Computer Use Policy

The Institute offers computing, information and technology resources in support of the Institute's mission to pursue the highest standards of learning, research, and instruction. Included in these resources are computers, classrooms, laboratories, and staff offices connected to the Internet through the Partners HealthCare System Inc.’s data network, network printers, proprietary software licensed for use on Institute computers, access to Internet resources, and access to databases and other electronic educational resources; primarily through MGH Treadwell Library. Students, faculty and staff are provided a logon to the Partners network and email address. All users must comply with and are required to sign the Partners’ Electronic Communications & Acceptable Use Policy. The use of these resources is a privilege, not a right of membership in the Institute community, and is non-transferable. It is intended solely for the administrative and educational purposes of the Institute community. These privileges are only made available to current students, faculty, and staff.

State and federal laws as well as official Institute policies govern usage of computing resources. In instances where data is transferred across the Internet or other networks, users are advised that acceptable use policies of those other networks may limit usage. Beginning March 2010, compliant with state law, all laptop computers and mobile devices connecting to the Partners network must be encrypted or pass code protected respectively.

The Institute reserves the right to change its usage policies and procedures at any time, including setting limits or prohibiting access, and to limit individual storage space on network servers.

User Responsibilities - Users agree as a condition of use to accept personal responsibility for considerate, ethical, and responsible behavior in using available resources including:

  • Respect for the rights of others including privacy and freedom from offensive intrusion.
  • Respect for intellectual property and ownership rights.
  • Adhering to all applicable copyright laws and licenses, copying only software distributed as 'freeware' or 'shareware.' Infringement of copyright laws may subject persons to fines and/or imprisonment.
  • Understanding and implementing basic user skills.
  • Insuring account and network security.

Unacceptable Use

Unacceptable use includes but is not limited to:

  • Use of resources for commercial purposes of any type.
  • Transferring use to another individual or organization without prior approval of the Chief Information Officer.
  • Unsolicited advertising.
  • Promoting or procuring pornography.
  • Creating, sending, or forwarding electronic chain letters.
  • Harassment of others.
  • Violation of state and/or federal laws or Institute policies.
  • Misrepresentation of identity and/or account.
  • Creating and/or willfully disseminating a computer virus.
  • Promoting personal agendas.

Security

Security of systems and data is an issue that the Institute takes very seriously. The Institute will take all necessary measures, within the limits of available resources, to ensure the security and integrity of the system. This includes, but is not limited to, the daily archiving of all data on the network server, the use of firewalls, and the maintenance of system passwords and appropriate user access.

As a matter of policy, the contents of users' files or email are not monitored and individual privacy is respected whenever possible. However, in the event of system failure due to corrupt files, monitoring of data may be necessary to maintain the proper operability of the system. In such an event the owner of the files will be provided notice whenever possible. Because of the proliferation of hackers, the privacy of individual files cannot be guaranteed.

Access to offices may be necessary for troubleshooting and routine maintenance or upgrades. In these instances prior notice will be given whenever possible, but in the event that contact cannot be made within a reasonable amount of time, access may be necessary without explicit consent. In these events, only the Office of Information Technology staff will access such offices.

Addition of Software and Hardware

The Institute will make every attempt to ensure the functionality of standard network hardware and software on available computers. This functionality cannot be guaranteed if the user adds hardware and software after the computer's original configuration. Hardware or software that is incompatible with network resources may be disabled. Workstation users should allow ample free disk space on their hard drives at all times.

In addition, the following policies apply to Institute computers available in classrooms, labs, and study areas:

  • Use of Institute facilities is limited to current Institute students, faculty and staff. Use by other persons is strictly prohibited.
  • Academic work by students takes precedence over all other uses of the computers. The primary function of these resources is for work-related academics. All other uses are considered secondary. Persons engaged in recreational usage will relinquish the computer to students needing the computer for academic work.
  • Files are to be saved to the user's own Partners provided Home Drive (H: Drive) or encrypted USB drives or other similar media and not to the computer’s hard drive. It is the user's responsibility to provide his/her own media. Files saved on the hard drive will be deleted without notice.
  • Software that is copyrighted may not be copied. Students may not install any software program or utility on Institute computers without written permission of the Office of Information Technology.
  • Only software that is properly licensed will be installed on Institute computers.
  • Students may not remove any icons or programs from Institute computers, nor alter any programs.
  • The Institute assumes no responsibility for lost or corrupted data on any computer.
  • Students should limit their time on the computers to two hours unless there are no other users waiting.
  • External storage media should be scanned for viruses each time one is inserted in the computer.
  • Students are responsible for properly exiting (logging out) any programs and Windows.
  • If a technical problem occurs with either the hardware or software, users should not try to fix it but contact an Institute Information Technology staff person immediately.