Acceptable Use Policy


Marion Military Institute provides students with computer workstations in laboratories and in the library, and provides faculty and staff with computer access in offices. These workstations, software, and storage device contents are the property of Marion Military Institute. As part of campus resources, computers are connected to and have access to the Internet. Each user is responsible for his or her activities on computers and on the Internet. Activities which are illegal, harass others, and offend those working around one are not permitted and will result in loss of privileges.

Campus workstations and the resources they access are provided for course-related assignments, scholarly research, college business, and other activities directly related to the mission of Marion Military Institute. At the discretion of college personnel, resources may be used for recreational and casual use when they are not otherwise in use.

In all cases, computer use in support of the college’s mission will take precedence over recreational and casual use.

Access is a privilege, not a right: Marion Military Institute reserves the right to deny the privilege of the use of any or all types of computer technology to individuals who violate the Acceptable Use Policy.

Definitions and Application

This Acceptable Use Policy applies to all persons who use or attempt to use computer resources owned by Marion Military Institute. Computer resources include computers, networks, software, data, and other information technologies, whether located on campus or at an off-campus activity sponsored by the College. These resources are to be used in a manner that supports the institutional mission of Marion Military Institute.

Marion Military Institute provides Internet access on selected computers available to its students, faculty, and staff by participating in the Alabama Research and Educational Network (AREN), which is administered by the Alabama Supercomputer Authority in order to provide Internet access for academic, educational, and research purposes only. The College abides by the Acceptable Use Policy of AREN, which is available for view in the Office of Technology.

All Marion Military Institute regulations and existing state and federal laws apply, including not only those regulations and laws that are specific to computers and networks but also those that may apply generally to personal conduct and state-owned property.

Unacceptable Use

Users of computing resources belonging to Marion Military Institute will be held accountable for their conduct under this policy statement, any other applicable policies or procedures of Marion Military Institute, and/or state or federal laws and regulations. Use of computer information technology that is unacceptable includes but is not limited to the following examples:

  • Violating or attempting to violate copyright laws governing software and materials accessed by means of computer technology.
  • Violating or attempting to violate license agreements, including but not limited to making unauthorized copies of software or data owned by or licensed to Marion Military Institute.
  • Using software or data obtained by means that are illegal or contrary to the policies of Marion Military Institute.
  • Violating or attempting to violate Marion Military Institute security, including but not limited to circumventing data protection schemes, gaining unauthorized access, or decrypting secure data.
  • Accessing or attempting to access information belonging to another individual or Marion Military Institute office; or misrepresenting one’s identity, including but not limited to using another’s password.
  • Allowing an unauthorized individual to access an account or information, including but not limited to divulging a password or other sign-on information.
  • Intentionally executing, transmitting, or installing any program designed to damage or to place excessive load on a computer system or network, including but not limited to computer viruses, Trojan Horses and worms.
  • Creating, reproducing, or transmitting materials that are slanderous or defamatory in nature, that threaten violence, or that otherwise violate existing laws or regulations.
  • Displaying text or images that might be found offensive in a location that can be seen or read by others, including but not limited to text or images that are obscene or harassing in any way.
  • Using or attempting to use computer resources to harass others, to monitor others, or to disrupt their work.
  • Failing to abide by the provisions of this statement that give priority to educational uses of computer resources, including but not limited to using computers for commercial purposes or for recreational purposes while others need access for educational purposes.
  • Failing to abide by the policies, procedures, and regulations of the lab, library, classroom, office, or other facility in which the computer equipment is located.
  • Using or installing any software that has not been authorized by Marion Military Institute.
  • Overusing or overloading computer resources, including computer memory as well as paper and other supplies. Marion Military Institute reserves the right to periodically purge excessively large files and email files.
  • Damaging, destroying, defacing, or removing hardware, software, data, or supplies that belong to others or to Marion Military Institute.

Disciplinary Actions

Because access to information technology resources at Marion Military Institute is a privilege, abuse of this privilege is subject to campus disciplinary procedures and possibly legal action.

If the initial violation is minor or accidental, the situation will be resolved informally with the purpose of educating the violator. If the violation is repeated or is more serious in nature, Marion Military Institute may rescind or modify computer access privileges. Violations of local, state, or federal laws will result in the immediate loss of all Marion Military Institute computing privileges and will be referred to appropriate Marion Military Institute officials and/or law enforcement authorities.


Marion Military Institute has the responsibility of administering, protecting, and monitoring all computers, software, and networks owned or licensed by the college whether on or off campus, with the exception of privately owned computers in the possession of individuals for their personal use. Authorized personnel may monitor computer activity, including electronic mail, for the purpose of maintaining system performance and security. Users are expected to cooperate with investigations of violation of college policy.

Marion Military Institute reserves the right to require users to refrain from using any program or property of the college.


Marion Military Institute accepts no responsibility for damage to personal property or data caused by any Marion Military Institute computer system or connections including, but not limited to, malfunctions of hardware and software, computer viruses, Trojan Horses, and worms.

Marion Military Institute will not be liable for the actions of anyone, including students and employees, connected to the Internet through the college Internet access.

User Agreement

Using or attempting to use any computer or information technology resource of Marion Military Institute signifies the following:

  • The user agrees to comply with the provisions of this Acceptable Use Policy.
  • The user accepts responsibility for knowing the contents of this policy statement. Failure to read or acknowledge this statement will not be an excuse for noncompliance.
  • The user accepts that failure to comply with this policy may result in temporary or permanent denial of access to computer or information technologies, or in some cases may result in college disciplinary action or legal action.