Read any documentation before using your computer, especially with
regards to new software. Read Me files and software Help files will
give you some warnings ahead of time.
Contact desktop consultants or system administrators for help in
learning new utilities, like spam filters, firewalls, anti-virus
software, or any other kind of software.
Contact an operator/system administrator or the IT Center when
a computer seems to be down or severely crippled.
Use passwords that adhere to the guidelines listed on the Passwords
Be sure to always logout of any computer when you are done using
it, this includes logging out of websites requiring passwords, like
a bank website or the Registrar's Access online system.
Send email to a system administrator or desktop consultant when
you read about scheduled system changes which you believe may have
a damaging effect on your work. System changes are carefully planned
to have minimal effect on the users, however you can always help improve
the scheduling by making your exact needs clear before the change
Use someone else's account.
Use University resources for personal or commercial gain.
Waste any network or computer resources. (e.g. forwarding chain
letters, sending "spam," etc). All of these
deny access to critical services like email.
Threaten, harass, or intimidate other users. This can constitute
a felony under state and federal law.
Forge messages or misrepresent your identity to others.
Compromise privacy, either yours or the privacy of others.
Attempt to acquire others’ passwords.
Give an account to an outsider (someone without an affiliation
with the College or University) without official authorization.
Run any software that provides network services or shares
network services with the Internet at large.