Skip to main content

Policy Statement: Appropriate Internet use should always be legal and ethical, reflect academic honesty, and show restraint in consumption of the shared resources.

Rationale: Users are responsible for maintaining an environment free of malicious, inappropriate, or illegal acts. Unacceptable uses of the computer system will result in the revoking of computer access.

Unacceptable Use

Examples of unacceptable use are (but not limited to):

  1. Using the network for any illegal activity, including violation of copyright or other contracts.
  2. Transmitting of any material in violation of any U.S. or state regulation, threatening or obscene material or material protected by trade secret.
  3. Using the computing resources of another organization’s network in violation of its rules.
  4. Using the network for financial or commercial gain.
  5. Degrading or disrupting equipment or system performance.
  6. Vandalizing the data of another user.
  7. Gaining unauthorized access to resources or entities.
  8. Invading the privacy of individuals.
  9. Using an account owned by another user.
  10. Posting personal communications without the author’s consent.
  11. Using inappropriate language, pictures, text, or other data on the computer or network.
  12. Obtaining a file transfer without permission.
  13. Engaging in activities that relate to material involving the sexual exploitation of minors as defined by Federal Code Title 18, Part I, Sexual Exploitation or other abuse of children.

Computer Safety

  1. Users are responsible for maintaining a safe environment.
  2. Users will keep passwords secure.
  3. Users will change passwords when directed by the Director of IT or Network Administrator.
  4. Users will agree that the administration, faculty, and staff can request that the IT Department close a student’s account when inappropriate behavior by a student occurs. Such action must be approved by Administration.
  5. Users will agree that Administration will decide what inappropriate use is and their decision is final.


  1. Any user identified as a security risk or having a history of problems with other computer systems may be denied access.
  2. Vandalism is defined as any unauthorized access and/or malicious attempt to harm or destroy data of another user. This includes, but not limited to, the uploading or creating of computer viruses. Users will be accessed the cost of damage to the computer or computer application.
  3. Users are responsible for maintaining an environment conducive to learning.
  4. Users will display college appropriate conduct when using the computer equipment or network.
  5. Users will adhere to printing guidelines as directed by staff. f.
  6. Users will be supervised by staff at all times.
  7. Users will keep use areas clean and free of food and drink.
  8. Users are responsible for maintaining an environment in which resources and responsibilities are shared equitably between users.
  9. Users will use only software which has been assigned by staff.
  10. Users will agree that the computer systems are set up by the IT Department and will not alter them in any way.
  11. Users will agree that use of the Internet is a privilege, not a right, and inappropriate use will result in the cancellation of those privileges.


Manhattan Area Technical College Institutional Policy and Procedure Manual Policy No. 9.1.2

“Manhattan Tech was
critical to my success ...”

More Student Experiences >>