Appropriate Use of Computers / Technology

The Information Technology department is committed to providing network access to students, faculty, administration and staff for legitimate academic purposes. In order to maintain access for academic purposes, we are working to control the theft or distribution of all copyrighted materials and possession/distribution of illegal materials. Refer to the College’s Appropriate Computer Use Policy that appears later in this handbook.

HC Digital Initiative - iPads/Apple Pencils

Information and terms and conditions related to the HC Digital Initiative (iPad, Apple Pencil and textbooks) can be found here. All students using an HC-managed mobile device operate under the current Student iPad Responsibility Agreement.

Appropriate Computer Use Policy

The Hastings College IT Team provides information technology resources and services to students, faculty, administration and staff to further legitimate institutional purposes and programs. All persons associated with and utilizing Hastings College information technology resources are responsible for reading and adhering to the contents of the College’s Appropriate Computer Use Policy (see below).

The College’s information technology resources should be employed appropriately and responsibly. It is important to use these resources in a manner that does not infringe on another individual’s academic freedom, does not impede another individual’s intellectual inquiry, and does not interfere with another individual’s use of these resources.

Appropriate Use

Computer resources are made available to Hastings College students, faculty, and staff for academic, research, and administrative purposes. All individuals who use the College information technology have the responsibility to use them in an effective, ethical, and legal manner.

Inappropriate Use

Any activity involving Hastings College’s information technology resources that knowingly interferes with another person’s academic freedom, the institution’s goals or policies, or violates state or federal law is not acceptable. Some examples of inappropriate use include, but are not limited to:

  • Attempting to gain access to personal information, computer accounts, or computing resources for which you are not authorized;

  • Allowing others to use one’s account to access campus computer resources;

  • Not logging off from public terminals, thereby providing others access to computing resources for which they may not be authorized;

  • Damaging, altering, or tampering with others’ data contained appropriately within or transported by Hastings College computing facilities;

  • Violating the confidentiality of information associated with an individual or their research, or information associated with the college;

  • Any form of electronic eavesdropping, e.g., examining the contents of data packets transmitted on the campus network;

  • Any form of disrespectful, harassing, or threatening activity;

  • Violating copyright protection and authorizations, license agreements, and contracts and the circumvention or disabling of controls intended to reduce theft or distribution of materials;

  • Any commercial use, or use for profit;

  • Transfer and/or unauthorized use of College computer names and addresses;

  • Activity on any non-campus network, such as internet, that violates their usage guidelines (see usage guidelines from these various networks).

  • Violate copyright laws and their fair use provisions through inappropriate reproduction and/or distribution of music (including MP3 files), movies, computer software, copyrighted text, images, etc.

Many of these examples involve violations of law. For example, unauthorized access to another person’s information stored on a computer system is a violation of that individual’s right to privacy and is a crime.

The Hastings College IT Team is authorized to investigate and report to College administration when inappropriate usage of information technology resources is detected or suspected. Actions taken may include, but not limited to examining the contents of data files, reports, and system activity logs maintained on College information technology resources. Electronic files and data created, sent, received, or stored on computers and other information resources owned, leased, administered, or otherwise under the custody and control of the college are the sole property of Hastings College.

Results of Misuse
Misuse of computing resources may result in suspension of access to technology resources, referral to an appropriate authority on campus, and/or referral to a law enforcement agency. Disciplinary action by the College may include suspension, expulsion, and requirement to make financial restitution.

Accessing E-Mail
Hastings College provides an e-mail account to every student. Professors, administration and staff regularly send information to these accounts. Students are expected to consistently and frequently check on-campus e-mail accounts for time-sensitive messages.

Mass E-Mail Policy
It is a violation of Hastings College policy for students to send an e-mail to all or a significant number of students, faculty and/or staff without permission from the College. Announcements to the campus should be submitted through the Student Experience Team or the Academic Dean’s office.

Account Termination
Students who graduate or withdraw from Hastings College are given access to their account for 90 days following the last day of attendance. After this time, the account will be suspended and access prohibited. The College reserves the right to immediately deactivate email accounts for students who have been suspended or expelled.

The use of strong passwords to manage access to the college’s information resources is encouraged. A strong password generally uses a combination of upper and lower case alpha characters associated with numeric characters of at least eight total positions in length (e.g. ‘eJh048bZ’). As a reminder, passwords should not be shared and should be changed on a regular basis.

Guests Using Campus Wireless Network
Guests wishing to use the campus wireless network may log into the HC Public network.