Section: Information Technology
Policy Number: 902Responsible Office: Information TechnologyEffective Date: 5/1/19Revised: 6/11/20; 5/7/22
The purpose of this policy is to establish acceptable uses of computer equipment at St. John’s University (St. John’s). Wrongful use exposes St. John’s to risks including virus attacks, compromise of network systems and services, and legal issues.
This policy applies to the University Community. Adherence to this policy helps safeguard the confidentiality, integrity, and availability of St. John’s information assets, and protects the interest of St. John’s, its customers, personnel, and business partners.
Computing Resources are available for use only by St. John’s faculty, administrators, staff, student workers, students, alumni, interns, and other authorized users and intended to advance the education, research, administration, and St. John’s mission. Accordingly, St. John’s encourages and promotes the use of these resources by the University Community, within institutional priorities and financial capabilities. Access to and use of these resources and services are privileges and are used in compliance with all applicable laws and regulations and with the highest standards of ethical behavior.
Inappropriate use exposes St. John’s to risks including virus attacks, compromise of network systems and services, legal issues, and reputation damage.
Below, St. John’s sets forth terms and conditions for the use of Computing Resources. Listings of specific acceptable and unacceptable uses are illustrative examples and are not meant to be exhaustive. St. John’s is the sole and conclusive authority on questions relating to acceptable uses of its resources. If a question about use arises, the use should be considered "prohibited" until the IT Department directs otherwise.
The following activities are considered Improper Usage and are strictly prohibited, with no exceptions:
The use of Computing Resources in violation of international and federal copyright laws is strictly prohibited. These federal laws provide to the author of an original work, whether that work is a video, a sound recording, software, or printed material, the exclusive rights to reproduce, adapt, publish, perform, and display that work. Anyone other than the copyright holder is required to obtain the express permission of the copyright holder to use the work for any of these purposes.
St. John’s prohibits the use of its computing resources for Internet downloading and sharing of copyrighted music and video in violation of copyright laws. In addition to violating St. John’s policy and the law, file-sharing programs (such as uTorrent, Transmission, and Vuze) that permit these activities also may impair St. John’s broadband system because their use causes a strain on St. John’s broadband capabilities and other network resources. A copyrighted movie, television show or sound recording without permission of the copyright holder is a violation of St. John’s policy. St. John’s has, and will continue to create, technologies to identify and disable access to file-sharing websites that facilitate the violation of applicable law and St. John’s policy. In the event that one desires to legally download any file that may strain St. John’s broadband capabilities, the IT Department must be contacted to arrange for a time and place to do so.
Creation of internet content and other materials for educational, research and administrative purposes are in full compliance with current copyright laws.
Consistent with the purposes for which St. John’s Computing Resources are intended, web content may be created and posted only in support of the instructional, research, and administrative objectives of St. John’s. Web content supporting unapproved commercial or business activities is prohibited.
St. John’s reserve the right to restrict web content or remove any part of such content for violation of these or any St. John’s policies, including for causing excessive traffic to St. John’s web servers.
Each user is responsible for his or her own activities in using St. John’s computing resource and indemnifies and holds St. John’s harmless from any liability to the user or any third party arising out of the use of the computing resources by the user, or any loss of information existing or stored on St. John’s computing equipment or resources, including all files and electronic mail.
Ownership of intellectual property produced through significant use of St. John’s computing equipment, networks, and information resources resides with St. John’s University. If St. John’s has an Ownership Interest in the Invention, an Inventor must assign all rights, titles and interests to/in the Invention to St. John’s University, irrespective of obligations to third parties, and assist St. John’s in all phases of the filing application process. Detailed information is in Intellectual Property | St. John's University.
The following are definitions relevant to the policy:
St. John’s reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. Instances of non-compliance must be presented to, reviewed, and approved by the CIO, the Director of Information Security, or the equivalent officer(s).
All breaches of information security, actual or suspected, must be reported to, and investigated by the CIO and the Director of Information Security.
Those who violate security policies, standards, or security procedures are subject to disciplinary action up to and including loss of computer access and appropriate disciplinary actions as determined by St. John’s.
Any and all telephone conversations or transmissions, electronic mail or transmissions, or internet access or usage by an employee by any electronic device or system, including but not limited to the use of a computer, telephone, wire, radio or electromagnetic, photoelectronic or photo-optical systems may be subject to monitoring at any and all times and by any lawful means.