Bookmark Bookmarked To MyMICA
Technology Policies

Student Usage

MICA Guidelines for Responsible Computing

The Maryland Institute College of Art (MICA) provides access to computing and information resources for students in support of the college's dedication to the education of professional artists and to the development of an environment conductive to the evolution of art. Access to these resources is a privilege.

Computing resources include host computer systems, college-sponsored computers and workstations, communication networks, software, and electronic files. Access to computing resources carries with it certain responsibilities and should reflect the academic honesty and discipline appropriate for the shared community of network and computer resources.

Proper use demonstrates respect for intellectual property, ownership of data, systems security mechanisms, and each individual's rights to privacy and to freedom from intimidation, harassment, and unwarranted annoyance. Attempts to compromise the security of the network or its connected systems are prohibited. Any attempt at this, or the introduction of viruses, worms, Trojan horses, or other forms of hacking or electronic subversion will result in the immediate loss of access. Further college, civil, or criminal action may be taken as appropriate.

The computer systems and networks at MICA are a college resource and are provided as a scholarship tool only. Users of the system do so at their own risk. In particular, they assume the risk of malfunction, destruction, corruption, alteration, or mis-transmission, of any information, software or hardware, whether due to negligence on the part of MICA or its employees, forces beyond MICA's control (such as fire, flood, or other "acts of god"), or any other cause. Users agree to hold the college blameless for any direct or consequential damages whatsoever, which may arise from the use of the system.

 

Responsibilities of Students
Use of the college's information technology resources is a privilege. Each user must accept the responsibility for his/her actions and agree to:

  • Be considerate in use of shared computing resources. Refrain from monopolizing systems, overloading networks with excessive data, or wasting computer time, connect time, disk space, printer paper, or other resources.
  • Avoid interfering with the purposes and goals of the network, avoid disrupting the network host systems, and avoid disrupting network services.
  • Act responsibly so as to ensure the integrity and lawful use of computing and information resources.
  • Respect the rights of others and not threaten, harass, intimidate, or engage in unlawful activity.
  • Abide by all applicable licenses, copyrights, contracts, and other restricted or proprietary information.
  • Acknowledge the right of the college to restrict or rescind computing privileges in accordance with this and other applicable MICA policies when the user has exhibited inappropriate behavior in the use of computer facilities.
  • Recognize that the same standards of intellectual and academic freedom developed for faculty and student publications in traditional media are applicable to publications in computer media. Web pages, electronic mail, and electronic files may not contain copyrighted material without the approval from the owner of the copyright.
  • Use appropriate language, behavior, and style.
  • Advertising and marketing from commercial organizations is not permitted. Similarly, MICA-owned computing and network resources should not be used for operating a business or other unauthorized commercial purposes.
  • Understand that system administrators may examine electronic files, electronic mail, and printer listings for the purpose of diagnosing and correcting problems with the system.
  • Contact Campus Tech (X2201) whenever you have computer problems or requests.

 

Inappropriate Behavior 

The following types of activities are examples of behaviors that are unethical, unlawful, and/or inappropriate:

  • Attempting to alter system, hardware, software, or account configurations.
  • Accessing or monitoring another individual's accounts, files, software, electronic mail, or computer resources without the permission of the owner.
  • Misrepresenting your identity, role or the identity of any other person in any type of electronic communication.
  • Misrepresenting or implying that the content of a personal home page constitutes the views or policies of MICA.
  • Misusing the college's computing resources so as to reduce their efficiency or to affect access to the detriment of other users.
  • Producing chain letters or broadcasting messages to individuals or lists of users, or producing any communication which interferes with the work of others.
  • Breaching or attempting to breach computer security systems, whether with or without malicious intent.
  • Engaging in any activity that might be harmful to systems or to any stored information such as creating or propagating viruses, worms, Trojan Horses, or other rogue programs, disrupting services, or damaging files.
  • Violating copyright and/or software license agreements.
  • Using computing resources to threaten or harass others or transmitting obscene or fraudulent messages.
  • Using computing resources for commercial or profit-making purposes without the written authorization from MICA
  • Disobeying lab, system, or MICA policies, procedures, or protocol.
  • Installing or operating computer games on MICA owned computers for purposes other than academic instruction.
  • Downloading or posting to MICA computers, or transporting across MICA networks, material that is illegal, proprietary, in violation of MICA contractual agreements; or in violation of MICA policy.
  • Violating local, State, or Federal laws.