Personal computers – desktop or portable – are provided by the University for many employees as a part of their work environment. The following guidelines for the care and use of these computers should be observed by all employees:
Licenses are to be purchased for all copies of software on university computers and users are responsible for observing license and copyright restrictions of all software and documentation. Usually this means that commercial software may not be copied to other machines and documentation should not be copied. “Site licenses” will be purchased by the university for some widely used programs. Information Technology Services personnel must install these programs and users should not copy or move them to other machines. Other copyrighted programs may be installed on personal computers by users provided that an appropriate license has been purchased.
Information Technology Services (ITS) sets campus standards for widely used software such as operating systems, word processing, etc. ITS also sets policies for the installation and maintenance of standard and non-standard software packages on university computers.
Administrative Computing System
Academic and other information about students and employees is stored in a central administrative computer system. The following policies apply to this system:
The university provides a data network connection for virtually all personal computers giving access to other computers and services both within and outside the campus. Every employee and student is also given an account on at least one central computer to permit access to email, the World Wide Web, and other local and national/international services. The following policies apply to such accounts and communications services:
1. The access password should be carefully guarded, changed frequently, and treated as a signature, i.e. not shared with anyone else including fellow employees or family members.
2. The following are prohibited and some may constitute criminal activity:
a. Unauthorized access to other users’ accounts, system software, university data, or remote computer systems.
b. Unauthorized decryption of coded information such as passwords.
c. Attempts to “crash” computers or network services.
d. Storage or transmission of copyrighted materials without permission.
e. Wilful introduction of viruses or other disruptive/destructive programs.
f. Attempts to evade or bypass resource quotas
g. Forgery or attempted forgery of documents or email.
h. Excessive use of resources, such as network bandwidth or disk storage.
i. Unsolicited “broadcasting” of email (electronic junk mail).
J. Harassment or intimidation of other users.
3. Widely accepted etiquette for the Internet should always be observed. For example, email should not be sent to users, lists, or newsgroups where the subject is not appropriate, where the user is not welcome, or the document size is excessive. Language should always be appropriate and representative of a Christian.
4. University employees and students may set up a home page on the World Wide Web containing personal as well as university information. Such pages must follow guidelines established by the Web Page Committee.
5. Password-protected files and email on university computers are generally treated as private. However, the university reserves the right to inspect such information when and if there is reason to suspect that university policy has been broken. Permission for such inspection must be given by the president or the chief information officer in writing and the rationale for inspection recorded.
6. A limited number of telephone connections is provided by the university for employees to access campus information resources from their homes or while traveling on university business. All information technology policies apply to these connections as well as to computers on campus.
7. Limited personal use of university data communication facilities is permitted outside of work hours, for example for email or Web browsing. The available resources may sometimes restrict such personal use.
M. Kootsey, July 2, 1997