Network Access
2.1 Appropriate Use of the Network
2.2 Authorized Use
2.3 Regulations
2.4 Privacy
2.5 Backup and Retrieval of Data
2.6 Violation of Policy
Cornell College networks allow students, faculty, and staff to gain access to Cornell College's shared computing resources. In providing a network, Cornell agrees to maintain quality and fair access to all members of the Cornell community. Access to the Cornell network is considered a privilege, not a right.
2.1 Appropriate Use of the Network
Cornell College provides computing resources to meet the needs of students, faculty, and staff in order to support its educational mission. Any actions that undermine this important college goal are subject to disciplinary review. These include, but are not limited to, such acts as unauthorized copying of software, tampering with other's accounts, wasting or damaging computer resources, breaking system security (see 2.2.2), degrading computer system performance, and creation of or posting of material that is libelous, exploitative, destructive, or intended to harass. Such actions violate the social compact of the academic community as much as invasion of privacy, theft of property, misappropriation of ideas, or interference with other's rights.
Cornell College supports the statement on software and intellectual rights adopted by EDUCOM, a consortium of several hundred colleges and universities with active interest in the educational uses of computers.
Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media. It encompasses respect for the right to acknowledge, right to privacy, and right to determine the form, manner, and terms of publication and distribution.
Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against members of the academic community.
Some types of computer abuse (notably intentional damage and unauthorized alteration or access to computing systems) are also violations of Iowa and federal criminal codes, as is the unauthorized reproduction of copyrighted software.
Use of Cornell computers is a privilege granted only to those who use them responsibly. Employees suspected of abusing computer systems at Cornell shall be referred to their supervisor. Students suspected of abusing computer systems shall be referred to the Dean of Students. Penalties may include fines, suspension or revocation of computer privileges, academic probation, or dismissal. In addition, Information Technology reserves the right to suspend access to Cornell computer systems to anyone suspected of abusing computing privileges.
See also Section 2.3.
2.2 Authorized Use
In order to maintain the integrity of the network, it is imperative that users adhere to the following guidelines for using the network.
2.2.1 Accounts
Use of the Cornell computers is limited to those persons identified below and is subject to the following standards of use:
2.2.1.1 Cornell Faculty, Staff, and Students
Any Cornell faculty, staff, or student, full-time or part-time, may use the Cornell computers for any academic or administrative purpose; personal use is also permitted, but only during non-peak use periods. No special permission is required, nor are there any charges for use of computer time. However, no employee or student may use Cornell computers/systems for profit-making ventures or on behalf of external organizations or persons unless such use is directly related to Cornell courses, faculty research, or professional development.
2.2.1.2 Cornell Graduates
Cornell graduates may have limited access to Cornell computing systems for academic use for up to three months after leaving Cornell. Computing Services reserves the right to limit the amount of access and type of service provided.
2.2.1.3 Faculty Emeriti
Cornell faculty emeriti have the same privileges as other faculty except dedicated desktop equipment. Upon request, they shall receive network accounts, e-mail accounts, file space on the servers, ability to maintain a personal Web page, and access to Teaching Technology Center services for continuing professional development.
2.2.2 Account Access
The integrity of the network is maintained by the proper use of accounts.
2.2.2.1 Stealing Account Access
No person may use, or attempt to use, any computer accounts other than the one assigned to them. The negligence or naivete of another user does not confer license to use that account.
2.2.2.2 Sharing Accounts
No account owner or manager may lend his/her account to another user.
2.2.2.3 File Access
A user may gain access to files which he/she personally owns, files owned by another user who has granted access privileges, and files generally accessible as system resources to which global access has been given.
2.2.2.4 Responsibility for Accounts
Each account owner is responsible for all computing activities involving the account and shall be held liable for any misuse of the account. For this reason, it is suggested that users periodically establish new passwords for computer accounts.
2.2.2.5 Quotas for server space
Student, faculty, and staff are given space for personal files and personal Web files. Their exact nature and size can be obtained from Information Technology.
2.3.1 Fines/Legal Fees
Cornell College is not responsible for any fines or legal fees that may result from use or misuse of the Cornell computing systems.
2.3.2 Copyrights
Computer software and electronic transmissions of text and photographs are protected under the Copyright Act of 1976. Clips of copyrighted materials such as music, video, software, and written works may be used to illustrate academic work, with credit given to the source.
2.3.3 Harassment
The college's resources may not be used for any activities that intimidate, threaten, or harass individuals.
2.3.4 Commercial Activity
Commercial activity on the Cornell College computing system is permitted for business done on behalf of the college or its organizations as outlined in 3.2.6 above.
2.3.5 Non-Profit Activity
Non-profit activity on the Cornell College computing system is permitted for business done on behalf of the college or its organizations as outlined in 3.2.7 above.
2.3.6 Non-College Administered Servers
A server is defined as any computer that allows more than one individual to connect to it. Users are allowed to use their personal computers as servers, provided that users abide by the rules of the college. Fees cannot be charged for use of the server. Information Technology may require closing or modification of any such server if, in the opinion of Computing Services, it puts an excessive demand on network resources.
2.3.6 Tampering
Users who tamper with system security, maliciously attempt to degrade system performance, or change or erase the work of others may lose computing privileges and may be subject to disciplinary action. See also section 2.3.
Cornell authorizes its network administrators to access all electronic data resident on Cornell computer property. Cornell computer property includes network servers, network storage devices, computer labs, stand-alone PCs, and other hardware devices. Network administrators may, in the course of their regularly performed duties, read the contents of electronic communications that are resident on Cornell computer property. This could include, but would not be limited to, e-mail, regardless of its source or destination, that has been copied to, stored by, or transferred through Cornell computer property. In addition, authorized Cornell personnel may read the contents of electronic communications that are resident on Cornell computer property when it is reasonable and necessary to the conduct of school business. Students, staff, and faculty should not expect privacy in the content of any electronic data that is resident on Cornell computer property, regardless of whether such data is generally only accessible with a password or code.
2.5 Backup and Retrieval of Data
Information on college-administered servers is backed up nightly. Users are responsible for backing up all files on their hard drives.
2.6 Violation of Policy
The Office of Marketing and Communications or the Office of Information Technology will report violations of this policy to the violator's supervisor or, in the case of students, the Dean of Students. OCC and OCS will work with supervisors or the Dean of Students Office to remediate problems.