Acceptable Use Policy

Centre College provides computing and networking services for Centre students, faculty, and staff. Members of the Centre College community are provided with a network account that will be used to access all services (shared computers, e-mail, Centrenet, etc.). Computer and networking services are provided to users in accordance with the principles of free speech and free and open access to information and communication. Centre College does not filter or monitor what services a student accesses while online, however some services, such as Peer-to-Peer file sharing, are blocked to ensure the stability of the college network and to ensure the College is compliant with all applicable copyright laws.

A Centre College network account is a privilege, and the following usage guidelines have been established for this system.

  1. Users are expected to act ethically, responsibly, and legally or risk forfeiture of their network accounts. Unacceptable conduct may include:
    1. Maliciously interfering with normal ability of others to use computer and network resources
    2. Masquerading as another user
    3. Violating the privacy of others’ files and accounts
    4. Violating software copyright and/or licensing agreements
    5. Abusing computing facilities or devices at other locations through network connections from Centre College
  2. Use of a Centre College network account must comply with all federal, Kentucky, and other applicable law; all applicable contracts and licenses; and College policies as articulated in the Student, Faculty, and Staff handbooks. These laws, contracts, licenses, and policies include the laws pertaining to defamation, privacy, civil rights, copyright, trademark, obscenity and child pornography; the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, which prohibit “hacking,” “cracking,” and similar activities; and the College’s sexual harassment policy.
  3. Centre College respects the privacy of all electronic communications. However, the College cannot guarantee confidentiality. Due to limitations in technology, electronic messages and stored data are inherently insecure. In order to maintain, repair, or develop the campus network, ITS staff will have reasonable access to the information in files and messages when necessary. Such access will be governed by the normal expectations of professional conduct.
  4. When there is an indication that a misuse of computer facilities has occurred, the Chief Information Officer and Director of Information Technology Services is authorized to investigate the incident and take appropriate action, including referring the issue to other college authorities.