RIT students are expected to reach for and uphold certain standards in their personal conduct, whether in class, on a sports field, or any other venue. Several pertinent documents for Microelectronic Engineering students at RIT include:
Code of Conduct for the Use of the Microelectronic Engineering and Semiconductor & Microsystems Fabrication Laboratory Facilities
Persons who violate this code may face one or more of the following actions: loss of facilities privileges, termination from the program, suspension from the Institute, and legal action by the Institute or other affected parties. Evidence of unsuccessful attempts to violate the code will be dealt with as if they were actual violations.
Examples of misuse of facilities include (but are not limited to):
The faculty of the Microelectronic Engineering program in the Kate Gleason College of Engineering at RIT has adopted the following code of conduct for the use of their facilities. Providing open, accessible facilities to qualified users is a primary goal of Microelectronic Engineering. Such an environment supports both formal course work and individual experimentation and innovation. The success of this policy, however, presumes a professional, ethical attitude on the part of all users. The purpose of this code of conduct is to explain some of the policies relating to the use of the previously mentioned facilities. Persons who violate this code may face one or more of the following actions: loss of facilities privileges, termination from program of study, suspension from the Institute, and legal action by the Institute or other affected parties. If you have any questions about this document, or whether an activity or use of facilities you are contemplating is permissible, ask the program director or SMFL faculty director. Within this document, the term facilities, refers to any and all hardware (computer systems, peripheral devices, modems, dialup lines, communication devices, network hardware, etc.), software (operating systems, language processors, etc.), information, and physical space provided by Microelectronic Engineering to support course work and research. A user is any person who makes use of (in any way, shape, or form) a Microelectronic Engineering facility or service; an owner is a user to whom an account or a service has been assigned by Microelectronic Engineering. MicroE and CE facilities are intended for use by students enrolled in MicroE and CE courses. When time and resources permit, non-course-related activities are allowed, subject to the control of the appropriate Engineering Lab Manager. The nature of your access to facilities and the privileges accompanying that access are determined by your relationship to the program (e.g., major, non-major, undergraduate student, graduate student, faculty, staff, etc.) It is your responsibility to find out about particular conditions of use for any equipment or service and to obtain proper authorization in advance of any use. In some cases, authorization may be as simple as receiving the password to an account; in other cases, it may require first determining the owner of a particular piece of equipment or service and then obtaining the owner's permission to use it. Using or attempting to use equipment or services without appropriate authorization is not acceptable, and is considered to be misuse of facilities. (For instance, permission to use a scanner for course related work is allowed; permission to use a scanner to duplicate materials that are protected by copyright is not permitted.) Note that any project assigned as part of a course is considered to be "acceptable use'' of facilities. Examples of misuse of facilities include (but are not limited to):
As a member of the RIT engineering community, you are expected to use the facilities with care, and must abide by all rules and regulations pertaining to their use.
The computer systems operated by MicroE and CE are intended primarily for academic-related computing needs. The support of recreational computer programs (e.g., games) is not a primary mission and is generally discouraged. Anyone who is not performing course work may be asked to allow others to use the facilities.
Engineering also provides access to a variety of electronic communications services as a service to users. These services include electronic mail (both local mail and mail to off-campus locations), the USENET distributed information system, gopher, and the World Wide Web (WWW). Access to these facilities is a privilege, which must be used with intelligence and discretion. Mail messages to off-campus locations should be short and to the point. Submissions to USENET are potentially accessible anywhere in the world. Information provided via WWW pages must be in accordance with these standards. In addition, since the WWW services use RIT equipment and facilities, the pages held by these systems reflect on the Institute and Department. As such, WWW page contents (and information accessible on RIT systems via these pages) must adhere to the highest standards of propriety and taste. Users who make use of these services in an irresponsible manner or who engage in libel, inflammatory postings, or illegal activities, will at the minimum lose these privileges. All users of the facilities at RIT are bound by the terms of the licenses and other agreements RIT have entered into. Many of these agreements restrict the ways in which the facilities, both hardware and software, can be used. Failure to observe these restrictions may result in legal action against you or RIT. It is RIT’s policy to apply the following restrictions to all computer systems and services:
Certain MicroE/CE facilities or services may have additional restrictions on their use; prior to gaining access to them, you will be informed of these restrictions.
RIT and Computer Engineering uses a variety of techniques to check compliance with this code of conduct. Evidence of unsuccessful attempts to violate the code will be dealt with as if they were actual violations. Similarly, programs, files, or other objects that appear designed to compromise this code may be considered proof of intent to commit a violation. Refusal to decrypt or otherwise reveal the contents of files suspected of containing incriminating information may be treated as admission that violations have occurred or were intended.