Students are encouraged to check their MGC e-mail accounts regularly.
Authorized users may use College computing facilities and resources, including, but not limited to facsimiles, computers,
network file servers, network or system peripherals, computer data and program files, email and Internet accessibility, as
well as software available to students. These facilities and resources are the property of Middle Georgia College and are
intended for academic use only. It is important to remember that access to the Internet and shared system resources is a
privilege and not a right. Middle Georgia College prohibits the use of its electronic communications system for any illegal
The following regulations shall apply to all Middle Georgia College students regarding the use of the aforementioned systems:
Computing facilities, services, and networks may not be used in connection with compensated work nor for the benefit of organizations not related to Middle Georgia College.
Attempts by any person or group to circumvent system security, obtain passwords, or in any way gain unauthorized access to local or network resources either inside or outside the College's network system, is forbidden. One may not use another person's computing account, attempt to forge an account, or use a false account or e-mail address. Activities that are harmful to computing facilities and resources are prohibited. These include, but are not limited to, creating or propagating viruses; disrupting services; or damaging files, equipment, software, or data belonging to Middle Georgia College or other users.
Middle Georgia College prohibits the illegal duplication, use, storage or download of software, documentation or other materials; changing system software or hardware configurations without authorization; or disrupting or interfering with the delivery or administration of computer resources. Privately owned or non-standardized software may not be installed on any Middle Georgia College computer or network without the approval of the Offices of EAS and Instructional Technology.
Appropriate use should always be legal, ethical, reflect academic honesty, reflect College standards and show restraint in the consumption of shared resources. It should demonstrate respect for intellectual property; ownership of data; system security mechanisms and individual rights to privacy and freedom from intimidation, harassment and unwarranted annoyance.
In open access areas if a computer is needed for class-related work, a user who is not performing class-related work such as game playing must relinquish the workstation upon request. College computing and network services are not to be used for extensive or competitive recreational game playing.
All College rules of conduct apply to the use of computing facilities and resources. Use of computing facilities and resources for purposes that involve academic dishonesty is a violation of College policy.
Persons in violation of this policy are subject to the full range of sanctions, including the loss of computer or network access privileges, disciplinary action, dismissal from the College, and legal action. Please refer to the Student Handbook for details.