Information Technology (IT) Security

To secure information at Mount Aloysius College, all student, staff, and faculty users are responsible for taking precautions to maintain the security of information stored on or accessed from their computer or account.  This also includes but not limited to any personal data that you may intentionally or inadvertently share.  Never share your password with anyone. You are responsible for any accidental or purposeful deletion of files or records resulting from your user ID. If you believe someone is using your ID and password, notify the IT Department immediately so a new password can be created.


In the event that any equipment or file storage equipment is lost or stolen the user must notify the IT Department immediately.


By sharing accounts and passwords with other individuals, the user is then responsible for any data or network equipment accessed from that account and password. Failure to comply with this policy may result in Mount Aloysius College disciplinary procedures as well as criminal or civil prosecution.


Terminals and computers should be logged off when unattended, and the office door should be locked and secured. If computers are unattended for extended periods of time, the computer should be restarted so the Novell Login screen appears. Making this part of your daily routine will provide the College with an added layer of security and prevent any unauthorized access to the College’s computer system. By performing these simple procedures, you are forcing anyone who uses your computer to enter his or her own ID and password to gain access to the network.


The network and all computer systems are owned by Mount Aloysius College, and the College maintains the right to provide further regulation, as it deems appropriate, to limit use or access, deny access, and to monitor the systems for security purposes. Mount Aloysius College will respect individual privacy, but maintains the right to monitor the use of technology, including email. The College expects users to be responsible in their use of the system. If the College determines it necessary or appropriate, monitoring of all resources may be instituted in order to ensure reasonable maintenance of hardware, software, data, network traffic or security.