St. John's University, New York (the "University") through the Department of Information Technology (IT), provides an array of computing resources to support the instructional, research and administrative functions of the University, including computing equipment, laptop computers distributed pursuant to the University's Academic Computing Initiative, networks (via wireless and wired access), internet access, computers, terminals, communications networks, printers, software, data files and other relating computing equipment ("Computing Resources"). Agreement and adherence to the following policies is a mandatory prerequisite to use of the Computing Resources and your use of Computing Resources constitutes your agreement to be bound by the policies.
Since rapid change is inherent to computing and information networks, the University reserves the right to modify these policies at any time, except for Academic Computing Initiative policies related to material terms and conditions of ownership, possession and use of University provided laptop computers which policies may be altered only with respect to new recipients of laptop computers. Although the University will make reasonable efforts to announce changes to policies, it is the user's personal responsibility to remain informed of the current policies by periodically checking this Handbook.
Please see the topics below to view the computer usage policy.
Below, the University sets forth terms and conditions for the use of Computing Resources. Listings of specific acceptable and unacceptable uses are illustrative examples and are not meant to be exhaustive. The University is the sole and conclusive authority on questions relating to acceptable uses of its resources. If a question about use arises, the use should be considered "prohibited" until the University directs otherwise.
Computing Resources are available for use only by University faculty, staff, students, administrators and other authorized users. Moreover, use of such resources, other than laptop computers provided pursuant to the Academic Computing Initiative or personally owned devices, is restricted for tasks related to the educational, research and administrative objectives of the University and the University's mission.
Computing Resources may be used only for purposes that are legal, ethical and consistent with the University's mission. The following activities are examples of prohibited behaviors with respect to the use of Computing Resources:
Using the University's Networks and Internet Access with Personal Devices
The University makes networks and the Internet available to users via wired and wireless connections. The University does not guarantee the privacy of wireless transmissions, and does not guarantee that the WLAN will provide uninterrupted and/or error-free wireless communications. Use of networks and Internet access is subject to the following additional terms and conditions.
Authorized users are permitted to connect their own computing devices to the University's network or Internet connection after contacting the Department of Information Technology to arrange such access. A user's computer hardware must meet certain specification prerequisites and may require that certain software or operating system security updates to be installed (particularly with respect to connection to a wireless network). These specifications are subject to change. The University does not guarantee that all computers, even those that meet the specification prerequisites, will be able to access WLAN (except computing devices provided by the University). No device will be granted access to a network unless it has current anti-virus software properly installed.
Users are prohibited from accessing any portion of a network that they have not been authorized to access, and may not provide access to any network to anyone who does not have University authorization for such access. Users are prohibited from circumventing or attempting to circumvent network security systems. Network privileges may be revoked at any time, temporarily or permanently, at the discretion of the University for violation of the Computer and Network Use Policy.
The use of Computing Resources in violation of international and federal copyright laws is strictly prohibited. These federal laws provide to the author of an original work, whether that work is a video, a sound recording, software, or printed material, the exclusive rights to reproduce, adapt, publish, perform and display that work. Anyone other than the copyright holder is required to obtain the express permission of the copyright holder to use the work for any of these purposes.
One prohibited use of the University's computing resources is the use of the Internet to download and share copyrighted music and video in violation of copyright laws. In addition to violating University policy and the law, file-sharing programs that permit these activities also may impair the University's broadband system because their use causes a strain on the University's broadband capabilities and other network resources. For these reasons, the downloading, or making available for others to download, a copyrighted movie, television show or sound recording without permission of the copyright holder is a violation of University policy. In furtherance of this policy, the University has, and will continue, to create technologies to identify and disable access to file-sharing websites that facilitate the violation of applicable law and University policy. A listing of such sites will be published on MYSJU. In the event that you desire to legally download any file that may strain the University's broadband capabilities, please contact the Department of Information Technology to arrange for a time and place to do so.
Fair Use of Copyrighted Material
Creation of web pages and other materials for educational and research purposes may involve incorporation of original works of third parties (e.g., printed material, video and sound recordings, multimedia presentations, software) that are covered by copyright laws. Copyright owners are granted five exclusive rights by the copyright law: reproduction, adaption, publication, performance and display.
These exclusive rights, however, are subject to the "Fair Use" doctrine. "Fair Use" is a privilege of persons other than the copyright owner to use the copyrighted material in a reasonable manner without his/her consent notwithstanding the monopoly granted to the owner by the copyright.
