10. Electronic Resources, Policy on the Responsible and Acceptable Use of

 

Purpose:

 

St. Bonaventure University requires the ethical, legal, and secure use of computing and

electronic communications by all members of the St Bonaventure community.

 

Scope:

This policy applies to all students, faculty, and staff at St. Bonaventure and will guide

their use of electronic resources in support of our academic mission.

 

For the purposes of this policy, electronic resources are defined as all computer-related

equipment, computer systems, software/ network applications (including email), interconnecting

networks (such as Internet access), facsimile machines, audio/visual equipment, voicemail and

other telecommunications facilities, as well as all information contained therein (collectively,

"electronic resources") owned or managed by the University.

 

Policy:

 

Access

 

Access to electronic resources is granted to faculty, staff and students of the University

in accordance with this policy. Faculty and staff are typically provided with a desktop computer

(with network/internet/email access) and a telephone connection as needed to perform job duties.

In addition, public computing facilities are available and network access is provided in residence

halls, apartments, and classrooms to support instruction, research, and learning.

 

Technology Services will provide network accounts to eligible users. These accounts

provide access to various systems (such as email, administrative software, voice mail, and/or

discipline specific academic software) as required.

 

Technology Services will do its best to provide reliable service to the SBU community but

access to all systems 24 hours/day is not guaranteed. Technology Services will notify users of

problems or scheduled maintenance in a timely fashion and whenever possible, will explain the

reasons for any downtime.

 

            In order to access the university network, computers need to be running a minimum suite of security-related software, such as virus protection programs, operating system updates, and similar protective software, as defined by Technology Services and posted on their Web site.

 

 

 

 

 

Cooperative Computing

 

Collegiality involves the practice of cooperative computing and requires:

*       Regular deletion of unneeded files from one’s accounts on shared computing resources

*       Prudent use of connect time, information storage space, printing facilities, processing capacity, or network services

*       Prudent use of digital sounds and visuals in public facilities to avoid disruption to others

*       Protection of the confidentiality of data, system access, and passwords

*       The maintenance and upkeep of virus protection software on your computer to avoid passing destructive computer viruses to others

 

Appropriate Use

 

All users of University electronic resources are expected to utilize such resources in a responsible, ethical and legal manner consistent with St. Bonaventure’s mission and policies. The following are categories of inappropriate and prohibited use of electronic resources

with some examples to explain each category:

 

1. Use that impedes, interferes with, impairs, or otherwise causes harm to the

activities of others.

 

Examples include:

 

*       Propagating chain letters or virus hoaxes

*       Spamming (spreading email or postings widely and without good purpose)

*       Bombing (flooding an individual, group, or system with numerous or large email messages)

*       Reckless distribution of unwanted email or other unwanted messages

*       Other behavior that may cause excessive network traffic or computing load

*       Use of the University's trademarks, logos, insignia, or copyrights without prior approval

 

 

2. Use that is inconsistent with St. Bonaventure’s non-profit status.

 

Examples include:

 

*       Commercial use of university systems for non-university purposes.

Prohibited commercial use does not include communications and exchange of data that furthers the University's educational, administrative, research, and other defined roles, even if there is an incidental financial (or other benefit) to an external organization.

*       Use of electronic resources in a way that suggests University endorsement of any political candidate or ballot initiative.

*       Use of university electronic resources for the purpose of lobbying that connotes University involvement.

 

 

3. Use that is harassing, threatening, or not keeping with our Franciscan values.

 

Examples include:

 

*       Repeated unwelcome contacts with another

*       Email that threatens another with bodily harm

 

 

4. Use damaging the integrity of internal/external systems.

 

Examples include:

 

*       Attempts to defeat system security such as sharing passwords or compromising locks in computer labs or network equipment closets.

*       Unauthorized access to systems and/or data

*       Assisting others in gaining unauthorized access to systems and/or data

*       Intercepting data/voice communications not intended for that user

*       Disguised use such as concealing your network identity, impersonating others, or using a false identity.

*       Intentional distribution of computer viruses.

*       Committing a Denial of Service attack

*       Modification or removal of university owned equipment or data without specific authorization.

*       The installation of unauthorized devices on the university network

*       The installation of unauthorized software on university computers

 

 

5. Use in violation of law.

Examples include:

 

*       Any use of electronic resources that violates civil or criminal law at the federal, state, or local levels

*       Promoting a pyramid scheme

*       Knowingly receiving, transmitting, or possessing illegal materials

*       Copyright infringement

 

 

6. Use in violation of University contracts.

 

All use of university systems must be consistent with the University's contractual obligations, including limitations defined in software and other licensing agreements.

 

 

7. Use in violation of University policy.

 

Use of electronic resources cannot violate other University policies such as:

 

*       Personnel Policies

*       University, departmental, and work-unit policies

*       University Governing Documents

*       Student Handbook

*       Hourly Employee Handbook

 

In the event of a conflict between this policy and the St. Bonaventure University's Academic Freedom Policy, the Academic Freedom policy will take precedence over this policy.

 

8. Use in violation of external data network policies.

 

Users must observe all applicable policies of external data networks when using such networks.

 

 

Account Suspension/Revocation:

 

Improper use of university technology may result in the suspension or revocation of account access. In addition, access to technology facilities can be suspended, denied, or limited by Technology Services in order to maintain the operation and/or integrity of university systems and/or systems reachable by the SBU system. Any infraction in policies may result in the disabling of an account and may also result in charges being filed with the proper authorities.

 

Technology Services administrators will make the initial determination to suspend or deny a user's access to his/her account based on a known infraction. Appeals or further adjudication will be handled through the student judicial process for students or through immediate supervisors for faculty, administrators, and staff. Technology Services (or other university officials) shall not actively monitor user files, email, and account content unless directed by law enforcement or the normal university judicial process.

 

 

Procedure:

 

Students will automatically be assigned a network account.  Faculty and staff will be required to sign the attached form when receiving account access. The signature indicates that they have been given a copy of this policy and that they understand their use of university electronic resources and computer technologies is subject to the provisions in this policy.

 

 

 

 

 

 

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

St. Bonaventure University

Application for Network Access

______________________________________________________________________

 

Employee Status: [ ] Faculty [ ] Adjunct Faculty [ ] Staff [ ] Part-time Staff

[ ] Special Status – Explain :____________________________

 

 

Name: ________________________________________________________________

Last First M.I.

 

Campus Phone #: ______________________________________________________

 

Department: ___________________________________________________________

 

I have received a copy of St. Bonaventure’s policy on the responsible and acceptable use of

electronic resources and understand that my use of university electronic resources and computer

technologies is subject to the provisions in this policy.

 

Signature: ____________________________________