Technology

Appropriate Use of Computers / Technology

The Information Technology department is committed to providing network access to students, faculty, administration and staff for legitimate academic purposes. In order to maintain access for academic purposes, we are working to control the theft or distribution of all copyrighted materials and possession/distribution of illegal materials. Refer to the College’s Appropriate Computer Use Policy that appears later in this handbook.

Appropriate Computer Use Policy

The Hastings College IT Team provides information technology resources and services to students, faculty, administration and staff to further legitimate institutional purposes and programs. All persons associated with and utilizing Hastings College information technology resources are responsible for reading and adhering to the contents of the College’s Appropriate Computer Use Policy (see below).  All students using an HC-managed mobile device operate under the current Student iPad Responsibility Agreement.

The College’s information technology resources should be employed appropriately and responsibly. It is important to use these resources in a manner that does not infringe on another individual’s academic freedom, does not impede another individual’s intellectual inquiry, and does not interfere with another individual’s use of these resources. 

Appropriate Use

Computer resources are made available to Hastings College students, faculty, and staff for academic, research, and administrative purposes. All individuals who use the College information technology have the responsibility to use them in an effective, ethical, and legal manner. 

Inappropriate Use

Any activity involving Hastings College’s information technology resources that knowingly interferes with another person’s academic freedom, the institution’s goals or policies, or violates state or federal law is not acceptable.  Some examples of inappropriate use include, but are not limited to:

Many of these examples involve violations of law. For example, unauthorized access to another person’s information stored on a computer system is a violation of that individual’s right to privacy and is a crime.

The Hastings College IT Team is authorized to investigate and report to College administration when inappropriate usage of information technology resources is detected or suspected. Actions taken may include, but not limited to examining the contents of data files, reports, and system activity logs maintained on College information technology resources. Electronic files and data created, sent, received, or stored on computers and other information resources owned, leased, administered, or otherwise under the custody and control of the college are the sole property of Hastings College.

Results of Misuse

Misuse of computing resources may result in suspension of access to technology resources, referral to an appropriate authority on campus, and/or referral to a law enforcement agency. Disciplinary action by the College may include suspension, expulsion, and requirement to make financial restitution.

Accessing E-Mail

Hastings College provides an e-mail account to every student. Professors, administration and staff regularly send information to these accounts. Students are expected to consistently and frequently check on-campus e-mail accounts for time-sensitive messages.    

Mass E-Mail Policy

It is a violation of Hastings College policy for students to send an e-mail to all or a significant number of students, faculty and/or staff without permission from the College. Announcements to the campus should be submitted through the Student Engagement Team or the Academic Dean’s office.

Account Termination

Students who graduate or withdraw from Hastings College are given access to their account for 90 days following the last day of attendance. After this time, the account will be suspended and access prohibited. The College reserves the right to immediately deactivate email accounts for students who have been suspended or expelled. 

Passwords

The use of strong passwords to manage access to the college’s information resources is encouraged. A strong password generally uses a combination of upper and lower case alpha characters associated with numeric characters of at least 16 total positions in length. As a reminder, passwords should not be shared and should be changed on a regular basis. Students can change their passwords by visiting Information Technology.

Duo and 2-Factor Authentication

Information security is important to HC.  All employees, students, emeriti and trustees will be using Duo 2-Factor Authentication when accessing our systems.  More information on enrolling in and using Duo can be found here - including how to enable offline access if you have a HC-owned laptop.

Guests Using Campus Wireless Network

Guests wishing to use the campus wireless network may log into the HC Public network.