A finding of fair use is not easily determined. However, there are four nonexclusive statutory factors to be considered in determining whether a use is fair. They are:
Developers of web pages are especially cautioned to recognize that access to their pages by individuals from outside the University community may impact one or more of the above factors. Consistent with principles of fair use, authors are responsible for obtaining all permissions that may be necessary to incorporate works of third parties into their own work. The University rules governing attribution require that all users of University computing networks acknowledge any usage of ideas or materials produced by others by identifying the source and nature/extent of indebtedness.
Consistent with the purposes for which the University's Computing Resources are intended, Web pages may be created and posted only in support of the instructional, research and administrative objectives of the University. Web pages may not include any advertising, nor may they be used in support of any commercial or business activities. The content of Web pages and their compliance with this policy is the sole responsibility of the author.
The University reserves the right to restrict the content of or remove Web pages for violation of these or any University policies, including for causing excessive traffic to the University's Web servers.
St. John's University is pleased to have undertaken the Academic Computing Initiative, which provides portable computing devices (currently laptop computers) to eligible students for use during their studies at the University.
Students eligible to participate in the Academic Computing Initiative will receive a portable computing device ("Computer"). (“Computer” refers to the portable computing device and any other peripherals, software, or attachments furnished with the Computer. ) The Computer remains the property of the University until the student graduates from an the University program with a bachelor's degree, after which time title and certain licenses will be transferred to the student without any warranty, including any and all implied warranties, provided that s/he has met all financial responsibilities to the University. After title is transferred, the University will have no responsibility for the Computer whatsoever, including with respect to warranties, support, software, repairs or disposal.
Students are required to return the Computer to the University if their enrollment at the University is terminated either by them or by the University prior to graduation, or upon their graduation from a two-year undergraduate program if they do not then enroll in a bachelor's or equivalent program. Students also must return the Computer upon informing the University of their intention to withdraw from all classes or if they breach any material term of this Academic Computing Initiative policy, although in these situations a Computer will be returned to students when they re-register for 12 or more credits for a subsequent Fall or Spring semester and meets their financial responsibilities for such credits, or cure their breach of this policy, whichever is applicable. In addition, the University reserves the right, in its sole discretion, to require the immediate return of the Computer if the student withdraws to less than 12 credits in a current semester or enroll for less than 12 credits in a subsequent semester. If the student does not return the Computer within three business days after any of the above triggering events, the University will put a hold on the student's record (which will prevent future registration with the University and the release of transcripts), and place a $1,000 charge on the student's University account. The hold and charge will be removed when the Computer is returned to the University in good working condition.
Students are responsible for the care of the Computer. The University may obtain property insurance for the Computer, but may choose not to do so or not to continue such insurance in the future, and the student accepts the risk that the Computer may not be insured to protect the student's interests. Whether or not insurance coverage is in effect, the student will be responsible for any loss, theft or damage to the Computer, including replacement costs. If insurance is in effect, and the loss, theft or damage is covered, the student will be responsible only for the deductible, which is subject to change. The deductible at the time of this printing is $250 for damage, $400 for the first loss or theft, and $1,000 for the second loss or theft. This deductible has to be paid in full prior to issuing a replacement Computer.
If the Computer is lost or stolen, the student is required to immediately report it the Department of Public Safety and comply with their procedures, including filing an official report with the appropriate police department. Students may not report a Computer lost or stolen pursuant to this policy subsequent to their completion of any semester unless they re-enroll for, and satisfy their financial commitments for, the following semester, and thus such Computers will be considered non-returned and the student's account will be charged $1,000. If the Computer is damaged or malfunctioning, the student must bring the Computer to the Information Technology Department Repair Shop for assessment and/or repair. The University will attempt to provide the student with a temporary replacement Computer during the repair process, the terms and conditions for the use of which are identical to those set forth in this policy, except that the loaned Computer must be returned to the University immediately upon the University's written request for such return; a $20 per day charge will be assessed for each day after the third business day following the University's request for return. The University shall take all reasonable efforts to enforce any manufacturer's warranty, provided that the University shall not be obligated to commence or resort to any litigation to enforce such warranty. If a student's Computer is stolen, lost or damaged beyond repair, the student will receive a functionally equivalent replacement, provided that all of the student's financial obligations under this policy are met; students are entitled to only 2 replacements.
Students agree to the following terms and conditions for participating in the Academic Computing Initiative:
The University is not responsible for any losses, injuries, damages, claims, and expenses (including legal expenses), incurred by the student caused by the transportation, possession, ownership, maintenance, and use of the Computer. The student agrees to indemnify and hold the University harmless against any claims for such losses, injuries, damages, claims and expenses. This indemnity shall survive the expiration of this policy.
