Abuse Statement

Tags policy

What Is It?

Statement regarding responsible use of computers and network systems

STATEMENT REGARDING RESPONSIBLE USE OF COMPUTERS AND NETWORK SYSTEMS

For inclusion in the Tech Catalog and Student Handbook
 
The use of computers or network systems in no way exempts any member of the University community from the normal requirements of ethical or legal behavior in the Tech community. In particular, data, software, and computer capacity have value and must be treated accordingly. Use of a computer and network system that is shared by many users imposes certain additional obligations. Legitimate use of a computer or network system does not extend to whatever an individual is capable of doing with it. Although some rules are built into the system itself, these restrictions cannot limit completely what an individual can do or can see. In any event, each member of the community is responsible for his/her actions whether or not rules are built in, and whether or not they can be circumvented. Members of the Tech community are expected to follow certain principles of behavior in making use of computers and network systems, in particular, to respect, and to observe policies and procedures governing:
* The privacy of or other restrictions placed upon data or information stored in or transmitted across computers and network systems, even when that data or information is not securely protected; 
* An owner's interest in proprietary software or other assets pertaining to computers or network systems, even when such software or assets are not securely protected; 
* The finite capacity of computers or network systems by limiting use of computers and network systems so as not to interfere unreasonably with the activity of other users. 
 
Members of the College community also are expected to follow all other policies, rules, or procedures established to manage computers or network systems, including those established to control access to, or the use of, computer data, files, or other information. Those who cannot accept these standards of behavior will be denied use of Montana Tech computers or network systems. Violators may also be subject to penalties under College regulations and under state and federal laws. Policies and statements regarding the Responsible Use of Electronic Communications and Abuse of Montana Tech Computers and Network Systems are posted on the Montana Tech WEB site and are accessible at the following URL: http://www.mtech.edu