Student Handbook: Technology Ethics Policy 13-14

Relevant excerpt

Individual users remain responsible for the abuse of computing and network accounts assigned to them. It is not acceptable for users to interfere with or disrupt network users, services or system resources. Disruptions include, but are not limited to: creating or deliberately propagating computer worms or viruses; transmitting slanderous or harassing materials; transmitting gratuitously violent, pornographic or obscene information; or using a computer to gain unauthorized access to any computing facility either internal or external to the Georgetown College network.

Download PDF