Below, the University sets forth terms and conditions for the
use of Computing Resources. Listings of specific acceptable
and unacceptable uses are illustrative examples and are not meant
to be exhaustive. The University is the sole and conclusive
authority on questions relating to acceptable uses of its
resources. If a question about use arises, the use should be
considered "prohibited" until the University directs otherwise.
Computing Resources are available for use only by University
faculty, staff, students, administrators and other authorized
users. Moreover, use of such resources, other than laptop
computers provided pursuant to the Academic Computing Initiative or
personally owned computers, is restricted for tasks related to the
educational, research and administrative objectives of the
University and the University's mission.
Computing Resources may be used only for purposes that are legal,
ethical and consistent with the University's mission. The following
activities are examples of prohibited behaviors with respect to the
use of Computing Resources:
- Altering system software or hardware configurations, or
disrupting or interfering with the delivery or administration of
- Tampering with the anti-virus software installed on University
owned or provided devices or networks or failure to use updated
anti-virus software when accessing a University network.
- Attempting to access or accessing the University's or another
user's account, private files, or e-mail without the owner's
- Attempting to access or accessing systems outside of the
University without authorization of that system's owner.
- Misrepresenting one's identity in electronic
- Infringing upon the intellectual property rights of others in
computer programs or electronic information, including plagiarism
and unauthorized use or reproduction in violation of patents,
trademarks and copyrights and/or software and other licensing
agreements. (See "Copyrighted Material" provision, infra)
- Circumventing or attempting to circumvent software or hardware
- Installing software (including games) on University-provided
computing equipment (other than laptops provide in accordance with
the Academic Computing Initiative) without obtaining authorization
in advance. The University reserves the right to remove
software that violates this policy without advance notice to the
- Using computing resources to engage in conduct which
intentionally interferes with others' use of shared computing
resources. This includes consuming gratuitously large amounts of
system resources (e.g. Internet bandwidth, disk space, CPU time)
and exceeding time limits where they have been established in
University facilities such as microlabs and libraries.
- Using computing and/or electronic mail resources for commercial
or personal profit-making purposes or for solicitation or for
activities which violate local, state or federal law.
- Allowing or assisting unauthorized users to gain access to
- Failing to comply with all applicable laws concerning the
transmission, receipt or monitoring of wireless and wired
- Intercepting or monitoring, or attempting to intercept or
monitor, network communications or other communications not
intended for that user's access without prior authorization.
- Creating programs that secretly collect information about
- Using computing resources, including electronic mail, to send
nuisance messages such as chain letters, junk mail and profane,
obscene, threatening, libelous or harassing messages.
- Using the University's logos or insignias without written
permission from the appropriate University authority.
- Displaying, posting, printing or sending material that is
contrary to the mission or values of the University, including
obscene, pornographic, sexually explicit or offensive material. The
information distributed through the University's computing
and networking facilities is a form of publishing and is subject to
some of the same standards as other types of publications.
- Intentionally or negligently distributing malicious software,
such as computer worms, viruses or Trojan horses.
- Engaging in acts of academic dishonesty.
Use of Computing Resources - Using the
University's Networks and Internet Access with Personal
The University makes networks and the Internet available to users
via wired and wireless connections. The University does not
guarantee the privacy of wireless transmissions, and does not
guarantee that the WLAN will provide uninterrupted and/or
error-free wireless communications. Use of networks and Internet
access is subject to the following additional terms and
Authorized users are permitted to connect their own computing
devices to the University's network or Internet connection after
contacting the Department of Information Technology to arrange such
access. A user's computer hardware must meet certain specification
prerequisites and may require that certain software be installed
(particularly with respect to connection to a wireless network).
These specifications are subject to change. The University does not
guarantee that all computers, even those that meet the
specification prerequisites, will be able to access WLAN (except
the laptops provided to first-time full-time students). No device
will be granted access to a network unless it has current
anti-virus software properly installed.
Users are prohibited from accessing any portion of a network
that they have not been authorized to access, and may not provide
access to any network to anyone who does not have University
authorization for such access. Users are prohibited from
circumventing or attempting to circumvent network security systems.
Network privileges may be revoked temporarily or permanently at the
discretion of the University for violation of the Computer and
Network Use Policy.