Members of the Dartmouth community have reasonable expectations of privacy in their use of information resources, in accordance with this policy. State and federal law, and Dartmouth policy, prohibits unauthorized access to computer and telephone systems. No one should use aliases, nicknames, pointers, or other electronic means to capture information intended for others without permission of the intended recipient. Attempts to gain unauthorized access to machines or computer records, to decrypt encrypted materials, to monitor other individuals' computer or network use, to attempt to obtain their passwords, or to obtain privileges or information to which the user is not entitled, are prohibited.
Information stored on an individual's account is presumed to be private unless the account holder has made the information available to others. If, for example, the account holder allows public access to files via file sharing, it is presumed that the account holder has waived his or her privacy rights to those files.
Systems operators, supervisors, and other College officials may access information resources to locate business information, maintain the system and network, comply with legal requirements, or administer this or other Dartmouth policies. Local area networks and local resources, including personal computers, workstations, file servers, printers, and similar devices, shall be subject to the same rights to privacy and confidentiality afforded centralized computer systems, regardless of whether those local resources are connected to any of Dartmouth's central information technology networks.
Some programs and networked services gather information about the people who use them. If such information could directly or indirectly identify a person using the program, then each user should be warned and given a chance to leave the program or service before data collection begins, a procedure referred to as a "privacy warning." To avoid issuing excessive numbers of warning messages, an exception is made for host operating systems and some networked utilities used by Computing Services that collect identifying information as part of their normal operation. A list of these exempted programs and services and the data that they collect is available from Computing Services and is provided in the Appendix. The provider of any program or service that gathers information about those who use it must either install a privacy warning or request Computing Services to place the program or service on the list of exempted programs.
No individual or organization shall install or use any device for listening to, observing, photographing, recording, amplifying, transmitting, or broadcasting sounds or events occurring in any place where the individual or group involved has a reasonable expectation of being free from unwanted surveillance, eavesdropping, recording, or observation, unless the student has first obtained the consent of all persons involved.
No individual or organization shall disseminate, cause to be disseminated or allow to be disseminated photographs or recordings occurring from any place where the individual or group involved has a reasonable expectation of being free from unwanted surveillance, eavesdropping, recording, or observation, unless the student has first obtained the consent of all persons involved. For purposes of this rule, consenting to being photographed or recorded is not consenting to the dissemination of those photographs or recordings.
A committee or other recognized College organization may authorize the recording or photographing of its proceedings; and performances, classes, lectures, programs, workshops, or other similar events may be recorded or photographed only where the sponsoring organization, faculty member, speaker or other party in charge of the event specifically authorizes such recording.
2008-2009 Student Handbook
Last Updated: 12/10/08