Electronic Resources Acceptable Use Policy

“FirstFive” supports an extensive information-technology environment for faculty, staff, students, and other members of the College community. The College’s general policies and codes of conduct apply to the electronic environment just as they apply in all other College settings. This Acceptable Use Policy (AUP) supplements these existing standards by describing the special rights and responsibilities that attach to use of the College’s “E-Resources” (as defined below). The Policy also explains the roles of those charged with maintaining, operating, and overseeing College E-Resources.

The entire community’s cooperation helps to ensure that high-quality E-Resources remain available for the many endeavors of the College and its constituents.


This Policy applies to all persons who access or use the College’s E-Resources (referred to in this Policy as “users”), including without limitation the faculty, staff, students, alumni, and guests of:
• ” FirstFive”,
• The Library,
This Policy applies to all information-technology and other electronic resources of the College (“E-Resources”), including without limitation:

• All computers, systems, equipment, software, networks, and computer facilities owned, managed, or maintained by the College for the handling of data, voice, television, telephone, or related signals or information;
• Any access or use of the College’s electronic resources from a computer or other system not controlled or maintained by the College; and,
• The creation, processing, communication, distribution, storage, and disposal of information under the College’s control.
In addition, members of the “FirstFive” community may have access to third-party electronic resources through their affiliation with the College, or of any other contracting party of the College. Use of these resources by members of the “FirstFive” community is governed by this Policy and any applicable policy or restriction of the third-party provider.

The staff of the ” FirstFive” Information Technology department (“IT Staff”) is responsible for the administration of this policy.


The College makes E-Resources available to support its academic and administrative goals, and uses of E-Resources to advance those goals take precedence over all others.

Within the College community, each person will have differing purposes for using and accessing E-resources; however, each person also has a shared responsibility to utilize those E-resources appropriately and to protect the resources from unauthorized access or use.

Authorized Uses

E-Resources may be used only for the purposes authorized by the College. These purposes generally comprise work, study, research, service, or student residential activities consistent with the College’s mission and priorities.

” FirstFive ” recognizes that many users participate in outside academic and professional activities that naturally complement the users’ on-campus commitments and enhance their contributions to the College. For example, faculty and staff are active in learned societies, professional associations, academic conferences, the preparation of scholarly publications, and other educational institutions’ tenure or departmental reviews, occasionally with incidental compensation. Use of E-Resources in connection with such activities is generally acceptable as long as the activities are otherwise consistent with ” FirstFive ” mission and policies. The College also acknowledges that limited personal use of E-Resources is compatible with the type of community that the College fosters in support of its broader goals. Such personal use, except by enrolled Amherst students, must be incidental at most and may not cause the College to incur additional costs. Above all, use of E-Resources for outside or personal purposes is always a privilege, not a right, and may not interfere with use for College purposes.

All use of E-Resources must comply with:

• all College policies, procedures, and codes of conduct, including those found in the student, faculty, and employee handbooks;
• all laws and regulations applicable to the user or the College; and,
• all relevant licenses and other contractual commitments of the College, as modified from time to time.
E-Resources may not be used, committed, or made available, without prior authorization of the Chief Information Officer in consultation with the Dean of the Faculty and the Treasurer, for:
• any ongoing business or other commercial activity not administered by the College;
• the benefit of persons or organizations other than the College; or
• Political or lobbying activities unless approved by the Office of Public Affairs.
The College has sole authority to determine what uses of E-Resources are proper and may prohibit or discipline use deemed inconsistent with this Policy or other applicable standards of conduct.


The College may send official correspondence to members of its community via electronic mail. Students, faculty, and staff, are expected to check their @FirstFive.com.ua email account regularly and are responsible for College information sent there. College employees are expected to use their ” FirstFive ” email account for all College-related communications.
The student remains responsible for any material not received because of any defect in the forwarding mechanism or the destination account.

Accounts and Access Restrictions

User IDs and passwords are the primary method used to authenticate users of the College’s E-Resources. They help prevent unauthorized access to E-Resources or any restricted information found within them. Users may not share their passwords with any other person and must protect them from disclosure by, for example, changing them regularly, monitoring access to their accounts, and contacting the College’s IT Staff if they suspect their passwords have been compromised. Users may be held responsible for all activity conducted using their IDs. Users must select strong passwords (meaning passwords composed of a mix of at least eight numbers, letters, and symbols and not including a word commonly found in a dictionary, or as required by the system at the time of creation). No person, including any member of the IT Staff, is authorized to request any user’s password.

