NYIT Computing Code of Responsible Technology Usage: Non-U.S. Campuses

Belongs To Collection(s)
    > student handbook global edition

New York Institute of Technology provides computing resources for the academic research and instructional purposes of its faculty, staff and students. Computing resources include host computer systems, college-sponsored computers, workstations, software, data sets and communication networks. Generally, computing systems and equipment are used carefully and appropriately. However, abuse of equipment or systems that causes disruption of users' productivity and the integrity of their data and programs may be subject to discipline or prosecution under college policies and host country laws.

PURPOSE

The purpose of the Academic Computing Code is to define responsible computer usage, particularly for new users who may not be aware of the potential impact of their actions.

COMPUTER ETHICS POLICY STATEMENT

Computers, telecommunications and information in electronic form create a need for ethical models. Information owners, both individual and institutional, must make a conscious and explicit effort to state and enforce their expectations of ethical behavior. Information users have an obligation to recognize the information owner's rights in order to protect and preserve their own rights to use that information. Computer-based information, recognized as a primary educational and research asset, should be protected from unauthorized modification, destruction, disruption or disclosure – whether accidental or intentional.

STATEMENT OF RESPONSIBILITIES

College Responsibilities: NYIT assumes the responsibility to ensure the integrity of its computing systems, workstations and laboratory facilities. The academic computing systems offer file protection that can only be modified by an authorized user. Since no system is absolutely secure, however, usage will be monitored to ensure that irresponsible users cannot affect the performance and integrity of other accounts and other users' information. User Responsibilities: Each account owner and workstation user is solely responsible for the usage incurred through his/her account/workstation. Individuals, who intentionally abuse accounts and privileges, degrade system performance, misappropriate computer resources or interfere in any way with the operation of the computer facilities are subject to penalties.

STANDARDS FOR COMPUTER USAGE

Access and use of college academic computing systems and computer services is defined below. It applies equally to all users of college-owned and college-operated information systems and equipment.

  • Any access prohibited by law is unauthorized.
  • Any access or use in support of activities that are prohibited by law is unauthorized.
  • Any use of subsidized accounts that is not specifically authorized by institutional policy is unauthorized. Individuals who willfully cause loss to authorized account holders by unauthorized access or use shall be held financially responsible for the cost of restoring that user's data, programs and account balance. Violators who are members of the NYIT community will be subject to disciplinary action under regulations applying to their respective status within the college.

All violators will be subject to prosecution under laws that apply.

OPEN COMPUTING LABORATORY ACCESS AND USE POLICIES

Many of the campus computing laboratories are open to the college community. The host computer systems and some of the laboratory workstations require that all users have an appropriate computer account. Account holders are issued a unique account ID and password that are needed to access those computer systems or workstations. Access to computer laboratory facilities by any individual may be restricted or denied for, but not limited to, the following reasons:

  • Unauthorized use of account ID and/or password, including but not limited to ineligibility (account holders must be affiliated with the college);
  • Unauthorized changes to laboratory hardware or software, including but not limited to:
  • Disconnecting/reconnecting or reconfiguring hardware;
  • Removing, changing or reconfiguring files on laboratory disks;
  • Damaging laboratory hardware or software or removing any laboratory hardware from the premises;

Failure to observe laboratory policies, procedures and protocol, including but not limited to:

  • Refusing to leave the laboratory promptly at closing time;
  • Refusing to respond to or responding inappropriately to requests made by laboratory staff (e.g., a request to move to another machine, to limit output pages to the printer, etc.) in the normal course of carrying out their job responsibilities;
  • Using threatening or abusive language or behavior directed at anyone in the laboratory facility;
  • Attempts to bypass security measures, such as access permissions to files, or obtaining permissions or account attributes with or without authorization.

COMPUTER ABUSE

The following are examples of computer abuse (This list is illustrative and not meant to be all- inclusive):

  • Frivolous, disturbing or otherwise inconsiderate conduct including extensive use of workstations for game playing, sending nuisance messages, wasteful or unauthorized use of college-supported facilities, or disturbing or allowing access to programs that erase or alter files surreptitiously;
  • Use of a computer account to perform computing services for unauthorized commercial purposes, either inside or outside of the college;
  • Possession, in a workspace or file, or use of programs capable of fraudulently simulating system responses; modification of or possession of systems control information, especially that which reflects program state, status or accounting; attempts to modify or crash the system;
  • Unauthorized use of a password or account ID; unauthorized access to another person's files; using or changing, without authorization, another person's password;
  • Any violation of the NYIT Student Code of Conduct that involves computer resources.

Violations of this code, including the above list, may lead to any of the following disciplinary measures:

  • Termination of a program or online session; the system manager may log off an irresponsible user at a workstation; similarly, a harmful job running under the operating system may be canceled without notice;
  • Invalidation of an account ID or account number;
  • Reduction of allocations or restrictions of account privileges;
  • Disciplinary action by ACL or OIT administrators, supervisors or laboratory managers;
  • Serious incidents may be referred directly to the appropriate academic authorities.