St. John's University is pleased to have undertaken the Academic Computing Initiative Program (the “ACI Program”), which offers portable computing devices (currently laptop computers) to eligible students for use during their studies at the University. Eligible students have the option to opt-into the Academic Computing Initiative Program (the “ACI Program”), which provides them with a laptop to use until they graduate from the University, subject to certain terms and conditions. A laptop usage fee will be applied to the student’s bill every semester until they graduate.
Students eligible to participate in the Academic Computing Initiative will receive a portable computing device ("Computer"). (“Computer” refers to the portable computing device and any other peripherals, software, or attachments furnished with the Computer. ) The Computer remains the property of the University until the student graduates from a University program with a bachelor's degree, or fulfills 8 Laptop Usage Fee payments, whichever comes first. After which time title and certain licenses will be transferred to the student without any warranty, including any and all implied warranties, provided that s/he has met all financial responsibilities to the University. After title is transferred, the University will have no responsibility for the Computer whatsoever, including with respect to warranties, support, software, repairs or disposal.
Students are required to return the Laptop to the University if enrollment at the University is terminated either by them or by the University prior to graduation. A student must return the Laptop upon informing the University of the intention to withdraw from all classes or if the student breaches any term of this Academic Computing Initiative policy. Notwithstanding the foregoing, the University may, in its sole discretion, opt to return the laptop to a student, when they are registered for 12 or more credits for a subsequent Fall or Spring semester and meets financial responsibilities for such credits, or cures their breach of this policy, whichever is applicable. If the student does not return the Laptop within three business days after any of the above triggering events, the University will put a hold on the student's record (which will prevent future registration with the University and the release of transcripts), and place a $800 non-return charge on the student's University account. The hold and charge will be removed when the Laptop is returned to the University in good working condition, or if the student pays the $800 non-return charge.
Students are responsible for the care of the Laptop. Any repairs required as a result of negligence, misuse, or intentional damage will be subject to the full cost of repairs as well as a fee of $400 for a first loss and $1000 for a second loss. Theft claims that are denied after submission will be charged a $400 stolen fee. These fees must be paid in full prior to issuing a refurbished functionally equivalent replacement laptop.
If the Laptop is lost or stolen, the student is required to immediately report it to the Department of Public Safety and comply with their procedures, including filing an official report with the appropriate police department within 10 days of the theft, and submitting a copy of the theft report to the University within 20 days. If the Laptop is damaged or malfunctioning, the student must bring the Laptop to the Information Technology Department Laptop Service Center for assessment and/or repair. The University will provide the student with a temporary replacement Laptop during the repair process, the terms and conditions for the use of which are identical to those set forth in this policy, except that the loaned Laptop must be returned to the University immediately upon the University's written request for such return; a $20 per day charge will be assessed for each day after the third business day following the University's request for return. The University shall take all reasonable efforts to enforce any manufacturer's warranty, provided that the University shall not be obligated to commence or resort to any litigation to enforce such warranty. If a student's Laptop is stolen, lost or damaged beyond repair, the student will receive a refurbished functionally equivalent replacement laptop, provided that all of the student's financial obligations under this policy are met; After thorough evaluation, students are only eligible for 2 replacements.
Students agree to the following terms and conditions for participating in the Academic Computing Initiative:
The University is not responsible for any losses, injuries, damages, claims, and expenses (including legal expenses), incurred by the student caused by the transportation, possession, ownership, maintenance, and use of the Laptop. The student agrees to indemnify and hold the University harmless against any claims for such losses, injuries, damages, claims and expenses. This indemnity shall survive the expiration of this policy.
Each user is responsible for his or her own activities in using the University's Computing Resources, and will indemnify and hold harmless the University from any liability to the user or any third party arising out of the use of the computing resources by the user or any loss of information existing or stored on the University's computing equipment or resources, including all files and electronic mail.
Ownership of intellectual property (with the exception of traditional works of scholarship of creativity, such as textbooks and instructional material) produced through significant use of the University's computing equipment, networks and information resources shall reside with St. John's University. In instances where such materials are sold, licensed or otherwise marketed, royalties on revenue shall be shared between the University and the authors of such materials in accordance with the University's patent and intellectual property policies.
Unless otherwise specified, access to Computing Resources at St. John's University will be through a control mechanism that provides for identification of authorized users. In addition, this mechanism will specify the location where authorized users can store or access data files. Users are expected to access only those resources that have been explicitly made available to them through this control mechanism. Users of computing resources are fully responsible for the protection of their user account including system ID codes and passwords.
