Information Technology Services will suspend or terminate all computing privileges of any individuals without notice who engage in improper computing activities

Serious cases, as determined by ITS, will be referred to the Dean of the College, the Dean of the Faculty, Human Resources, or the President for disciplinary action. Such disciplinary action may include the suspension, expulsion, or termination of the offending individual, as appropriate and as determined at the sole discretion of Colgate University. Where violation of state and federal law is involved, cases will be referred to the proper legal authorities for action.

The following serves to provide examples of violations of computing or computing facility policies at Colgate University. The list of violations includes, but is not limited to:

Examples:

  • Using IDs or passwords assigned to others
  • Disrupting the network
  • Destroying information
  • Removing software from public computers
  • Spreading viruses
  • Sending email that threatens or harasses other people (a Class A misdemeanor under New York State law)
  • Invading the privacy of others
  • Subscribing others to mailing lists or providing the email addresses of others to bulk mailers without their approval.

Knowingly or carelessly running or installing unlicensed software on any computer system or network; giving another user a program intended to damage the system; running or installing any program that places an excessive load on a computer system or network; violating terms of applicable software licensing agreements, including copying or reproducing any licensed software; or violating copyright laws and their fair use provisions through inappropriate downloading, reproduction, or dissemination of copyrighted music, movies, video, software, text, images, or other materials; using imaging equipment to duplicate, alter, and subsequently reproduce official documents.

Examples:

  • Unauthorized use of a computer account
  • Providing misleading information in order to obtain access to computing facilities
  • Using the campus network to gain unauthorized access to any computer system
  • Connecting unauthorized equipment to the campus network
  • Unauthorized attempts to circumvent data protection schemes to uncover security loopholes (including creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data)
  • Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks
  • Deliberately wasting or overloading computing resources, such as printing too many copies of a document
  • Or other activities

Email communications are subject to the Campus Expression Policy and other statements of conduct as published in the Student Handbook, Faculty Handbook, or Employee Handbook; Personnel Policies and Benefits Handbook for Administrative, Clerical, Secretarial, Technical, and Security Staff, and Personnel Policies and Benefits Handbook for Buildings and Grounds Staff, as well as all applicable federal and state laws.

In addition, other activities that threaten the integrity of the system or harm individual users are not allowed. These include, but are not limited to:

  • Initiating or propagating electronic chain letters
  • Inappropriate mass mailing including multiple mailings to newsgroups, mailing lists, or individuals
  • Forging the identity of a user or machine in an electronic communication or sending anonymous email
  • Using another person’s email account or identity to send email messages
  • Attempting to monitor or tamper with another user’s electronic communications
  • Reading, copying, changing, or deleting another user’s files or software without the explicit agreement of the owner
  • Or using email or personal web page advertising to solicit or proselytize others for commercial ventures, religious or political causes, or for personal gain.

Read the current ITS Acceptable Use Policy.