Network Connection Acceptable Use Policy

McDaniel College provides computing resources to support the academic research and instructional activities of the institution. The resources are intended for the sole use of College faculty, staff, students and other authorized users. Use of the College's information technology resources is a privilege. The following types of activities are examples of behaviors that are unethical and unacceptable, and in some cases may violate state or federal law and/or the McDaniel College Student Honor Code.

  1. Attempting to alter system, hardware, software, or account configurations.
  2. Accessing or monitoring another individual's accounts, files, software, electronic mail, or computer resources without the permission of the owner.
  3. Misrepresenting your identity, role or the identity of any other person in any type of electronic communication.
  4. Misusing the College's computing resources so as to reduce their efficiency or to affect access to the detriment of other users.
  5. Breaching or attempting to breach computer security systems, whether with or without malicious intent.
  6. Engaging in any activity that might be harmful to systems or to any stored information such as creating or propagating viruses, worms, Trojan Horses, or other rogue programs, disrupting services, or damaging files.
  7. Violating copyright and/or software license agreements.
  8. Using computing resources to threaten or harass others or transmitting obscene or fraudulent messages.
  9. Using computing resources for commercial or profit-­‐making purposes.
  10. Installing or operating computer games on College owned computers for purposes other than academic instruction.
  11. Downloading or posting to College computers without authorization.
  12. Using personal wired/wireless routers and hubs is prohibited.


Policies and regulations of the college, including the Student Honor Code, and state and federal law, are applicable to computing resources.


Addendum to Responsible Use Policy for Residence Hall Ethernet Connections and use of personally owned computing equipment (not owned and supplied by the College)

  • A user is responsible for ALL activity of any equipment logged into the network under his/her username.
  • Network activity is monitored by Information Services for security violations, misuse, load balancing and resource usage.
  • Users are responsible for the security of their own machines. Any user enabling network services allowing others network access to his/her machine does so at his/her own risk. Protection from virus and Trojan horse programs are the user's responsibility.
  • Servers (computers that allow incoming connections for file sharing or other services) must be authorized and approved by Information
  • Periodic network scans for Trojan horse programs and unauthorized servers are done by Information Services. If one is found a user’s computer the user will be notified and will be required to disable it.
  • Reports of unauthorized use by personally owned machines from off campus sites will be investigated by Information Services and may result in the disconnection of the computer from the network.
  • Violations of these policies or software/hardware malfunctions causing detriment to the network will result in the disconnection of the computer from the network.
  • TCP/IP is the only protocol required on the network. Use of other protocols will not be supported.