The Department of Information Technology as the business unit that operates and manages Computing Resources at the University, has instituted commercially acceptable and reasonable internal mechanisms and controls to safeguard the privacy of data stored in our systems although no system is impenetrable to security breaches. These mechanisms require that specific privileges be given to personnel responsible for the maintenance of computer systems. These rights are afforded to ensure proper operation of the systems and will not be used as a method for accessing private information, except as necessary for maintenance of the systems or for investigation of policy violations, or as directed by appropriate legal authorities.
Violations of this policy constitute unacceptable use of Computing Resources. Violations may result in a loss of computing privileges and may subject users to the University's regular disciplinary processes, including suspension or dismissal from the University.
Whether or not a violation of this policy has occurred, the University reserves the right to immediately suspend computing privileges when continued use of any Computing Resources may result in harm to or otherwise compromise that or any other Computing Resources. Such privileges will be restored after the potential harm is eliminated (e.g., a virus on a personal computer is deleted), unless a material violation of this policy is alleged, in which case the matter will be referred to the regular disciplinary processes of the University.
In addition, illegal acts involving University Computing Resources may also subject violators to prosecution by local, state and/or federal authorities. Suspected or known violations should be reported to the appropriate University authority, in accordance with current disciplinary procedures. Violations will be processed in accordance with these procedures and/or law enforcement agencies.
Except as expressly provided herein, St. John's University makes no warranties, either express or implied, as to the merchantability, fitness, design or condition of, or the quality of the material or workmanship in any Computer Resource, including portable computing device computers provided through the University's Academic Computing Initiative and software for which licenses are granted to users, and does not warrant that the functionality of Computing Resources will meet a user's specific requirements. The University expressly disclaims all warranties not stated herein. St. John's University shall not be liable for any losses, injuries, damages, including incidental or consequential damages, claims, expenses (including legal expenses), lost profits, lost savings, including for loss of data, that is the result of the use, inability to use, interruption or error in any Computing Resource, including network and Internet service.
The University, through its networks, provides access to a large number of conferences, lists, bulletin boards, and Internet information services. These materials are not affiliated with, endorsed by, or reviewed by the University. Therefore, the University takes no responsibility for the truth or accuracy of the content found within these information sources. Some of these sources may contain material that is offensive or objectionable to some users or would violate this policy if published by an authorized user. The University cannot protect individuals against the existence or receipt of material that may be offensive to them. Furthermore, those members of the University community who use e-mail or make information about themselves available on the Internet must recognize that the University cannot protect them from invasions of privacy and other possible dangers that could result from an individual user's distribution of personal information.
The University provides 1 computing device per Full Time Equivalent based on their role. This computing device is to be used for all job functions; and the user must be in compliance of the University Computer and Network Use Policy. Any additional devices, adapters, peripherals etc. would need to be purchased by your department. Information Technology can offer guidance for these items.
The roles found at the University are as follows:
FT Admin/Staff – Depending on their role and responsibility, the employee may have a choice in regards to their computing device. The standard assignment is a University Standard desktop computer, in lieu of a desktop computer, an employee's manager may request a laptop for the employee based on criteria including, but not limited to; the amount of travel in a workweek, necessity of mobility, other special criteria that can be determined by the supervisor. However, please note based on the criteria and availability, Information Technology can choose to deny the request, in which the laptop would then need to be purchased by the department. A quote for equipment that includes University standards, can be provided if needed.
FT Faculty – All FT faculty are covered by the University’s Academic Computing Initiative that allows each faculty member to receive a laptop with a refresh cycle of 4 years.
Adjunct Faculty – Are not eligible for computer hardware.
Part-Time Staff – Are not eligible for computer hardware. Based on the department need, they may be assigned a shared desktop, the request must come from the department manager.
Affiliate – Contract workers hired by a 3rd party assigned to a department may receive a University computer based on the department need and written justification submitted by the supervisor of the affiliate and department head.
Dual Role – Faculty that are also advising deans or have administrative functions are assigned only one computing device. Please select your primary role.
Student-workers / Graduate Assistants – Not considered a FTE. They are not eligible for computer hardware. However, upon request, if a department has a large number of Student Workers, the IT department at its discretion may provide a shared desktop based on the need and at a ratio of 2:1 (two student workers to every one PC).
Grant machines – If the faculty have grant funds to buy computer hardware, they may choose to purchase the University standard or forego all support. Machines that do not meet our standard will not be joined to the domain or be eligible for University software.
**Please note: Replacements of adapters that were provided with the deployment of the device that are required due to physical damage or loss (whether stolen or lost), are not covered by the warranty or insurance. If a replacement is needed, it would have to be purchased by your department. Information Technology can provide guidance as to the specifics of the replacement.