Information Technology

Cedar Crest College Computer Use Policy

Important: Logging into or otherwise connecting to the campus network implies acceptance of this Cedar Crest College policy.

  • The intent of this policy is to give an overview of acceptable and unacceptable uses of Cedar Crest’s computing resources without exhaustively enumerating all such uses and misuses. This statement is intended as an addition to existing policies concerning academic honesty and the use of facilities.
  • Use only a computer ID assigned to you by Cedar Crest College. Never reveal your password to anyone; doing so is a violation of Pennsylvania State Law. 1
  • Avoid any action that would seriously impact computing, network operation, or access, including:
    • Damaging or modifying hardware or software 2
    • Sending email chain letters or mass mailings
    • Creating unnecessary multiple jobs, processes, or network traffic
    • Students are not permitted to send email via the “All” email groups or to the entire campus community
    • Connecting one’s personal computer to the college’s network without active and current anti-virus, anti-spyware, and adware protection.
    • Installing on the network unauthorized network devices and network services such as wireless access points, hubs, routers and switches.
  • Always check with the Office of Information Technology before attempting to install or make copies of software. Otherwise you may seriously violate licensing agreements and copyright law.
  • It is illegal to download copyrighted materials (including MP3 and other music and video files) from the Internet without permission of the person owning the copyright. Under the Digital Millennium Copyright Act (DMCA) instituted in 1998, the copyright owner may bring an action in court that may result in civil liability or even criminal prosecution.
  • Computer and network resources are for academic, administrative, public service, and academically related personal communication purposes. Your use must not infringe upon the rights of others. Unacceptable use includes:
    • Harassment through annoying, threatening, libelous, or offensive messages
    • Advertisement for commercial purposes
    • Accessing information or using software that is abusive, profane, or offensive to the average person
  • Obtain permission from another user before reading, copying, changing, or deleting his/her files, software, or communications.
  • Abide by all use policies when connecting to external network services.

Access to the College's computer resources is a privilege guided by the Honor Philosophy--that you accept responsibility for your actions and how your actions affect others in the community. Violators of the Computer Use Policy will be referred to the Director of Information Technology, Campus Police, or the appropriate Dean or Vice President, with possible suspension of computing privileges and other sanctions. Offenders will also be subject to criminal prosecution under applicable federal and/or state law.

1 Disclosing a password to a computer system, network, and so on, knowingly and without authorization, is a misdemeanor punishable by a fine up to $10,000 and imprisonment of up to five years, as is intentional and unauthorized access to a computer, interference with the operation of a computer network, or alteration of computer software [18 Pa. C.S. 3933 (a) (2) and (3)].

2 Under Pennsylvania law, it is a felony punishable by a fine up to $15,000 and imprisonment up to seven years for any persons to access, alter, or damage any computer system, network, software, or database, or any part thereof, with the intent to interrupt the normal functioning of an organization [18 Pa. C.S. 3933 (a) (1)].

Return to Campus Policies