I also agree to set a password of my own choosing on all my Mills accounts as soon as they are opened to assure that my accounts are always protected with a password known only to me, and I agree to change my password immediately if I discover that anyone has learned my password or used my accounts in any way. |
Audio-Visual Technical Services Information Technology Services New Student Computer Orientation Connecting Your Personal Computer to the Mills Network Connecting to Your Mills Personal File Storage Space Student Technology Newsletters
Contact Information Information Technology HelpDesk P: 510.430.2005 |
||||||||||||||
|
|
|
||||||||||||||