FACULTY MANUAL APPENDIX B -- ETHICAL COMPUTER USE Introduction All members of the Bentley community -- students, faculty, staff, and administration -- have opportunities to use computers and be affected by computer usage in the pursuit of their primary endeavors at Bentley College. Therefore, it is critical that such computer use be performed in an ethical context which ensures that the use of these resources fosters the achievement of the individual user's goals, consistent with Bentley College's educational and research objectives, Such an ethical context implies that computing resources will not be abused, wasted, or employed in such a way as to interfere with, or cause harm or damage to another person, institution, or company within or outside the Bentley College community. It is up to the individual to act responsibly in the use of computer hardware and software, data and computer outputs. POLICY STATEMENT The fundamental purpose of the Bentley computer resource (individually-used computers or shared computers), is to support an individual's primary endeavors as a student or employee of Bentley College. Individuals may only use accounts, files, software, and computer resources authorized under their particular accounts. Faculty members who delegate use to their students or colleagues assume responsibility for appropriate control and all risk to their accounts. Individuals must take all reasonable precautions (e.g., prevent unauthorized access to accounts or data by others) both within and outside the Bentley community. Individuals must not make unauthorized copies of copyrighted software or data. An employee's questions of copyright provisions or permissions should be directed to his or her supervisor or the supervisor of the computing facility. A student's questions should be addressed to a member of the faculty or the supervisor of the computing facility. Employees are encouraged to report to their supervisors ar the supervisor of the computing facility, and students are encouraged to report to a faculty member or the supervisor of the computing facility, violations, flaws or other deficiencies in the security of any and all Bentley College computer resources. Individuals must not abuse the College's computing resources so as to reduce its efficiency to the detriment of other users. Individuals must not attempt to modify system facilities, utilities, and/or configurations, or change the restrictions associated with their accounts, or attempt to breach the College's computer resources security system, whether with or without malicious intent. Individuals must not use any network access provided by the College to affect other computers or the network in any of the above ways. If uncertain about a specific situation, an employee should consult a superior or supervisor; a student should consult a member of the faculty before proceeding. Violations of this policy will be handled in a manner consistent with comparable situations requiring disciplinary action.