General Computer Use and Security

The following guidelines have been established to provide information regarding standard computing practices and methods to protect yourself and your information. We ask that all users take steps to protect the campus network and our computing environment. Please review and follow the Acceptable Use Policy and Agreement, as well as the guidelines listed below.

1. Individual usernames, unique passwords, and system access codes are created to provide students with an appropriate working environment. Please take care to protect this information. Never share this information under any circumstances. Remember, you are responsible for any activities associated with your account. Administrators, employees, or other students should never ask for or be given your password. Under no circumstances should you give your account access information to anyone or log in as anyone else.

2. Log off the computer when you are done using it. If you don’t log off, someone else can use your active session. The most simple and effective security practice is to log off your computer when you leave. For Windows XP computers, click "start", and select "log off." Click "OK" to log off.

3. Selecting good passwords and changing passwords on a regular basis is very important. An effective password is one that is difficult for an intruder to guess. Your password must be 4-6 characters and should contain at least one alphabetic, one numeric, and one non-alphabetic character such as an @, #, or %. Try to avoid simple, obvious, or predictable passwords like names, nicknames, birth dates, the names of pets, places, or any other information that is easily available to others. Also avoid simple keyboard patterns such as 12345. These can be easily spotted when you are typing them. Do not store written passwords in obvious places such as under keyboards, on a calendar, or in open file areas. You should always change default passwords and initial access passwords as soon as possible. Construct your password using a system so that you can remember it whenever you need it without having to write it down to jog your memory. An example of a good password that meets these recommendations is an acronym or a quotation. For example, "I like to ski with friends" would become "il2swf" - a tough password to crack.

4. The transmission or distribution of offensive, obscene, or harassing material is prohibited.

5. SUNY Broome maintains a host of servers and applications for which your account has access for valid use. Use of college systems, in particular Email and Internet, are to be used only to conduct college business. All activities conducted on college systems are considered the property of the college and are open to access, investigation, and review by Information Technology Services staff. Swift corrective action may be taken if abusive or threatening situations are identified. Further, individual users should be aware that their communications and actions could be subject to request for disclosure, and are not exempt from New York State or Federal Law.