Responsible use of computer technology on campus is expected of all students, faculty and staff. Failure to do so will result in an investigation. If a violation is determined, suspension of computer resource privileges may occur.
Examples of computer abuse include:
- Unauthorized attempt to modify computer equipment or peripherals.
- Unauthorized attempt to add/delete/change software, such as games, graphics, operating systems, compilers, utility routines.
- Use of an account without proper authorization from the owner of the account.
- Reading or using private files, including the University's administrative or academic files, without proper authorization, or changing or deleting private files belonging to another user without proper authorization.
- Violations of property rights and copyrights in data and computer programs. Use of software to communicate offensive or obscene messages to other users of the system.
- The use of any Gratz College computer for copying licensed or copyrighted software (whether the software is owned by the University or not) is strictly prohibited.
- Copying University-owned licensed or copyrighted software on any other PC.
Gratz College strongly discourages students from using file sharing. File sharing is the easiest way to get viruses, malwares, spywares, worms, or trojans; serve as a backdoor to intruders. Because Peer-to-Peer (P2P) software is used generally used to violate Federal Copyright laws, its use on campuses has resulted in law suits against both students and institutions. The use of P2P software on any computer connected to the Gratz College network is strictly forbidden when copyright and software piracy are compromised. This includes KaZaA, Morpheus, Gnutella or any other variation or derivative of P2P software that allows you to access the computer of another or allows other users to access your computer to share files of any type. If you have this type of software on your computer, you must completely uninstall it immediately. The network connection of computers that are determined to be using P2P software will be disabled and it will be the responsibility of the user to demonstrate to IT that the software has been removed before service will be restored. Additionally, sharing commercial software with other network users is not permitted unless you have a license for that software which specifically permits you to share it with other users.
In order to avoid prosecution for violating copyright, it is recommended that you use a legitimate media downloading solution. These solutions are completely legal and will save you the time and the frustration of having to worry about copyright infringement.