Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
|
|
|
- Godwin Singleton
- 10 years ago
- Views:
Transcription
1 I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration of the University. The University also serves as a technology resources for the local community of OWU students, faculty, and staff; the extended OWU community, including alumni and emeriti faculty and staff; and campus visitors and guests. Information Services provides and maintains the public computing infrastructure, such as the network, servers, and computer laboratories. These resources are critical for the academic, administrative, and research needs of the University community. All IS employees must sign a non-disclosure agreement upon employment. OWU community members, visitors, and guests (users) who utilize these resources are expected to comply with institutional policies as well as local, state, and federal laws and regulations. Each user will share the responsibility for safeguarding the University s computing environment. Fair, legal, and equitable use of the resources is essential for all users to maintain OWU s computing environment. Technology environments can easily be disrupted, and digital information can effortlessly be duplicated and distributed. Responsible utilization of OWU s computing resources by users will ensure the integrity of these resources. The promotion of responsible use of the University s resources does not negate the value placed on individual privacy and intellectual property rights or the academic freedoms guaranteed by the University. II. User Responsibilities Access and Usage A. User access to OWU computing resources is a privilege, and these resources are primarily for use by the immediate OWU community, such as students, faculty, and staff. Alumni, emeriti faculty, local community members, and campus visitors and guests may use public computing resources with the understanding that OWU faculty, staff, and students have priority over users engaged in non-scholarly, recreational activities such as game playing, personal Web surfing, and personal instant messaging. B. Users are asked to be civil and respectful in all their electronic communications. C. Users are asked to remember that he University provides access to computers and the Internet in support of its educational mission and University-related activities. Therefore, faculty, staff, and students should be mindful of how they use these resources for personal use. D. With regard to public computing facilities, users are expected to respect other users as well as OWU staff. Verbal or physical abuse of others will not be tolerated. Excessive noise or other disruptive behavior including cellular phone usage is prohibited in public computing areas. Users should be able to properly identify themselves (i.e. OWU ID card) to OWU staff when asked.
2 E. Equipment abuse is unacceptable, and users are asked to report any mistreatment or vandalism of OWU computing resources to INFORMATION SERVICES staff (lower level of the Corns Building or ) or to Public Safety (ground floor of Smith Hall or ). F. Only computing devices that have been properly registered with Information Services may be directly connected to the OWU network. Each authorized user is responsible for the registered devices usage and activity originating from that device. G. Installation of a personal network server, such as a web or file server, can compromise the integrity and security of the entire University network, and is therefore strongly discouraged. Such a server is permissible only for research or teaching purposes, and must be registered with Information Services to ensure system integrity. Information Services will provide guidelines for securing the server and service as well as for monitoring the system. In the case of an emergency, Information Services may terminate access to the server or service if the system has been compromised or improperly secured. Information Services will make every reasonable attempt to contact the server administrator prior to terminating service. Network and Equipment Integrity H. With regard to public lab computers, users shall not make any significant modifications to the condition or status of any computer equipment including the alteration of critical system files, network, or peripheral connections. Installation of personal software or hardware on public lab computers is prohibited. I. With regard to University-owned personal office, departmental, research, and teaching lab computers, users who make any significant modifications to the condition or status of any computer equipment, including the installation of hardware or software, the alteration of critical system files, network, or peripheral connections, are not entitled to, but may receive, Information Services technical support for these changes. J. Due to the potentially crippling impact of malicious computer programs including viruses, worms, and malware on individual as well as shared computing resources, users who connect to any local or remote network are expected to keep their operating system and maintenance software (i.e., anti-virus and anti-spyware utilities) properly updated. Data Security K. Users are responsible for their own personal computer and OWU account activity and shall not allow others to use their personal accounts. L. Users must protect and maintain the confidentiality of their passwords. Therefore, users should not share their passwords with others, and passwords should be changed frequently. Information Services recommends that you change your password once each semester. M. Although Information Services performs regular backups of user data stored on network file servers, users ultimately are responsible for backing up their own local files and
3 directories. Users should make at least one physical backup copy (using a CD/DVD burner, zip drive, external hard drive, USB key, or other removable storage device) of important data on their computer systems on a consistent, ongoing basis. Software Licensing III. N. Proprietary software made available by Information Services may not be duplicated or redistributed. Users shall not alter proprietary software installed by Information Services on University-owned computers in any unlawful manner. O. Users who install their own software must observe the software s licensing agreement. P. The University will send official communication via campus only. Students shall regularly check and maintain their OWU account. If they desire, students can automatically forward their OWU to their preferred account. Q. Authorized users including current students, faculty, and staff may utilize the campus-wide electronic mail message distribution system. This system is checked throughout each business day the University is officially open. For more information, refer to the OWU Campus-Wide Distribution Policy at University Responsibilities Network Access A. Through its direct