Additional Information and Frequently Asked Questions (FAQs)

There is a new Apple MacBook Pro model available. Why am I (sometimes) getting a previous version?

Every academic year, Berklee strives to provide students with a known, tested, and supported laptop platform for the curriculum. At times, this laptop may not be the absolute latest model released by Apple. Berklee endeavors to provide a proven, stable technology environment in which students can learn and faculty can teach. Therefore, we must evaluate, test, and be able to support all computers and software prior to distribution. In addition, to the extent possible, we try to keep the overall package affordable. We always endeavor to maintain classroom and educational continuity, however computer models and software applications in the package can change at any time.

How do I learn about my new laptop package?

There are many avenues available for students to learn about all of the components in their laptop package:

  • Training classes are offered by the Learning Center. Students are strongly encouraged to attend these classes in order to obtain the greatest benefit from their computer and the resources available at the college. Also, the Learning Center offers a variety of classes that students can take throughout the year. For more information, please contact the Learning Center.
  • Part of the content of the required first-semester course MTEC-111, Introduction to Music Technology, will focus on computer basics.
  • Students can contact the Student Computer Support Center at 617 747-8800 or via email at

Are the software products included in the Berklee Laptop Package transferable to another individual?

No. All software products are registered to the individual who purchases or is waived from the laptop package. The software products are not transferable to any other individual. Software included in the Berklee Laptop Package is intended solely for the purchaser.

Why is a carrying case or bag not included?

Individual needs and preferences vary, so most people prefer to select their own personal style, color, and quality.

To protect your investment, you are advised to purchase a backpack or carrying case specifically designed and padded for laptops. When shopping for a carrying case, ask whether the store carries any models designed to carry laptops less conspicuously. Such cases will reduce the risk of theft.

Check out the Berklee Bookstore, located at 1090 Boylston Street, and at

Is a printer necessary? What printing resources are available at Berklee?

It is not necessary to purchase a personal printer. We suggest that students wait and make a purchase decision about a printer after they determine their printing needs and become more familiar with the printing resources available at the college. Berklee's Media Center provides print stations where students can connect their laptops and print documents.

Can I bring my own laptop or desktop computer?

Yes. However, all entering students are still required to own an Apple laptop that meets the college's requirements.

If my laptop needs repair, is a loaner computer available?

Should your laptop need repair, computing resources (both computers and external equipment) are available in various college labs.

General Computer Usage Policies

  1. Students are responsible for knowing, understanding, and following established procedures for connecting a laptop computer in any Berklee technology lab and classroom, and to any workstation. Labs, classrooms, and workstations may have different policies and procedures. Some Berklee labs may not support students connecting laptops to workstations.
  2. All software licenses are registered to the student who purchases the laptop package.
  3. Software licenses are not transferable to any other individual.
  4. Software included in the Berklee Laptop Package is licensed solely by the purchaser; software may not be co-licensed.
  5. Students using "cracked," "hacked," or illegally obtained versions of software may be reported to appropriate college offices for disciplinary sanctions.

Technical Support Policies

  1. Berklee's Student Computer Support Center staff will provide support services for only those computers that are owned by students enrolled at Berklee. Desktop computers do not meet the laptop requirement and will not be supported by the Student Computer Support Center.
  2. The Student Computer Support Center is not responsible for backing up information on computers.
  3. The Student Computer Support Center will provide support services only for software approved by the college.

Acceptable Use Policy

Berklee's acceptable use policy applies to all members of the Berklee community. Ignorance of the acceptable use policy is not considered an excuse for violation of the policy. Violation of the acceptable use policy will lead to disciplinary action up to and including separation from the college.

