University of Jamestown has made a commitment to making a variety of information technology resources available to everyone within the community.
At the same time, the University is committed to making sure these resources are used in the manners consistent with its educational mission. As a member of this community, you are expected to follow these guidelines, policies and procedures when making use of the technology on campus and that technology which is accessible from our campus. These policies have been adopted by the University in an effort to protect the rights ofany individual or group which utilizes these resources or any third party who may be affected by the use of our systems or networks.
University of Jamestown maintains Internet access to a vast number of local and national sites to promote the creation and dissemination of information and sharing of ideas. It is critical, however, that the University’s systems be used in an ethical manner which fosters the goals and objectives of University of Jamestown.
Any information or use of these resources that would be considered unethical or unacceptable in the eyes of the University will be considered unacceptable for any user of the University’s system.
Any personal computer hooked into the campus network must have
current anti-virus software and be kept up to date with software and security patches. University of Jamestown has an agreement with McAfee for anti-virus software. You may install this software on your personal computer.
University of Jamestown uses NAT addressing for security. The College does not guarantee, nor support, the operation of on-line games.
Peer-to-peer applications, such as Morpheus or Kazaa, are not allowed on the campus network. Violation of this policy can result in fines, removal of internet access or other disciplinary action.
Personal Wireless Access Points (WAPs) are NOT allowed since campus WAPs are available.
This policy includes the following guidelines, and requires that each member of the campus community abide by the following:
- Respect the rights of others to freedom from harassment or intimidation: Causing the work or college experience of others to be disrupted by sending abusive or unwanted material is a violation of University policies and may violate the law; therefore, it is unacceptable.
- Respect copyright and other intellectual-property rights: The copying of files, passwords or information that are owned by someone else without appropriate permission will be considered a violation of University policies, a violation of the law, and may constitute fraud, plagiarism or theft. All software licensed by the University must be used only in accordance with applicable license agreements.
- Identify yourself clearly and accurately in electronic communication: The use of false or unauthorized identifications or affiliations appears to dissociate you from responsibility for your actions and is considered inappropriate.
- Abide by security restrictions on all systems and information: The security measures and mechanisms have been established to protect individuals and information. Any attempt to disrupt or otherwise circumvent these security provisions, or to assist others to do so, is a serious violation of University policies.
- Use resources efficiently: All computing equipment, network resources and user accounts are owned by University of Jamestown and are to be used exclusively for University-related activities. This includes legitimate instructional, research, administrative and other approved activities. University of Jamestown reserves the right to access personal storage on the College’s system if an unlawful act, or a violation of University policies, is suspected.
- Recognize limitations to privacy in electronic communications: When utilizing electronic communications, it is important to remember that although you specify a specific audience for your communications, the nature of electronic communication allows for a much wider viewing audience. The security of electronic information on shared systems and networks is approximately that of paper documents in an unsealed envelope – generally respected, but breachable by someone determined to do so.
Passwords: Passwords are utilized to grant access to on-line networks to authorized members only. It is the responsibility of each and every member to hold these passwords in confidence and not disclose them to any other member or third party. You will be held responsible and will be liable for any harm resulting if you disclose or allow disclosure of passwords. Attempting to bypass system security by the use of unauthorized passwords is a violation of University of Jamestown policy and will be dealt with accordingly.
Offensive Communication: Any use of vulgar, abusive or offensive language (as perceived by the recipient of the communication) is strictly prohibited.
Harassment: Using on-line systems or resources to target an individual or group with the intent of causing distress, embarrassment, injury, unwanted attention or other substantial discomfort is harassment and is prohibited. Personal attacks based on an individual’s race, national origin, ethnicity, handicap, religion, gender, veteran status, sexual orientation or any other such characteristics or affiliations are prohibited.
Offensive Graphic Files / Audio Files: The transmission (i.e., uploading, downloading, posting, linking to) of sexually explicit images or other content the University deems offensive is prohibited. Unsolicited transmission of these materials may constitute harassment, and as such, is prohibited. Furthermore, such material may be deemed illegal and transmitters of such material may be subject to local, state and / or federal legal action.
Online Social Networks (i.e. Facebook): All University of Jamestown students are responsible for the content of their online social networks. The University, as a general rule, does not patrol online media for student conduct. Students should be apprised that although the University of Jamestown administration has no policy to either patrol or monitor online social networks, violations of university policy (e.g. harassing language, drug violations, or alcohol violations) discovered on online social networks are nevertheless subject to investigation and penalty. The University reserves the right to handle incidents on online social networks expressly contrary to University of Jamestown student conduct policy at the discretion of the University administration on a case-by-case basis.
Impersonation: Communicating information while utilizing a false identification or an identification that you are not authorized to use is prohibited.
Chain Letters and Pyramid Schemes: The creation, transmission and / or propagation of information relating to chain letters or pyramid schemes are prohibited. Some of these are not only illegal, but may disrupt the network services.
Improper Advertising, Solicitation: Use of any on-line network to send unsolicited advertising, promotional material or other forms of solicitation to others is prohibited, except when permitted by law, not prohibited by University policies and in those areas that are designated for such a purpose, for example, a classified ad area. Use proper e-mail lists to avoid spamming.
World Wide Web Usage: Content of personal homepages is the responsibility of the account owner. Any content on personal homepages that violate school policy will be subject to immediate removal – this includes, but is not limited to, images, sounds or linking to any pages with content that violates University of Jamestown policy or general community property.
Disruption or Degradation
Any deliberate attempt to disrupt or degrade network services or performance, whether local or remote, is considered unacceptable. Any equipment connected to the university network must be “clean” systems – current with all software updates and have anti-virus protection. Extensive use of the network (i.e., intra / internet gaming, excessive downloading of MP3′s or other programs not in accordance with the goals of the University) resulting in degradation of system resources is a violation of University policy. Connecting unauthorized equipment to the campus network, deliberately wasting / overloading computing resources (i.e., printing too many copies of a document) or the overuse of interactive network utilities will be considered violations of University of Jamestown’s acceptable use policy.