COMEC: Examples

The following examples illustrate how these principles apply to the use of information technology at Rensselaer, but their use is not limited to these examples.

  • Publishing a home page on the WEB utilizing University resources is a privilege and not a right.
  • Publication of the material must be legal. An archive copy of Calvin & Hobbes GIF files, for example, without Watterson's permission would be inappropriate.
  • Deliberately preventing others from using a system or unreasonably slowing down a system without acceptable cause
  • Deliberately wasting computer resources (e.g., printing blank pages or unnecessary copies)
  • Rensselaer's computing network is a shared resource. Thus, network use or applications that inhibit or interfere with the use of the network by others are not permitted. (For example, using an IP address not registered to you, or applications which use an unusually high portion of the bandwidth for extended periods of time, thus inhibiting the use of the network by others, are not permitted.)
  • Abusing computing facilities at other sites through network connections from Rensselaer. In some cases this may be a violation of State and Federal laws, punishable by fines and or imprisonment.
  • Commercial use of university resources
  • Using email to solicit sales or conduct business, setting up a web page to advertise or sell a service, or posting an advertisement to a news group all constitute commercial use. Even if you use your own personal computer, but you use the University's network (either from a dorm room, office or via dial-in access from home), you are in violation of the policy.


  • Using another person's computer account without permission
  • Using a computer account for purposes other than those intended by the account administrator
  • Reading, changing, duplicating, or deleting files or software without permission of the owner or system administrator
  • Distributing information not intended for distribution by its owner (e.g., private notes, computer projects, theses, telephone access codes, passwords, and copyrighted material)
  • Tapping phone or network lines by running a network "sniffer" program to examine or collect data from the network is considered tapping a network.
  • Bypassing accounting mechanisms
  • Violating copyright or licensing agreements regarding software or software documentation
  • Using any computer facility to violate the Grounds for Disciplinary Action (e.g., harassment, fraud, falsifying information, academic dishonesty, etc.) Note: Harassment is that which is annoying or threatening to the person receiving the action
  • Attempting to modify system hardware or software without the permission of the system administrator
  • Using a computing account to create, distribute, or respond to chain letters
  • Modifying computer or telecommunications equipment without authorization

Suspected violations of any of these guidelines should be reported to the Help Desk in the Voorhees Computing Center (extension 7777 or for referral to the appropriate Institute office. Penalties for violations are determined by standard Institute procedures, such as the Student Judicial Process, the Faculty Handbook, or the Human Resources Guidelines, as well as state and federal laws.