Section I: General guidelines

To support its educational mission, Berklee College of Music provides numerous information technology resources for use by the Berklee community. The use of these resources must be consistent with the goals of the college. As a member of the Berklee community, you are expected to act responsibly and to follow the college's guidelines, policies, and procedures in using information technology and electronic networks accessed by such technology. The college's acceptable use policy includes the following guidelines and the requirement that each Berklee community member, including faculty, students, staff or other users:

  • Respect the rights of others to freedom from harassment or intimidation. Sending of abusive or unwanted material causing the work or college experience of others to be disrupted is a violation of college policies, may violate the law, and is unacceptable.
  • Respect copyright and other intellectual property rights. Copying files or passwords belonging to others will be considered a violation of college policies, a violation of law, and may constitute fraud, plagiarism, or theft. Software licensed by the college must only be used in accordance with the applicable license. Modifying or damaging information without authorization (including but not limited to altering data, introducing viruses, or simply damaging files) is unethical, a violation of college policies, and may be a felony in Massachusetts.
  • Identify yourself clearly and accurately in electronic communication. Anonymous or pseudo-anonymous communications appear to dissociate you from responsibility for your actions and are inappropriate. Concealing your identity or misrepresenting your name or affiliation to mask or attempt to distance yourself from irresponsible or offensive behavior is a serious abuse and a violation of college policies. Using identifiers of other individuals, including using such identifiers as your own, constitutes a violation of college policies and constitutes fraud.
  • Abide by security restrictions on all systems and information. Distributing or making your password or another person's password or access code available to others or otherwise attempting to evade, disable, or "crack" password or other security provisions or assisting others in doing so threatens the work, privacy, and well-being of many others and is a serious violation of college policies, grounds for immediate suspension of your access privileges, and other disciplinary action.
  • Recognize limitations to privacy in electronic communications. You may have an expectation that the contents of what you write or otherwise create, store, and send may be seen only by those to whom you intend or give permission; however, the security of electronic information on shared systems and networks is approximately that of paper documents in an unsealed envelope — generally respected, but breachable by someone determined to do so. Also note that, as part of their responsibilities, technical managers or other persons may need to view the contents to diagnose or correct problems.
  • Accept responsibility for your own work by learning appropriate uses of software to maintain the integrity of what you create. Learn and properly use the features for securing or sharing access to your information on any computers you use. Change passwords frequently and do not share them. Maintain at least one backup copy of all important files, and diligently backup all work in progress at regular intervals.
  • Use resources efficiently. Accept limitations or restrictions on computing resources, such as storage space, time limits, or amount of resources consumed, when so instructed by the college. Such restrictions are designed to ensure fair access for all users.
  • Resources may be used for lawful and permitted purposes only. Use of resources for unlawful purposes or for use not specifically permitted by the college, or assisting another in such use, is a serious violation of college policies and grounds for disciplinary action and other sanctions. The college extends college policies and procedures for use and access to information technology and systems that are outside the college and accessed via college facilities. Network or computing providers outside the college may additionally impose their own conditions of appropriate use for which you are responsible.

When necessary, in the college's discretion to maintain continued reasonable services to the rest of the community, or in cases of irresponsible use, departments providing resources, such as Information Technology, may suspend privileges and may disallow connection of computers (even personal computers) to the campus network or take or recommend other action necessary or appropriate. You are expected to cooperate with investigations (by resource managers or others at the college) either of technical problems or of possible unauthorized or irresponsible use as defined in these guidelines, in other guidelines, policies, or procedures, or as may otherwise be identified by the college from time to time; failure to do so may be grounds for suspension or loss of access privileges and other disciplinary action, as indicated in the acceptable use policy, below in the online network services policy, or as otherwise determined by the college. Information Technology or the Office of Student Affairs will investigate and document apparent or alleged violations of these guidelines. Cases of apparent abuse or violation of college guidelines, policies, or procedures will be referred to the appropriate college department and other action may be taken.

Issues concerning these guidelines or allegations of harassment or other irresponsible use of information technology resources should be brought to the attention of the associate vice president for information technology in writing.

Section II: Online Network Use

Berklee College of Music has computers capable of accessing the Internet, the World Wide Web, and other online computer networks (collectively, "online networks"). We encourage members of the college community to use online networks for educational purposes under the appropriate circumstances. However, in order to protect our rights and the rights of others and to lessen exposure to potential liability resulting from the nature and use of information a student, faculty member, or staff member posts on or transmits through online networks, certain rules must be followed. Anyone who violates college policies, including those set forth in the Berklee College of Music Student Handbook, Faculty Handbook, or Staff Handbook, others adopted by the college from time to time, or applicable law, shall be subject to sanctions, including, without limitation, prohibiting connection to or use of any campus network, disallowance of the privilege to connect computers to the campus network, prohibiting use of any of our computers to access any online network, fines, restitution, probation, suspension, expulsion, termination of employment, or other action (or any combination thereof).