All users must protect the College’s E-Resources from unauthorized access. Specifically, all users must:

• Take responsibility for the security and integrity of information stored on any personal or assigned desktop, laptop, or handheld system;
• Take care to access E-Resources only from secure environments and to log out of sessions before leaving any computer unattended;
• Take all appropriate precautions when accessing confidential or restricted College data to protect the data from unauthorized disclosures and from threats to its accuracy or integrity;
• Comply with requests from the IT Staff and other authorized personnel to cease use of E-Resources that compromises the E-Resources or the College; and,
• Cooperate with system administrators during investigations of improper use.
And, without authorization, no user may:
• Extend the network by introducing a hub, switch, router, wireless access point, or any other service or device that permits more than one device to connect to any College network;
• Provide any other person with E-Resources or access to them;
• Send e-mail chain letters or mass mailings for purposes other than authorized College business;
• Alter, remove, or forge email headers, addresses, or messages, or otherwise impersonate or attempt to pass oneself off as another;
• Obtain E-Resources beyond those allocated to the user, seek or gain access to data or user accounts for which the user is not authorized, or eavesdrop or intercept transmissions not intended for the user;
• Use the College’s Internet or other network access in a malicious manner or to alter or destroy any material which the user is not authorized to alter or destroy;
• Tamper with, modify, damage, alter, or attempt to defeat restrictions or protection placed on accounts or any E-Resources; or
• Damage computer or network systems; create or intentionally introduce or propagate computer viruses, worms, Trojan Horses, or other malicious code to any E-Resource; attempt to degrade the performance of the system or to deprive authorized users of E-Resources or access to E-Resources.
Copyright and other Intellectual Property

Users must respect intellectual-property rights, including copyrights, in all use of College E-Resources. All use of content, including text, images, music, and video, retrieved from E-Resources or stored, transmitted or maintained using E-Resources, must comply with copyright and other applicable laws. Copied material, used legally, must be given attribution in conformance with applicable legal and professional standards.

Software may be copied, installed, or used on College E-Resources only as permitted by the software’s owner or authorized licensor and by law. Proprietary software must be properly licensed, and users must strictly adhere to all applicable license provisions (including those concerning installation, use, copying, and the number of simultaneous users).

Respect for Others

Users must honor the rights of others to privacy, academic freedom, and freedom from harassment. Users may not use E-Resources to threaten or harass any person or to create a hostile place to work or study. In particular, users must honor others’ requests for the user to stop sending unwanted communications of any kind.

Users may not do anything to interfere inappropriately with others’ use of E-Resources, including by consuming E-Resources in excess.

Users’ Expectation of Privacy

The College recognizes the importance of privacy in an academic setting and does not routinely monitor a current user’s email, data, software, or other online activity. There are limited circumstances, however, in which the College may access, monitor, limit and/or disclose a user’s communications or other data on e-Resources without the user’s permission. These circumstances include the following:
• To maintain the integrity of its systems, network or data;
• When required by federal, state or local law, administrative rules, court order or other legal authority;
• To preserve the health and safety of individuals or the Amherst College community;
• When there are reasonable grounds to believe that a violation of law or a significant breach of College policy may have taken place and access, inspection or monitoring may produce evidence related to the possible misconduct; or
• To address a legitimate business need.
Such College access to a user’s communications or other data on e-Resources without the user’s permission will occur only with the approval of the President or Provost and the Dean of the Faculty (for faculty), Director of Human Resources (for administrators and staff) or Dean of Students (for students). In cases of emergency where necessary to preserve the integrity of the system, comply with laws or other legal authority, or preserve health and safety, the College may access, monitor, limit and/or
disclose a user’s communications or other data on e-Resources without seeking the above-described
permission. In that instance, the Chief Information Officer or designee will log any emergency access for
review by the President or Provost and Dean of the Faculty, Director of Human Resources or Dean of
Students, as the case may be.
Finally, the College cannot guarantee the security of those e-Resources against unauthorized access or
Oversight of E-Resources

Authorized employees of the College, including the IT Staff charged with the daily administration of the College’s E-Resources, may:
• Take all reasonable steps necessary to preserve the availability and integrity of E-Resources, including blocking any user’s access to E-Resources;
• Reject or destroy e-mail messages, e-mail attachments, and other files suspected of being spam or containing malicious code, such as viruses and worms;
• Exercise administrative authority over networks, systems, or software in order to grant users access to read, write, edit, or delete information in files or databases, to establish security controls and protection for information and E-Resources, or to address claims that intellectual-property or other rights have been violated;
• Employ a variety of security monitoring devices and tools to identify misuse or unauthorized use of E-Resources;
• With the approval of the Chief Information Officer or the Director of Systems and Networking, temporarily shut off the College’s Internet connection, servers, or services, without prior notice, in order to protect College systems, data, and users or to protect other important interests of the College;
• Temporarily or permanently terminate users’ use of E-Resources to investigate or remedy any threat to E-Resources or violation of this Policy; and,
• Exercise administrative rights over certain E-Resources, if those rights are delegated by the IT Staff.


The E-Resources and anything accessible on or through them are made available “as is” and “as available.” The College makes no guarantee that any E-Resource will be free of objectionable matter, errors, defects, bugs, viruses, worms, “Trojan horses,” or other destructive features. The College is not responsible for any harm arising from E-Resources or users’ reliance on them, nor is it responsible for any third-party content accessed using College E-Resources, including content made available by another College user or any third party.

This Policy is not a complete statement of the College’s rights or remedies, and nothing in this Policy waives any of those rights or remedies, including any rights in or to the E-Resources.

Changes to this Policy:

The College reserves the right to change this Policy at any time. The College will post the most up-to-date version of the Policy on the College web site and may, in its discretion, provide users with additional notice of significant changes. A user’s continued use of any E-Resources after any changes are published binds the user to the revised Policy.