Information Technology Policies

General Student Technology Information

  • Students are not required to purchase computers for their NEC work.
  • NEC does not sell computers or software.
  • All College student receive an NEC account and email address automatically (details are below).
  • NEC Wifi is available throughout NEC’s new Student Life and Performance Center building. Students seeking Comcast Xfinity services (streaming tv and email) must do so through NEC’s Wifi services. Students are responsible for their own Comcast accounts.
  • Students are authorized to use public area and Computer Lab (SBG11) computers and NEC WiFi only.
  • General use computers are available within the Computer Lab, room SBG11. 

NEC Account and Password Information

All College students are issued an NEC account and password automatically. Details are available in the Office of Student Services (SB 224).

  • Never share your account or password information with anyone.
  • Students are *strongly* encouraged to change their initial passwords. Account passwords can be changed at any time by logging into web mail (see link below) clicking on “options” and choosing “change password”.
  • Students are responsible for all use of their accounts and information contained within.

NEC email information

All College students are provided with an NEC email account using the firstname.lastname@necmusic.edu format. To access your NEC email remotely, go to https://mail.necmusic.edu.

Campus Portal

Additional departmental specific information, web forms, and links to other resources are available on the campus portal available at https://my.necmusic.edu/

NEC’s Emergency Notification System

Student Cell phone information is collected during orientation and registration events. All student’s NEC email addresses and cell phone numbers are automatically enrolled within the Campus Emergency Notification System. All students are required to update the Office of Student Services with any cell phone telephone number changes and/or updates during the academic year.

NEC Wireless Service (WIFI)

The Campus Wireless is available for College students with an active account. Campus WIFI is available throughout campus including the Student Life and Performance Center, the Student Lounge in Jordan Hall, the SB 3rd floor classrooms and the 2nd and 3rd floor of the Jordan Hall building. For information on wireless access, please go to the Office of Student Services (SB 224). Wireless Internet access is a shared resource, so use only your fair share of computing resources.  Inhibiting or interfering with the use of the network and services by others is prohibited.

  • Students are allowed to use their personal mobile devices to connect to the campus wireless access service, only. Regrettably, voice controlled personal assistants, such as Amazon’s Echo/Dot, do not work directly with the NEC wifi system and must be connected to a mobile phone or tablet via a personal internet hotspot or sharing connection.
  • Non-NEC students must use the NECWIFIGUEST service, only. Any unauthorized use of the wireless service is strictly prohibited.

To Connect to NEC WIFI

     SSID= NECSTUDENTS

     Username = firstname.lastname

     Password = your NEC account password

Responsible and Ethical Technology Use Policy

Many users share the computing facilities at New England Conservatory. These facilities are shared and must be used responsibly by everyone.  All students are therefore required to exercise responsible, ethical and legal behavior when using the Conservatory’s computing facilities and services. The following list, though not exhaustive, provides some guidelines for responsible and ethical behavior:

  • Abide by all applicable laws. Do not violate any Federal, State, local law or ordinance.
  • Use only computers, computer accounts, and computer files for which you have been authorized. Unauthorized technology resource access is strictly prohibited.
  • Use technology resources for Conservatory related work, only.
  • Do not engage in unlawful, malicious or disruptive activities.
  • Do not view or distribute obscene, pornographic, profane, or sexually oriented material.
  • Do not violate laws, rules and regulations prohibiting sexual harassment.
  • Do not encourage the use of controlled substances for criminal or illegal purposes.
  • Do not create or distribute messages containing defamatory, false, inaccurate, abusive, threatening, racially offensive or otherwise biased, discriminatory or illegal material.
  • Do not deliberately obtain, create or distribute incendiary statements to incite violence or promote the use of weapons in the execution of a crime.
  • Do not send or post information that is defamatory to the Conservatory, its products/services, colleagues, employees, students and/or customers.
  • Do not obtain, share or exchange confidential, proprietary information, trade secrets, or any other privileged, confidential, sensitive or proprietary information.
  • Protect NEC’s data and the systems you use. Treat computing resources and data as a valuable Conservatory resource. Do not make unauthorized copies of NEC data.
  • Abide by all applicable copyright laws and licenses.  Do not download, copy or pirate software and/or electronic files that are copyrighted or without authorization. NEC policies and the law expressly forbid the copying of software that has not been placed in the public domain or distributed as “freeware” or “shareware.” Reproduction of copyrighted material is subject to the Copyright laws of the United States (Title 17, U.S.C.). Infringement of copyright may subject persons to fines and penalties.
  • The use of any NEC accounts, systems or networks for illegal file sharing, torrenting, etc. is strictly prohibited.
  • Take due precaution against the spread of computer viruses. Do not maliciously attempt to propagate viruses; attempt to gain unauthorized access to systems or accounts, applications or other data; intentionally cause congestion, disruption, disablement, alteration, impairment or intentionally jeopardize NEC’s networks or systems.
  • Do not modify or tamper with network wiring hardware and jacks. Network services and wiring may not be extended beyond the port provided. All IP addresses are the property of NEC. The retransmission or propagation of network services is prohibited without explicit permission. This includes the installation of hubs, switches, wireless equipment and/or any/all personal computer equipment. The NEC network may not be used to provide computer services or Internet access to anyone outside of NEC for any purposes.
  • Respect the privacy and personal rights of others. Do not access, attempt to access or copy another user’s electronic mail, data, programs, or other files without permission.
  • The following activities are specifically prohibited: disclosing your password to others; using somebody else’s account to gain access to NEC systems; use of illegal software on any NEC system or network; copying, altering or deleting someone else’s files without that person’s permission; forging messages; attempting to access accounts, passwords and systems; sending harassing or threatening messages; The sending of unauthorized anonymous messages; the sending of bulk unsolicited messages; reading someone else’s files without permission; system attacks; denial of services; and other malicious uses of the network and systems.
  • Report any violations. All are encouraged to report any violation of these guidelines by another individual and any information relating to a flaw in or bypass of computing facility security to the Dean of Students and the Information Technology Services department.

Monitoring Disclosure

Use of any NEC-owned technology service (i.e. account, email, wireless service, Internet, etc.) is a privilege granted by the Conservatory if such use does not violate this policy. Accordingly, NEC data and data traffic is not private and NEC reserves the right to monitor and/or access it with or without notice.

All technology services, components and data created or modified remain the property of NEC and are subject to monitoring, inspection and/or evaluation in order to assure technology service integrity; business operations and continuity and compliance with NEC policies and state and federal laws. Therefore, all users should not have any expectation of privacy when using technology services. Any unauthorized or inappropriate use discovered during such monitoring activities will constitute a violation of this Policy.

Violations of the Guidelines

Failure to comply with the above Conservatory policy constitutes a violation and may lead to disciplinary action and/or criminal prosecution. Individuals are encouraged to report information concerning instances in which the above guidelines have been or are being violated. In accordance with the established Conservatory practices, policies, and procedures, confirmation of inappropriate use of NEC technology resources may result in termination of access, expulsion from the Conservatory, termination of employment, legal action, or other disciplinary action.