Allied Health

Arts, Business & Science

Engineering and Information Technology


Natural Resources


Public Safety Services

Faculty & Staff

Collapse Expand HLC Accreditation
Collapse Expand Offices
Collapse Expand Online Tools
Policy Manual
Collapse Expand Services
Collapse Expand Student Affairs
Banner image
  • Send Page to Friend
  • Print This Page
Policy Title: Acceptable Use of Computing and Information Technology Resources
Policy Department: IT
Policy Number: 02.003
Issue Date: 01/26/2011
Revised Date(s): 11/07/2012
Board Resolution: -0
Policy Document(s):
Guidelines-Acceptable Use
Policy Statement:

All computing resource and network users must:

  1. Comply with all federal, Ohio, and other applicable law; college rules and policies; and the terms of applicable contracts and licenses. Examples of such laws, rules, policies, contracts and licenses  include but are not limited to:
    1. Laws of libel, privacy, copyright, trademark, obscenity, and child pornography.
    2. The Electronic Communications Privacy Act
    3. Computer Fraud and Abuse Act, which prohibit “hacking”, “cracking”, and similar activities.
    4. Family Educational Rights and Privacy Act (FERPA)
    5. Health Insurance Portability and Accountability Act(HIPAA)
    6. Hocking College code of student conduct
    7. Hocking College Administrators’ Manual, Faculty Handbook
    8. Hocking College sexual harassment policy
    9. All applicable software licenses and contracts

In particular, users must:

  1. Respect copyrights, intellectual-property rights, ownership of files and passwords. Unauthorized accessing or modifying (including altering information, introducing viruses or Trojan horses, or damaging files) is unethical and may be illegal. Additionally, unauthorized copying of files or passwords belonging to others or to the College may constitute plagiarism or theft.
  1.  Use only those computer resources that they have been authorized to use and only in the manner and to the extent authorized.

    Accounts and passwords may not, under any circumstances, be used by persons other than those to whom they have been assigned. In cases when unauthorized use of accounts or resources is detected or suspected, the account owner should change their password and report the incident to the Information Technology Helpdesk.  

Ability to access computing resources does not, by itself, imply authorization to do so.  Access to the College’s computer resources and network is a privilege and use should be limited to only their intended purposes.

  1. Respect the finite capacity of resources and the network and limit so as not to consume an unreasonable amount of resources or to interfere unreasonably with the activity of others. Although there is no set bandwidth, disk space, or other limit applicable to all uses of college computer resources, the college may require users of those resources to limit or refrain from specific uses in accordance with this principle. The college reserves the rights to limit, restrict, or extend access to information technology resources.
  1. Refrain from using computing resources or network for commercial purposes. Personal non-commercial use of college computing resources is permitted when it does not consume a significant amount of these resources, is in compliance with this and other college policy, and does not interfere with the college’s responsibilities.
  1. Refrain from stating or implying that they speak on behalf of the College. Users must also refrain from use of College trademarks or logos without authorization to do so. The use of suitable disclaimers is encouraged.

    Authorization for use of College trademarks and logos must be approved. Guidelines for college faculty are available within the Style Guide posted on the College’s faculty intranet site.