The following is abbreviated from the full Acceptable Use Policy.
|Who Is Covered||This policy applies to all faculty, staff, students, alumni, and guests who use Simmons College's computer equipment and/or the voice/data/video networks.|
|What is Included||The technology covered by this policy consists of the College voice, data and video networks and all computer equipment, software, printers, copiers and other peripherals provided for use by the College. In addition, all Simmons-issued or Simmons-licensed passwords, personal identification numbers, and electronic keys are covered.|
- Coursework and course management
- Thesis preparation and research projects
- Independent research and self-teaching projects
- Communication with students, faculty, and staff at other academic or research institutions
- Communication within and outside the College for educational and for purposes related to the business of the College.
- While it is acceptable for students to use College resources for personal or recreational purposes, academic work and College business always have priority.
Prohibited uses include those uses which: infringe on another individual's right to privacy; adversely affect the user community inside or outside of Simmons; violate federal and state laws; violate Simmons policy; or are not allowed under the terms of our software licenses.
Examples of prohibited uses include, but are not limited to:
- Unauthorized reading, copying, or modification of files, network traffic, or electronic mail other than your own.
- Unauthorized use of someone else's password, or sharing of passwords.
- Intentional damage or disruption to hardware, software, services, security devices or codes, or the intentional creation or distribution of viruses, worms or other forms of electronic mayhem.
- Unauthorized access via the voice/data/video network or tampering with the College network or hardware services.
- Abuse of printing privileges, including printing of excessive copies or in violation of copyright.
- Distributing obscene or abusive messages or other forms of harassment.
- Harassing activities via social networks using Simmons networks or computers.
- Commercial activities, such as selling of personal property and contracted work, unless specific prior authorization is granted.
- Placing excessive demands on network or server capacity.
- Obtaining, storing, using, or sharing copyrighted material without proper credit to and permission from the copyright owner.
- Revealing confidential information.
- Unauthorized use of file-sharing software or other applications or equipment that creates excessive network traffic or attempts to circumvent network security or management systems.
- Allowing unauthorized access to the Simmons network .
- Establishing or maintaining a server without specific prior consent of Technology.