You are here

Information Technology

Computing - Acceptable Use Policy
The IT computer labs are available to all members of the Hampshire community to support teaching, learning, and research. Unauthorized use of these facilities is prohibited. For additional information about IT, visit https://www.hampshire.edu/it/information-technology.

Student Computing Acceptable Use Policy
Hampshire College’s computing, server, network, and Web resources support academic, research, and administrative needs of all students, faculty, and staff members of the College community. The following policy is intended to shape the College’s use of these resources and to assert our shared values and expectations. Students agree to this policy by virtue of their relationship with the College. 

The College owns the network, servers, and all college-purchased computer systems. Personal use of the College’s computing resources is permissible as long as it does not interfere with other users’ access to resources for academic work and is not excessive. The college assumes no responsibility for the preservation of any files or data, and is not liable for any loss of or damage to any files or data stored on the college's network or servers. Students are personally responsible at all times to back up for their files and data.

Accounts to College resources, including email, are issued to all students at time of enrollment and remain in effect as long as the student maintains a student relationship with the College. These accounts are for the sole use of the student to whom they are issued. Accounts are not transferable. Students are responsible for choosing secure passwords and maintaining password confidentiality. Students are also responsible for checking their college email accounts regularly, as all official College correspondence via e-mail is sent to these accounts only. The College is not responsible for setting up, using, or forwarding e-mail to any other account. Students may retain email accounts as alumni in accordance with the College’s e-mail policy.

Students may not access, inspect, or alter any file or directory belonging to another user without their permission. Students may not harass other users by sending unwanted e-mail, programs, or other files that are knowingly disruptive or may be reasonably construed as threatening or disparaging of others. Students may not knowingly forward virus-infected e-mail or files to others and are strongly encouraged to maintain updated virus protection software on their computer. Students may not use the College’s resources to gain unauthorized access to other computing resources either on campus or elsewhere. Nor may they use College computing, network, or web resources, including access to the internet, for solicitation or operation of commercial ventures or interests. Students may not use the College’s computer resources in any way that violates the College’s gender-based and sexual misconduct policy, nondiscrimination policy, or other policies.

The College believes in freedom of speech regardless of the medium used for communication and does not want to act as a censor of information on college resources, including webpage content. However, the College will investigate complaints arising from either the college community or external sources and will comply with, and enforce, applicable laws and college policies as appropriate. All e-mail and files on college-owned computers and servers are legally the property of the College. The College reserves the right to inspect e-mail and files and take appropriate action without notice if there is reasonable belief that there has been intentional or inadvertent disruption to the College’s network or other shared resources or if there is suspected violation of this policy or applicable laws.

Students may not damage, deface, alter, or remove any College computing equipment from campus without authorization or deliberately attempt to degrade the performance of College computing or network resources. Students may not install software on any College computer system without appropriate authorization or install software that is in violation of any licensing agreement.

Guidelines regarding Ethics of Scholarship apply to course work completed on computers and network and web resources just as they do with any other type of course work. Students should be aware of and abide by all applicable copyright laws and licenses.