Technology Acceptable Use Policy

Computing resources are provided to support the educational, student life, and community programs of Ursinus College, and any use of these resources for purposes unrelated to college programs is expressly prohibited. Unauthorized and inappropriate use of college computing resources will result in sanctions that will vary depending upon the severity of the offense and could include the revocation of all computing privileges, the college issued laptop and other disciplinary sanctions. The full text of “Responsible Use of Ursinus College Information Technology Resources” can be found on the Ursinus College Information Technology web site.

Examples of unauthorized and inappropriate use of college computing resources includes (but are not limited to):

  • harassment of others
  • e-mail bombs or unauthorized mass mailings
  • unauthorized (actual or attempted) access or use of another’s account
  • unauthorized (actual or attempted) access or use of college or other computer information systems
  • deliberate attempts to disrupt services or debilitate computing systems
  • installation of inappropriate or unauthorized software
  • installation of inappropriate or unauthorized network services including wireless network services
  • copyright infringement
  • other inappropriate uses as designated by Information Technology