It shall be considered a violation of this policy
and/or of the BSC Honor Code to:
Use someone else’s password or log into some-
one else’s account without authorization, except
as may be required for management of system
Attempt to gain access to computing privileges
or resources for which you are not authorized or
via means not authorized.
Give others access (via password or other
means) to computing resources to which they
are not entitled.
Use a system for unauthorized purposes, such as
advertising for a commercial organization or
running a business.
Read, execute, modify, or delete any file belong-
ing to someone else without explicit permission
from the owner, even if the file is unprotected.
Damage or destroy software, data files, or hard-
ware physically or by introduction of worms or
Move or install hardware or software without
Create, display or transmit obscene, libelous, or
threatening messages or materials on the Col-
lege’s computer equipment.
Attempt to crash a system, or exploit weakness-
es in security.
Make unauthorized copies of software that is
Misuse technology resources in any way that
materially impacts the efficacy of use for others.
Modify technology resources, utilities, and/or
configurations, or to change the restrictions
associated with their accounts, or attempt to
breach any technology resources security sys-
tem, whether with or without malicious intent.
The appropriate system administrator may
remove or alter as necessary user files that threaten
to interfere with the operation of the system or as
needed for system maintenance. The system admin-
istrator should make every effort to notify the user
prior to such action to give the user opportunity to
remove such files him/herself. It is recognized that
there may be special cases where the threat to the
efficacy of system resources is so immediate that
prior notification is not possible.
Software is protected by copyright law unless it
has been placed in the public domain. The owner of
a copyright holds exclusive right to the reproduction
and distribution of the copyrighted work. Duplica-
tion of any copyrighted software is prohibited unless
specifically allowed for in a license agreement.
Unauthorized copying of software is illegal and pun-
ishable under federal law.
Respect for the intellectual work and property of
others has traditionally been essential to the mission
of educational institutions. As members of the acad-
emic community, we value the free exchange of
ideas. Just as we do not tolerate plagiarism, we do
not condone the unauthorized copying of software,
including programs, applications, databases and
code. Violation of this policy may be referred to the
BSC Honor Council or the BSC Social Council.
Only the Vice President for Information Technol-
ogy may sign license agreements. Questions about
site licenses should be directed to that office.
Illegal copies of copyrighted software may not
be created or used on College equipment,
including the LAN.
Individuals are expected to report any violations
of this policy and/or problems with the security
of any technology resources to the Vice Presi-
dent for Information Technology.
Shareware, or “user-supported” software, is copy-
righted software that the developer encourages you
to copy and distribute to others. This permission is
explicitly stated in the documentation or displayed
on the computer screen. The developer of shareware
generally asks for a small donation or registration fee
if you like the software and plan to use it. By regis-
tering, you may receive further documentation,
updates, and enhancements. You are also supporting
future software development.
Public Domain Software is that software that has
been dedicated by the authors to the public domain,
which means that the software is not subject to any
copyright restrictions. It can be copied and shared
freely. Before copying or distributing software that is
not explicitly in the public domain, check with the
Vice President for Information Technology.
The College works with its internet service
provider to ensure compliance with all copyright
protection laws. When contacted by the service
provider regarding failure by students to follow the
appropriate laws, the College will utilize its student
conduct procedures to sanction students effectively,
including the loss of online privileges within the Col-
lege or service provider’s network for an appropriate
length of time.
As an academic institution, the College honors
the principles of individual privacy. These principles
extend to privacy of electronic communication. It is
expected that individuals who are given access to
College computing resources will be responsible in
the ethical use of those resources.