Information Technology Services Memorandum of Understanding
Asbury University provides and maintains the campus data servers, networks and information technology services for all employees and students. This system of networks and services includes but is not limited to email, file servers, learning management systems, administrative systems, web services and the Internet. This Memorandum of Understanding outlines how employees and students should behave when using the data networks, labs, servers and services.
The University reserves the right to monitor and limit the use of its computing and network facilities through procedures which are consistent with its mission and the role that computers and data networks are intended to play within that mission. It is our fervent hope that each person who uses the data communications systems will do so in a way that will honor Christ and His kingdom.
Personal Use of the Internet and Electronic Mail
Email and Internet are available for faculty, staff and students to use for both University and personal activities. Priority of these limited resources is given to students, faculty and staff doing academic work and conducting University business. Personal use of network resources is secondary and therefore a lower priority.
Electronic forums or the online environment does not constitute a separate universe of discourse, governed by a separate ethic, but must be approached under the same set of moral and ethical guidelines that govern other means of discourse at the University. All University policies related to personal and professional behavior extend also to the virtual or online environment.
Be advised that some Internet sites may contain material that is defamatory, inaccurate, abusive, obscene, profane, sexually oriented, threatening, racially offensive or illegal. The University does not condone the use of such materials and does not permit usage of such materials on the University’s own network or equipment. All access to the Internet is monitored and logged as a matter of policy. Employees or students who knowingly view or download inappropriate materials using the University’s technology environment will be subject to the same disciplinary policies that apply in other campus situations.
Using or attempting to use software, hardware or any methods to circumvent or disable any form of security, monitoring, metering or University measures used to manage, monitor or control networks, servers, printers, computers and the Internet (firewall security and content filtering) are not permitted and may result in disciplinary action.
Excessive use of information technology resources, including but not limited to campus network bandwidth, server capacity, Internet bandwidth and email, is not permitted. If any one computer or person causes a disruption to the network or servers, then Information Technology Services may disable the network connection to that single computer or the person’s network account so the rest of the campus can continue normal data services. Once the problem has been resolved, the computer connection to the network or person’s account can be restored.
Computer Accounts and Passwords
Every student and employee is provided with one or more server/network accounts. You may not allow others to use your account and password. Those accounts are to be used only by the person they were assigned to and should never be given to or used by anyone else. You are responsible for anything done through the use of your account. Sharing your University-provided account with another person may be grounds for disciplinary action, up to and including dismissal.
Unlawful Access to a Computer
Copyrighted material must not be placed on the University’s information systems without the author’s permission. Only the author(s) or persons they specifically authorize may upload copyrighted material to the University’s information systems.
There are many federal and state laws about the use of technology which include penalties for unauthorized access to technology you do not own and operate. Unlawful access to a computer will result in cancellation of privileges as well as other disciplinary action. Specific acts of computer tampering include changing the network configuration of your computer, uploading or creating computer viruses or password cracking programs, or attempting to use any account without proper authorization.
Security on any computer system is a high priority, especially when the system involves many users. If you can identify a security problem on the University’s information systems, you should notify the Information Technology Services department or send email to firstname.lastname@example.org. You should not discuss the security problem with others nor exploit it yourself.
Termination of Accounts
All student, faculty and staff accounts are terminated after they leave the University.
System administrators reserve the right to suspend or terminate your access to the University’s information systems upon any breach of the Memorandum of Understanding. Prior to a suspension or termination or as soon after as is practicable, a system administrator will inform you of the suspected breach and give you an opportunity to present an explanation. You may request a review hearing within seven (7) days of such suspension or termination if you feel that such action was unjust. After the review, access may be restored if your appeal is upheld.
To appeal the decision of a system administrator, you must file a written request with appropriate information to the Assistant Vice President of Information Technology Services. The AVP will discuss the appeal with other staff of Information Technology Services during their staff meeting and decide whether to grant the appeal. If you are not satisfied with the AVP of Information Technology Services’ response, you may appeal the decision to a special Vice Presidential committee composed of the VP for Student Life, the VP for Business Affairs and the Provost.