Computer Policy

All users of computer resources are expected to act in a spirit of mutual respect and cooperation, and to adhere to the regulations for their use set forth here. As a user of CUNY computer resources:

  • You must have a valid authorized account to use computer resources that require one and may use only those computer resources that are specifically authorized. You may use your account only in accordance with its authorized purposes and may not use an unauthorized account for any purpose
  • You are responsible for the safeguarding of your computer account. For a mainframe computer account, you should change your password frequently and should not disclose it to anyone. You should take all necessary precautions in protecting the account, no matter what type of computer resources you are using.
  • You may not circumvent system protections.
  • You may not use any system to Produce system failure or degrade system performance.
  • You may not engage in any unauthorized system duplication, alteration or destruction of data, programs or software. You may not transmit or disclose data, programs or software belonging to others and may. Or duplicate copyrighted materials.
  • You may not engage in abusive or improper use of computer hardware. This includes, but is not limited to, tampering with equipment, unauthorized attempts at repairing equipment and unauthorized removal of equipment components.
  • You may not use computer resources for private purposes, including, but not limited to, the use of computer resources for profit making or illegal activities.
  • You may not use computer resources to engage in abuse of computer personnel or other users. Such abuse includes the sending of abusive, anonymous or unsolicited messages within CUNY or beyond using network facilities.
  • The use of Hunter computer resources may be subject to Hunter's regulations, and you are expected to be familiar with those regulations.

Hunter College reserves the right to monitor, under appropriate conditions, all data contained in the system to protect the integrity of the system and to insure compliance with regulation. Any user who is found to be in violation of these rules shall be subject to the following:

  • Suspension and/or termination of computer privileges
  • Disciplinary action by appropriate University officials
  • Referral to law enforcement authorities for criminal prosecution
  • Other legal action, including action to recover civil damages and penalties

 This was taken from the CUNY wide Computer Use policy document, found here.