  • Passwords. You may be given passwords we have selected for accessing online networks ("Berklee passwords") and be authorized to use one or more Berklee passwords for specific purposes. You are responsible for maintaining all Berklee passwords in confidence and for not disclosing or making any available to third parties without our prior written consent. You will be held responsible and will be liable for any harm resulting from your disclosing or allowing disclosure or improper use of a Berklee password.
  • Online Conduct. Online networks shall be used only as permitted by the college, only in accordance with applicable college policies, and only for lawful purposes. Any conduct that, in our sole discretion, restricts or inhibits others from using an online network or violates college policies or applicable law is not permitted and will be subject to sanction and disciplinary action. You are prohibited from posting on or transmitting through any online network any unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, profane, hateful, racially or ethnically demeaning or threatening, or otherwise objectionable material of any kind, including, without limitation, any material which encourages conduct that would constitute a criminal offense, give rise to civil liability, or otherwise violate any applicable law or college policies. We reserve the right to restrict and/or interrupt communication through or by use of any of our computers or computer services, including communication which we believe to be harmful to the college or to others, communication using applicable online networks, or communication that is a violation of college policies or any third-party rights. More specifically and without limitation, the following conduct violates college policies and is not permitted:
  • Offensive Communication. Use of vulgar, abusive, or hateful language is prohibited.
  • Harassment. Targeting another person or organization to cause distress, embarrassment, injury, unwanted attention, or other substantial discomfort is harassment that is prohibited. Personal attacks or other action to threaten or intimidate or embarrass an individual, group, or organization, or attacks based on a person's race, national origin, ethnicity, handicap, religion, gender, veteran status, sexual orientation, or another such characteristic or affiliation, are prohibited.
  • Offensive Graphic Files. Transmitting sexually explicit images or any other content we deem to be offensive through or posting on any online network is prohibited.
  • Impersonation. Communications under a false name or designation or a name or designation you are not authorized to use, including instances in conjunction with representing that you are somehow acting on behalf of or under the auspices of Berklee College of Music, are prohibited.
  • Chain Letters and Pyramid Schemes. Transmission of chain letters and pyramid schemes of any kind are prohibited. Certain chain letters and pyramid schemes are illegal. Letters or messages that offer a product or service based on our utilizing the structure of a chain letter are also of questionable legality.
  • Improper Advertising, Solicitation. Use of any online network to send unsolicited advertising, promotional material, or other forms of solicitation to others is prohibited, except as permitted by law and when not prohibited by college policies and in those areas that are designated for such purpose, such as, for example, a classified ad area.
  • Improper Use of Copyright and Proprietary Information of Others. You may, subject to college policies and authorization, upload to software files or otherwise distribute on online networks only information, software, photographs, videos, graphics, music, sounds, and other material (collectively "content") not subject to any copyright, trademark, trade secret, or other proprietary rights of others, or content in which the author has given express written authorization for online distribution. Any copyrighted content submitted or used with the consent of the copyright owner should contain a phrase such as, "Copyright owned by [name owner]; used by permission." Unauthorized transmission of copyrighted or other proprietary content is prohibited and constitutes a violation of college policies and could subject you to criminal prosecution as well as personal liability in a civil suit, in addition to other sanctions.
  • Use of Berklee College of Music Name. Without the college's prior written consent, you may not under any circumstances use the name "Berklee College of Music" in any form or use any symbol or logo or graphic used by or associated with Berklee College of Music alone or with the name "Berklee College of Music" or any name, symbol, logo, or graphic confusingly similar to Berklee College of Music's name, symbols, logo, or graphics as part of an email address, a "home page," or a second or higher level domain name for any online network you utilize, originate, or register with the internet or similar authority. Unauthorized use of the name "Berklee College of Music" or any symbol, logo, or graphic used by or associated with the college or anything confusingly similar thereto is a violation of college policies and subject to sanctions.