This statement represents a guide to the acceptable use of the Thomas College computer and network facilities. It is only intended to address the issue of Thomas College computer and network facilities use. In those cases where data communications are carried across other regional networks or the Internet, users are advised that acceptable use policies of those other networks apply and may limit use.
- Computer facilities privileges are only available to current students, faculty, staff and others (as approved by the VP of IS) of Thomas College.
- Alumni who are taking courses are classified as current students for all policies.
- Computer/network use priorities are:
– Scheduled classes
– Student course related needs
– Faculty or staff work related needs
– Other student/faculty/staff research
– Other student/faculty/staff use
- Computer usernames and passwords may only be used by the person to whom the account was issued. Do not share your password with anyone, and do not use anyone else’s password. Usage of an account which is not your own will result in both accounts being removed.
- Computer accounts are deleted once a person is no longer a member of the Thomas community.
- All use must be consistent with Thomas College’s primary goals.
- It is not acceptable to use computers and networks for illegal purposes or to install software without owning a software license. Illegal activities will be reported to the proper authorities.
- It is not acceptable to interfere with or disrupt network users, services or equipment. Disruptions include, but are not limited to, unsolicited advertising, propagation of computer worms and viruses, chain e-mail, changing or removing settings, capturing authentication information, and using the network to make unauthorized entry to any other machine accessible via the network.
- You must assume that information and resources accessible are private to the individuals and organizations which own or hold rights to those resources and information unless specifically stated otherwise by the owners or holders of rights. It is therefore not acceptable for you to copy or access information or resources unless permission to do so has been granted by the owners or holders of rights to those resources or information.
- Computers must be configured to use DHCP to get an IP address. Static addresses are not allowed since they conflict with other DHCP users.
- Software, operating system, or hard drive file/folder modifications on college-owned computers (including installation and deletion) must be approved by the Vice President of Information Services. Software that must be installed and maintained by IT Services staff include the operating system, the web browser, MS Office applications, and anti-virus software. Software installed by individuals without consent will be removed by IT Services and reported to the appropriate people.
- Portable applications and software on removable devices must be approved by the Vice President of Information Services.
- Students printing more than 500 pages per semester will be charged 10 cents per page for each page over 500. The charge will be added to the student bill. When printing to two sides of a piece of paper, this is considered two pages. To check your printing quantity: https://www3.thomas.edu/intranet/student-pages.asp.
Email and Other Communication
- Since e-mail is used as a primary method of communication, all are responsible for checking their e-mail at least weekly.
- All electronic communication or information, including e-mail messages and files, should not be considered private or confidential.
- It is not acceptable to transmit threatening, obscene, or harassing materials.
- Unsolicited e-mail is prohibited unless:
- The message is college-related business sent by a faculty or staff member.
- The message is sent to students only and is approved by the Student Affairs office.
- Soliciting sales or conducting business using Thomas College computers or networks is prohibited.
Academic Computer Labs
- Food and drink are not allowed in any computer lab.
- Teaching labs (Ayotte Center rooms 122, 126 & 225, and Alfond Academic Center rooms 116 & 204) give instructors capabilities to monitor, publish, and remote-control student screens.
- Connections may not be used to host servers that may be accessed from other PCs outside your res. hall room (including Windows, Linux ,or Mac Servers, HTTP (web), SMTP, FTP, gaming, audio, video, music, etc.).
- Peer-to-peer (P2P) or file-sharing software is allowed as long as excessive bandwidth is not used. Excessive bandwidth is defined as at least one of the following:
– over 10% use on a regular basis of your local segment of the network
– over 5 Gb per day
– over 6 connections / threads / downloads at one time
- Students may have wired switches, routers, or hubs to connect computers owned by themselves.
- Students may not have wireless access points due to the potential security risks. Students may not have a personal wireless broadcast device which interferes with college wireless systems.
- Students can not create a connection between our network and another network. One example is a bridge between our LAN and a DSL/cable modem.
It is your responsibility to ensure the security of your devices that connect to Thomas College service(s). You should take all necessary steps to manage the use of your devices in such a way that network abuse is minimized. Violations of system or network security are prohibited, and contracts and/or services of serious or repeat offenders will be terminated.
Examples of system or network security violations include, but are not limited to the following:
- Failing to secure your system against use by others. You are responsible for configuring and securing your devices to prevent damage to the Thomas network and/or the disruption of service(s) to others. You are responsible if unknown third parties utilize your device at any time. It is your responsibility to ensure that your devices are configured in a secure manner, and to take corrective actions on vulnerable or exploited systems to prevent continued abuse. You may not, through action or inaction, allow others to use your devices for illegal or inappropriate uses, and/or any other disruptive, provoking, or abusive behavior that is in violation of this AUP;
- Knowingly uploading or distributing files that contain viruses, Trojan horses, worms, time bombs, cancel bots, corrupted files, or any other similar software or programs that may damage the operation of another’s device or property of another;
- Hacking – breaking the security on any computer network or accessing an account that does not belong to you. This includes, but is not limited to, unauthorized access to, or use of, data, systems or networks, including any attempt to probe, scan, or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network;
- Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. This would include use of sniffers or SNMP tools.
- Attempting to obtain another user’s account username, ID, password or PIN.
Security and Cyber Defense Students and Security Center
- Security and cyber defense course and program related activities, as well as Security Center activities, must be performed on the isolated network dedicated for this purpose.
- All security-related data collection/testing/hacking on the College’s network must be approved in writing by the Vice President of Information Services and performed while supervised with IT Services staff.
Exceptions / Violation of Policy
- Exceptions must be approved by the Vice President of Information Services during normal business hours.
- The Thomas College Vice President of Information Services will review alleged violations of this Acceptable Use Policy on a case-by-case basis. Actions may be, but are not limited to, a fine ($50 – first offense; $100 – second offense; $150 – third offense) suspension or termination of computer facility and/or network privileges. Egregious violations may be referred to the Vice President of Student Affairs where outcomes may include administrative termination.
- If suspension or termination occurs, students are still expected to pay any technology fees.
- Appeals that are academic in nature may be made to the Academic Computer Committee Chairperson for the committee to consider. All other appeals can be submitted to the Vice President of Student Affairs for review by the Judicial Review Board or a Judicial Officer.
- Oct. 27, 2020 – Removed out-of-date policies regarding media limits, gaming limits, and storing files on X:
- July 5, 2017 – Fine amounts added for violations.
- April 18, 2017 – Added Network Security and Security and Cyber Defense Student sections.
- February 6, 2013 – Added language to address software on portable devices.
- January 20, 2010 – Changed one excessive bandwidth definition from 3Gb to 5Gb.
- June 30, 2009 – Added AOL/Yahoo limits on Office Communicator since MSN/Windows Live now allowed to all.
- November 27, 2007 – various changes