Internet connection and remotely accessible connections, OWU operates as an Internet Service Provider (ISP) for its users. This provides users will access to local (on-campus) and remote computing resources. Network access interruptions or outages may sometimes result from events outside the University s control. Equipment Maintenance B. Users are responsible for reporting problems and unusual behavior of computing equipment to Information Services. Although Information Services makes every reasonable effort to troubleshoot and resolve equipment issues in a timely fashion, it is not possible to guarantee that all issues will be resolved in a satisfactory manner due to actions or accidents beyond reasonable control. Users maintaining their own computing equipment are responsible for maintaining equipment in a secure condition that does not adversely affect the performance of the OWU network or other computers. Information Services will provide guidelines to facilitate these preventative measures. Campus Server Access C. Each OWU account is assigned storage space (quota) on one or more hard disk devices for saving and accessing files, including and Web content. Users may apply for
4 additional quota when necessary for academic or administrative activities by contacting Information Services. Computer and Software Inventory and Remote Assistance D. Each OWU-owned device will contain inventory management software to assist in managing and tracking hardware and software. Data will be collected and stored on a central server, including hardware information and installed software applications, to allow for accurate inventory reporting, analysis, computer life cycle, and license management. Remote assistance software will be configured to require user authorization prior to the remote session being granted. Users of the OWU owned device may opt out of the computer inventory system at their discretion. IV. Acceptable and Unacceptable Use A. Usage that violates any institutional, local, state, or federal rule, regulation, or law is prohibited. a. This includes but is not limited to unauthorized duplication or dissemination of copyrighted materials, including electronic text, graphic files, commercial software, and audio and video files (particularly in a peer-to-peer application environment, regardless of whether such activity is internal or external to the OWU campus). b. This includes but is not limited to interstate communications for illegal or fraudulent purposes; unauthorized access to or modification of information from national defense or financial systems; creation, possession, or distribution of graphic or computer graphic depictions of minors engaged in sexual activity; or inappropriate access of computing systems to commit crimes. B. Usage that harasses or infringes upon the rights of another person or entity is prohibited. This includes but is not limited to the transmission of abusive, obscene, threatening, or libelous material. C. Usage that involves unsolicited or unsanctioned commercial activity is prohibited. This includes but is not limited to the use of University computing resources to operate personal for-profit ventures or to disseminate for-profit mass ings (spam). D. Usage for publishing Web content or similar information using campus resources requires the users to be responsible for following all provisions of this policy. This includes but is not limited to copyright and commercial activity that is not directly related to the University s mission. E. Usage that bypasses or manipulates the security or integrity of any local or remote system or network is prohibited. This includes but is not limited to unauthorized access to a closed network or system (including hacking or service spoofing), unauthorized transmission or receipt of user access privileges (including login or password information), or attempts to intentionally obfuscate, misdirect, disguise, or forge the identity of a computer user, system, or network.
5 F. Usage that involves creating or releasing malware is prohibited. This includes but is not limited to viruses, worms, and spyware. V. Copyright Issues Users may not violate copyright law (Title 17, U.S. Code) through the unauthorized installation, distribution, or reproduction of any material that is defined by intellectual property rights. For more information, refer to the Libraries Copyright information page at VI. Privacy of Information Personal information transmitted over the University network or stored on University-owned computers will be examined, with notice, only if the Chief Information Officer, in consultation with the Provost, has reason to believe that: The integrity and/or security of the campus network has been compromised in an unacceptable manner A violation of a local, state, or federal law or regulation has occurred; or A violation of Ohio Wesleyan University s Computer Use Policy has occurred. To maintain OWU computing resources, Information Services regularly backs up centralized data and logs, monitors network traffic patterns and system availability, inventories hardware and software applications, and performs other related activities necessary to ensure services for all users. VII. Policy Enforcement and Modifications A. Violations of this policy will be punished and may include temporary or permanent loss of computing privileges, temporary or permanent disconnection from local or remote networks, or other technology-related disciplinary actions as deemed appropriate by Information Services. B. Student users who violate this policy may be referred to the University Judicial System and/or the Academic Affairs Office, based on the scope and severity of the violation. C. Professional faculty and staff users who violate this policy may be referred to their Officer-level supervisor (Provost, Dean, Vice President, etc.) and/or the University President, based on the scope and severity of the violation. D. Violators of this policy may be liable for civil and criminal prosecution, and it should be understood that nothing in this policy precludes enforcement under local, state, or federal laws or regulations. E. Information Services, along with the Committee on Teaching, Learning, and Cross- Cultural Programming, is responsible for interpreting and modifying this policy, and for implementing operational procedures to support the policy and philosophy. Any modifications to this policy will be communicated through the Information Services Web site, the ISNEWS list, printed memoranda, the Daily Bulletin, etc. If a user disagrees with the substance and/or implementation of this policy, the user may first
6 discuss the matter with the Director of Information Services. If the situation is not resolved, it may be escalated to the Chief Information Officer (CIO). Failing adequate resolution of the matter with the CIO, faculty may appeal the matter to the Provost, who will make the final decision on the matter.
