Examples of Violations of the Acceptable Use Policy
The Acceptable Use of Information Technology Resources Policy contains general language of what you are allowed to do with IT resources which include your Colorado College email account, the campus network, and devices purchased with College funds (computers, tablets, etc). This page contains examples of acceptable use and unacceptable use. Just because it's not covered on this page, doesn't mean it is or is not allowed.
Examples
Unauthorized Account or System Use
- Family members and friends are not allowed to use computers purchased with College funds
- Writing down your password for someone else to access your computer or files; this includes voicemail PIN for a line assigned to you
Misuse of Information Technology resources
- hosting a commercial website
- Locking a computer to prevent someone else from using (who should use it)
- Attempting to fix a college-owned piece of computer, A/V, or network equipment
Copyright and License Protections
- Using improperly-licensed software
- Copying a full book to a digital format or as a paper copy
Harassment
- Online harassment is never acceptable
- Sending multiple messages concerning the same subject in a short amount of time.
- Signing another person up for multiple emails, newsletters, or online services without their permission
Confidentiality
- Acceptable:
- Encrypting an email with sensitive information to send to an approved study abroad program in another country
- Putting a list of student names and phone numbers into a CC-managed team for
- Unacceptable:
- Setting your CC email to forward to a personal email account
- Sharing your password with someone else
- Link to our data privacy / classification / data sharing policies
- Examples of submitting confidential/sensitive information when we have sensitive information that needs to be externally and internally communicated, options, and to reach out to the solution center for technical solutions.
- Sending or sharing a document with personal information in it with someone on or off campus who shouldn't have that information
- Storing/sharing CC information in non-CC approved online services: Dropbox, Google Drive, SurveyMonkey, Google Forms, Calendly, etc.
Privacy and Property
Violation of Privacy
Appropriate Connection Methods
Network Registration
Protection of the Network
Suspension or Revocation of Access
Additional Consequences of Misuse
Report an issue -
Last updated: 05/30/2025