Users of computer systems and networks at Purchase College must read, understand, comply with, and electronically sign the Purchase College Computing Ethics Policy when you activate your account. You are responsible for your actions. That responsibility exists regardless of what security mechanisms are in place. Unauthorized use of computing facilities will lead to suspension or loss of privilege, and may lead to more serious penalties. All rules and policies must be adhered to by all users of Campus Technnology Services at Purchase College.
All users are expected to use these services in a responsible fashion.Student use of all computing resources and services is subject to the Community Standard of Conduct. Faculty and staff use of computing resources and services is subject to the SUNY BOT policies and to campus supervisory oversight.
The College provides a variety of services that are public within the college community, and others that are public to the world. These services include (but are not limited to) our Portal, ePortfolios, Student Web Publishing Directories, sections of our website, and Moodle, among others. Materials posted to any College site or service must be respectful and appropriate - offensive materials or speech may be removed and/or referred to Student Affairs or the appropriate College supervisor.
Security for Your Account
Do not consider e-mail private or secure. Purchase College does not encrypt e-mail. Mail can be easily intercepted at any machine that it passes through. lt can be altered and copies can be made and forwarded. Messages sent to nonexistent or incorrect addresses may be delivered to an unintended destination.
The systems administrator(s) at Purchase College have the right to monitor computer systems. The systems administrator(s) have the right to examine user files to diagnose system problems or investigate security breaches.
The Internet is not secure. If you are going to transmit sensitive data or files across the Internet you must take precautions to protect it on your own. Data and files can easily be intercepted, read, altered, misused or destroyed at any machine they pass through. In addition, machines attached to the Internet are vulnerable. Do not assume your data is safe on your computer if it is directly connected to the Internet. Do not store valuable or privileged information on these systems without applying security. If you can't afford to lose it, back it up. If it is information that should never see the light of day, don't store it on a networked computer.
Backup Your Important Data
Keep all valuable disks and tapes in a secure place. Secure backup copies of valuable files or data off site. When throwing out old disks or tapes, make sure no sensitive information can be found on them.
Intellectual Property and Piracy
Whenever you are shipping software from one place to another, you must consider intellectual property and license issues. The Internet is a global network, and the importing and exporting of software may fall under the jurisdiction of the United States Department of Commerce. Exporting anything may require a license. A general license covers anything that is not explicitly restricted, and is readily available in public forums in the United States. The exportation of networking code or encryption code is restricted. You may not allow access to a restricted machine to persons or entities outside of the United States. Please be aware when posting information to a bulletin board, that data will probably cross the border. If you have any questions on the legality of transmissions over the borders of the United States, please seek legal counsel.
Purchase College has joined Internet via an educational connection. Use of the Internet for commercial purposes is not allowed.
The following are considered unacceptable uses of computer systems, and are strictly prohibited
Your password is the only means you have of keeping your account and files secure. The algorithm that encrypts passwords has not been broken. However, it is possible for your password to be stolen when using the Internet so you are encouraged to change it often. More than 80% of computer break-ins are because passwords can be easily derived by hackers.
The following requirements must be met when choosing a password:
Individuals who are authorized to access sensitive or institutional data are prohibited from divulging that data to any other individual, unless that individual is also authorized to use the data. Individuals are only permitted to access data as authorized.
Game Playing Policy
Game playing is allowed on College computers as long as:
Denial of Service
You are responsible for the security of your account. Please read the policy on passwords. The following are symptoms of unauthorized trespass of your account. If you become aware of the following, please contact CTS at x6465.
VIOLATION OF THESE POLICIES WILL LEAD TO SUSPENSION OR LOSS OF PRIVILEGE, AND MAY LEAD TO MORE SERIOUS PENALTIES
Current CTS Hours
As of May 13th:
(basement of Social Sciences Bldg)
Tel (914) 251-6465
New! Equipment Loans Page