Prohibited Uses

In general, any uses of the College’s computer facilities which infringe upon another individual’s right to privacy, adversely affect the user community (be it the College or Internet community as a whole), are not allowed under the terms of our software licenses, or are in violation of local, state or federal law, are prohibited. For example:

  • Kalamazoo College’s computing resources may not be used for any activity which is contradictory to the educational goals or operational policies of the College.
  • Kalamazoo College’s computing resources may not be used for any activity which violates the College’s policies on academic honesty or the College’s Honor Code.
  • Kalamazoo College’s computing resources may not be used for any activities which intimidate, threaten or harass individuals, or which violate the College’s policies concerning relationships between individuals or groups.
  • Kalamazoo College’s computing resources may not be used by individuals for personal profit-making or commercial purposes, or to personally support a non-profit group or organization unless special arrangements have been made with the Chief Information Officer prior to such use.
  • Kalamazoo College’s computing resources may not be used for personal political campaign activities nor in support of or against anyone running for any local, state or federal office.
  • No person may possess or use computing equipment or programs or engage in activities which violate or hamper another person’s use of computing resources. Prohibited behavior includes but is not limited to:
    • a. using programs that attempt to control terminals, obtain another user’s passwords or acquire another user’s files,
    • b. renaming, deleting, or otherwise manipulating files without proper authorization,
    • c. handling equipment in a manner that may cause physical damage or,
    • d. knowingly distributing computer viruses.
  • Unauthorized reading, copying, deletion or modification of someone else’s data or electronic mail, unauthorized use of another person’s password, or distribution of a personal account password is not allowed.
  • The sending of obscene or abusive messages, chain letters, mass mailings, viruses or other forms of electronic mayhem is expressly forbidden.
  • The tampering with, destruction of, or removal/theft of security devices or codes from any Kalamazoo College computing equipment is illegal and prohibited.
  • Users of the Kalamazoo College network may not use peer-to-peer file sharing programs, including, but not limited to, Kazaa, Gnutella, Morpheus, Audiogalaxy Satellite, Win MX, etc. Please also refer to related policies regarding unlawful distribution of copyrighted materials, which is also a violation of the Kalamazoo College Honor Code.