Code Of Ethics For Computing At Skidmore College
The academic computing facilities at Skidmore College are intended as a learning resource for all members of the college community. While IT encourages users to explore the versatility and power of a modern computing environment, users must refrain from activities that are in violation of the goals of a liberal arts college.
Thus, all users agree to abide by the following rules:
- Computer facilities will not be used for activities that are in violation of campus, local, state, or federal rules. This includes cheating, plagiarism, theft, vandalism, pornography, copyright violations (including music, still images, video, software, and text), and other similar acts. Users should also avoid "unauthorized collaboration" as defined in the Academic Information Guide and Student Handbook.
- Computer facilities will not be used for moneymaking activities including the resale of computer services, test processing, or statistical analysis. Externally funded consultancies or research projects must be authorized in advance by the Dean of Faculty in consultation with IT.
- Users will respect an individual's right to privacy and will not read, copy, or print material written by others that is not intended for public inspection.
- Users will refrain from any activity that threatens the integrity of the computer system at Skidmore College. This includes, but is not limited to, the modification of system services and utilities, the assumption of unwarranted privileges, sabotage, or other activities that interfere with public access to computer resources.
- Users agree to abide by IT rules governing the equitable access to computer facilities. This includes, for example, rules to ration computer login time, or to control the distribution of software and documentation. Users will refrain from practices to subvert these access rules.
- Every user is personally responsible for the integrity of the account assigned to that individual. Usernames are not transferable to other users or publicly distributable without prior authorization from IT.
Violations of these rules may result in the revocation of computer use privileges and/or referral to the appropriate judicial forum.