Welcome Green Mountain

Computing and Communications Acceptable and Responsible Use

Computer resources available to students, faculty, staff and the community

Prescott College lab and library computers are available primarily for the academic use of our students; depending upon availability, community patrons may also use the computers for their individual research needs. The College provides the following resources:

  • ITV Classroom (access limited to students and faculty, expect to open Spring 2012)
  • Video Lab (access limited to students and faculty)
  • GIS Computer Lab (access limited to students and faculty)
  • Digital Lab (access limited to students and faculty)
  • PCs and Macs located in the Library (available to all students)

 All use is subject to compliance with the College's Acceptable and Responsible Use Policy outlined below.



This policy establishes the boundaries and acceptable and responsible use of the College’s computing and communication resources, including computers, networks, electronic data, electronic mail services, electronic information services, voice mail, telephone services, and other related computing facilities. This policy intends to reflect the College’s desire to promote free exchange of information between and among students, faculty, staff, and the global information community while respecting the principles of free speech and compliance to applicable communication laws.

College-owned computing equipment, networks, services, and resources are provided for the purpose of conducting College-related activities and are therefore considered College property. The College, as owner of such property, has the right to access information on the system that is stored, sent, created, or received by students, alumni, faculty, or staff including electronic mail, as it deems necessary and appropriate. As such, these individuals should not expect individual privacy in the system.

Users are obligated to protect College computing systems from illegal or damaging actions, either knowingly or unknowingly. This policy provides a description of unacceptable uses of College computing resources and how to report violations; however, the College may at any time make determinations that particular uses are and are not appropriate.

  1. Using information technology resources for purposes other than research or instructional purposes. Computing resources may not be used for commercial purposes or personal gain. Use of computer services for any commercial purpose, partisan political purpose or for any unlawful purpose is prohibited.
  2. Records containing information directly related to a student are confidential and protected from public disclosure by the Family Education Rights and Privacy Act. Employees may not access any such records or disclose or distribution their contents in a manner inconsistent with federal and state law and College regulations.
  3. Making, distributing, or using unauthorized duplicated of copyrighted material, including software applications, proprietary date, and information technology resources. This includes illegal file sharing of entertainment (e.g. music, movies, and video games) files in violation of copyright laws.
  4. Intentionally or recklessly abusing or misusing computing resources so as to cause damage, system interruptions, or harassment to other persons.
  5. Repeatedly or purposefully engaging in activities which can be reasonably expect to, or do, unreasonably tax computing resources or go beyond their intended or acceptable use.
  6. Borrowing, lending, falsifying, allowing, or facilitating the unauthorized access to use of College computing resources by a third party.
  7. Obtaining user IDs and/or password(s) of other persons in order to use College or College-related computing resources, or impersonating another person on a computing resource.
  8. Using electronic media to harass or threaten other persons, or to display, design, copy, store, draw, print, or publish obscene language or graphics.
  9. Using College computing resources to gain or attempt to gain unauthorized access to computing resources either inside or outside of the College.
  10.  Intercepting or attempting to intercept or otherwise monitor any communications not explicitly intended or him or her without authorization
  11. Copying, reading, accessing, using, misappropriating, altering, publishing, or destroying computer files, data, documents, or other files of another individual or attempts to do so, without the permission of that individual or authorized administrator.
  12. Violating the terms and conditions of software license agreements for software distributed by the College by giving, lending, selling, or leasing such media or software to others for their own use.
  13. Interfering with the operation of the College’s information technology resources by deliberately attempting to degrade or disrupt resource performance, security, or administration operation including, but not limited to, intentionally introduction any computer virus or similar disruptive force into any computer resource.
  14. Attempting to alter or connect nay computing or networking components (including, but not limited to, bridges, routers, DHCP servers, wireless access points, and hubs) on the College network without approval.
  15.  Installation or alteration of writing, including attempts to create network connections, or any extension or retransmission of any computer network services without approval.

Violations of this policy should be reported immediately to Student Life, Human Resources or the Office of the Provost. Violations of this policy will result in appropriate disciplinary action, which may include loss of computing privileges, suspension, termination, or expulsion from the College, and legal action.