7 OWU Student Computer Use Policy Terms of Use and Service Agreement This document describes the student s responsibility in using University computing resources. The downloading of unauthorized Internet files will not be tolerated at the University. Violations of this policy will be punished and may include temporary or permanent loss of computing privileges, temporary or permanent disconnection from local or remote networks, or other technology-related disciplinary actions as deemed appropriate by OWU Libraries and Information Services. You also may be referred to the University Judicial System and/or the Academic Affairs Office, based on the scope and severity of the violation. 1. I will connect my personal computer to OWU computing resources only after ensuring the operating system and maintenance software (i.e., anti-virus and anti-spyware utilities) have been properly updated. I will continue to apply software updates in a timely fashion or as directed by INFORMATION SERVICES. 2. I will regularly check and maintain my personal OWU account. The University will send official electronic communications to this account only. 3. I will not use OWU computing resources to violate any institutional, local, state, or federal rule, regulation, or law. This includes but I not limited to unauthorized duplication or dissemination of copyrighted materials including electronic text, graphic files, commercial software, and audio and video files (particularly in a peer-to-peer application environment, regardless of whether such activity is internal or external to the OWU campus) or inappropriate access of computing systems to commit crimes. 4. I will not use OWU computing resources to harass or infringe upon the rights of another person or entity. This includes but is not limited to the transmission of abusive, obscene, threatening, or libelous material. 5. I will not use OWU computing resources for unsolicited or unsanctioned commercial activity. This includes but is not limited to using University computing resources to operate personal for-profit ventures or disseminating for-profit mass ings (spam). Also, users who publish Web content or similar information using campus resources are responsible for following all provisions of this policy particularly in relation to copyright and commercial activity that is not directly related to the University s mission. 6. I will not use OWU computing resources to bypass or manipulate the security or integrity of any local or remote system or network. This includes but is not limited to unauthorized access to a closed network or system (including hacking, port probing or service spoofing), unauthorized transmission or receipt of user access privileges (including login or password information), or attempts to intentionally obfuscate, misdirect, disguise, or forge the identity of a computer user, system, or network. NOTE: The entire OWU Computer Use Policy is online at
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Email Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of
2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of San Diego computing and network resources. This policy
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
COMPUTER USE IN INSTRUCTION
COMPUTER USE IN INSTRUCTION 4526 The Board of Education is committed to optimizing student learning and teaching. The Board considers student access to a computer network, including the Internet, to be
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
Valdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
COMPUTER NETWORK FOR EDUCATION
4526 COMPUTER NETWORK FOR EDUCATION The Southern Westchester Board of Cooperative Educational Services (BOCES) considers student access to a computer network, including the Internet, to be a powerful and
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET
LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET The Board of Directors of the Louisa Muscatine Community School District is
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007
Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
The Top Ten Of Public Computers And Their Perpetuation
2.10 PUBLIC COMPUTER USE POLICY The Library offers public computers that patrons may use to access the Internet or perform computer-assisted tasks using basic applications software for word processing,
6415 C Internet, E-mail and Network Rules for Staff Use
6415 C Internet, E-mail and Network Rules for Staff Use Original Adoption: 05/26/2009 Effective Date: 08/13/2014 Revision Dates: 08/12/2014 Review Date: 4/17/2012 I. PURPOSE The purpose of this regulation
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents
Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
