Section: Information Technology
Policy Number: 902Responsible Office: Information Technology
Effective Date: 5/1/19Revised: 5/1/19
The purpose of this policy is to establish acceptable uses of computer equipment at St. John’s University (St. John’s). Wrongful use exposes St. John’s to risks including virus attacks, compromise of network systems and services, and legal issues.
This policy applies to the University Community. Adherence to this policy helps safeguard the confidentiality, integrity and availability of the University’s information assets, and protects the interest of the University, its customers, personnel and business partners.
Computing Resources are available for use only by University faculty, administrators, staff, student workers, students, alumni, interns and other authorized users and intended to advance the education, research, administration and the mission of the University. Accordingly, the University encourages and promotes the use of these resources by the University Community, within institutional priorities and financial capabilities. Access to and use of these resources and services are privileges and are used in compliance with all applicable laws and regulations and with the highest standards of ethical behavior.
Inappropriate use exposes the University to risks including virus attacks, compromise of network systems and services, legal issues and reputation damage.
Below, the University sets forth terms and conditions for the use of Computing Resources. Listings of specific acceptable and unacceptable uses are illustrative examples and are not meant to be exhaustive. The University is the sole and conclusive authority on questions relating to acceptable uses of its resources. If a question about use arises, the use should be considered "prohibited" until IT Department directs otherwise.
The following activities are considered Improper Usage and are strictly prohibited, with no exceptions:
The use of Computing Resources in violation of international and federal copyright laws is strictly prohibited. These federal laws provide to the author of an original work, whether that work is a video, a sound recording, software, or printed material, the exclusive rights to reproduce, adapt, publish, perform and display that work. Anyone other than the copyright holder is required to obtain the express permission of the copyright holder to use the work for any of these purposes.
The University prohibits the use of its computing resources for Internet downloading and sharing of copyrighted music and video in violation of copyright laws. In addition to violating University policy and the law, file-sharing programs (such as uTorrent, Transmission, and Vuze) that permit these activities also may impair the University's broadband system because their use causes a strain on the University's broadband capabilities and other network resources. A copyrighted movie, television show or sound recording without permission of the copyright holder is a violation of University policy. The University has, and will continue to create, technologies to identify and disable access to file-sharing websites that facilitate the violation of applicable law and University policy. In the event that you desire to legally download any file that may strain the University's broadband capabilities, please contact the IT Department to arrange for a time and place to do so.
Creation of internet content and other materials for educational, research and administrative purposes are in full compliance with current copyright laws.
Consistent with the purposes for which University Computing Resources are intended, web content may be created and posted only in support of the instructional, research, and administrative objectives of the University. Web content supporting unapproved commercial or business activities is prohibited.
The University reserves the right to restrict web content or remove any part of such content for violation of these or any University policies, including for causing excessive traffic to the University's web servers.
Each user is responsible for his or her own activities in using the University's computing resource and indemnifies and holds harmless to the University from any liability to the user or any third party arising out of the use of the computing resources by the user, or any loss of information existing or stored on the University's computing equipment or resources, including all files and electronic mail.
Ownership of intellectual property produced through significant use of the University's computing equipment, networks, and information resources resides with St. John’s University. If St. John’s has an Ownership Interest in the Invention, an Inventor must assign all rights, titles and interests to/in the Invention to St. John’s University, irrespective of obligations to third parties, and assist St. John’s in all phases of the filing application process. Detailed information is in Intellectual Property | St. John's University.
The following are the definitions relevant to the policy:
The University reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. Instances of non-compliance must be presented to and reviewed and approved by the CIO, the Director of Information Security, or the equivalent officer(s).
All breaches of information security, actual or suspected, must be reported to, and investigated by the CIO and the Director of Information Security.
Those who violate security policies, standards, or security procedures are subject to disciplinary action up to and including loss of computer access and appropriate disciplinary actions as determined by the University.