- b. to a large number of recipients, including users, newsgroups, or bulletin boards, at one time; send or post a message or email with deceptive, absent, or forged header or sender identification information.
- c. resell FIDM's services, in whole or in part, to any entity or individual.
- d. hold FIDM, or its affiliates to public scorn or ridicule.
- 7. Use the FIDM network or computer resources to play games, use non-FIDM chatrooms, download, display, perform, send, receive, or store any content that is obscene, pornographic, lewd, or lascivious.
- 8. Have food or beverages near computer terminals or in the computer labs.
- 9. Search, read, copy, alter, or delete another person's files or use another person's user ID or password, or share a password or Zoom link.
- 10. Transmit intimidating, harassing, threatening, discriminating, and inappropriate messages, or forge electronic communication via all platforms. Propagate chain letters or pyramid schemes, whether or not the recipient wishes to receive such mailings.
- 11. Communicate with their instructor via personal telephone number/mobile number or email address, text messaging or any social media, including, but not limited to, Facebook, Instagram, Snapchat, Twitter, or LinkedIn.
- 12. Use the FIDM network or computer resources to plagiarize or reproduce copyrighted materials, trademarks, or other protected material in any electronic form without express written permission from the material's owner. This includes FIDM's trademarks, college logo, and seal.
- 13. Distribute or duplicate copyrighted software or programs without appropriate licensing agreements. Access, send, receive, display, perform, disclose, store, or execute any content:
- in violation of any copyright, right of publicity, patent, trademark, service mark, trade name, trade secret, or other intellectual property rights.
- in violation of any applicable agreement, —OR—
- without authorization.
- 14. Distribute or reproduce, in any digital form, copyrighted music, video, or other multimedia content without the express written permission of the owner.
Violating this policy in whole or in part could result in restrictions to computer resources access or further disciplinary action by the college (such as dismissal
from school) and/or criminal prosecution by appropriate legal authorities.
The computer labs are designated for students working on academic projects. Out of consideration for all students, recreational computer use is not allowed at busy times when students with academic work are waiting. Use of computers for recreational purposes is not permitted within the classroom when the class is in session.
HOW TO AVOID PENALTIES
- Do not use file sharing software, (also known as peer-to-peer or p2p software) to download copyrighted media. Students MUST have the copyright owner’s permission or the download is considered infringing and illegal.
- Most programs that allow for the download of songs and movies without payment will share the recipient’s computer’s files and personal information to the Internet by default.
- Popular file sharing programs used to distribute and obtain media illegally include: DropBox, BitTorrent, Gnutella, Warez P2P and many others. While these sites are not illegal, they are used for illegal activities.
- Students should only use legal downloading or subscription streaming services, such as Amazon, iTunes, YouTube, and Netflix, to view media.
- Students should not share media obtained legally, except as the copyright holder permits (iTunes streaming, etc.). Most file sharing software, by default, finds, advertises and shares all music and movies on the recipient’s computer regardless of whether or not they have the right to share/upload these files.
- Students should protect their computers from malicious software by not installing file sharing software. While malware rarely installs file sharing software, that software is routinely exploited by criminals to provide a distribution channel for ‘free’ files that let them steal information. Students should make sure they have obtained virus scanning and malware detection software above and beyond what Windows or Apple provides by default.
REQUIRED COMPUTER SOFTWARE SPECIFICATIONS
Required computer specifications can be found in Student Activities, on the FIDM Portal, and on FIDM’s website at https://fidm.edu/en/admissions/parent+faq/.
FIDMCLOUD MAIL
Microsoft O365 provides the FIDM web-based email system for students and the email program is Outlook. Students are required to activate and maintain their FIDMCloud Mail account. FIDMCloud Mail is the official communications route for students to receive all school and class communication as well as access to additional programs, such as Adobe Creative Cloud, MS