myBarry
  • Create admissions profile
  • Check on application status
Admissions

Information Technology

Yvette Brown, M.S., Chief Information Officer
The Division of Information Technology supports faculty, staff, and students by providing excellent library collections and services, technology training, enterprise applications, collaboration solutions, computing platforms, data management, and voice and data networks. With these resources, the Division contributes to the ongoing professional and intellectual development of the Barry community and reaches the larger community by engaging in socially responsible activities.

BarryNet Accounts
All registered students are provided with a BarryNet account.  The account provides access to all university computing resources, which include e-mail, web resources, and network applications.  

E-mail
E-mail is an official method for communication at Barry University. The University may send communications to students via e-mail. Students are responsible for the consequences of not reading in a timely fashion University-related communications sent to their official Barry University student e-mail account.  Students are expected to check their Barry University official e-mail on a frequent and consistent basis in order to remain informed of University-related communications.  E-mail can be accessed by visiting http://www.barry.edu/mymail/

Barry Remote Access Services
Students are nomadic learners with their own devices who want to study and access resources from anywhere.  In recognition of that, a virtual computer lab is available at http://apps.barry.edu.  Students can not only access intranet sites and the latest learning management systems such as Blackboard, but also licensed software such as Minitab and SPSS. 

Public Access Computers
The Library Reference Computer Area is available to students to use anytime during normal hours of operation.  A combination of 54 computers is available.  30 are traditional desktop PC’s, there are 24 laptops available for check-out thru a self-service dispensing kiosk that can be used anywhere on campus.  All of the machines include over 150 software packages used in courses throughout the year.  Black and white as well as color printing is available in both locations.  Please visit http://library.barry.edu for the current hours of operation, or call (305) 899-3893. 

Printing Services
Laser printing in black and white is available for $0.05 per page, and $1.00 per page in color.

Audiovisual Department
The Audiovisual Department provides, maintains, and supports audiovisual equipment throughout the main campus primarily used for classes and campus events. Mobile computers and projection systems are only a few types of equipment that faculty and staff can check out. Students in need of equipment for presentations should ask their professor to reserve equipment, as reservations are not accepted from students. Equipment can be reserved on-line, and a twenty-four hour advance notice is required. For additional information, please contact the audiovisual office at (305) 899-3765.

David Brinkley TV Studio
The David Brinkley TV Studio provides resources for Communication students to work and learn on state-of-the-art equipment. Students work on many projects, including the filming of professional commercials, the video-taping and editing of community and campus events, and the broadcasting of television courses. The studio is also available for commercial productions when not engaged in educational endeavors. For additional information, please contact the studio manager at (305) 899-3462.

Testing Center
Barry University is an authorized testing center for Microsoft Office Specialist certification.  Exams are administered by the Division of Information Technology’s Workplace and Instructional Technologies Services (wITs).  For further information or to schedule an exam, please submit a request for information through http://help.barry.edu>AskQuestions. Mention the department (wITs), and look for a reply in your University e-mail.  

IT Support Desk
The IT Support Desk provides a wide range of services for students on and off campus. They provide support to students connecting to BarryNet, which is the university’s wired and wireless network. They also provide support to all students experiencing problems accessing on-line resources such as the Library’s electronic databases and their Barry e-mail account. In addition to this, they assist students with username and password issues.
The IT Support Desk is located in Library 226, and can be contacted by calling (305) 899-3604, by visiting the support website at http://help.barry.edu, or by sending e-mail to helpdesk@mail.barry.edu. The hours of operation are available on the support website and by calling.

Computer and Network Usage Policy
Purpose and Scope
The computing facilities at Barry University are provided for the use of registered students, faculty and staff. All computer users are responsible for using the facilities in an effective, efficient, ethical and lawful manner. The university views the use of computer facilities as a privilege, not a right, and seeks to protect legitimate computer users by imposing sanctions on those who abuse the privilege.
The following conditions apply to the technology facilities and services at Barry University, managed by the Division of Information Technology. Violations of any of the conditions are considered unethical and possibly unlawful. An individual's computer use privileges may be suspended immediately upon the discovery of a possible violation of these policies. Such suspected violations will be confidentially reported to the appropriate faculty, supervisors, department chairmen, Division of Information Technology staff or Vice Presidents.

POLICIES

Computer Users Agree To Use Facilities And Accounts For University Related Activities Only. Accounts are considered the property of Barry University. All access to networked computer systems must be approved by the Division of Information Technology. Attempts to use accounts without authorization or to use accounts for other than their intended purposes are all violations of this rule. Loopholes in computer security systems or knowledge of a special password should not be used to damage computer systems, obtain extra resources, take resources from another user, gain access to systems or use systems for which proper authorization has not been given. Any attempt to overcome the security systems of any Barry University machine is strictly prohibited. The Division of Information Technology reserves the right to disable and/or terminate an account if any misuse is determined. Computer equipment and accounts are to be used only for the purpose for which they are assigned and are not to be used for commercial purposes or non-university related activities. Game playing is not allowed on the system during the academic semester if the machine is otherwise needed for legitimate academic use.
Programs and files are considered confidential unless they have explicitly been made available to other individuals. Systems personnel may access files when necessary for the maintenance of central computer systems. When performing maintenance, every effort is made to insure the privacy of a user's files. However, if violations are discovered, they will be reported immediately to the appropriate Vice President.
Electronic Communications facilities, such as electronic mail and other messaging systems are for university related activities only. Fraudulent, harassing or obscene messages and/or materials are not to be sent or stored.

Computer Users Agree To Respect The Integrity Of The System. No one should deliberately attempt to degrade the performance of a computer system or to deprive authorized personnel of resources or access to any university computer system.
Users shall not intentionally develop or use programs for the purpose of harassing other users of the facility, breaking into the system, or damaging system components.

Computer Users Agree To The Proprietary Rights Of Software. Computer software protected by copyright is not to be copied from, into, or by using campus computing facilities, except as permitted by law or by the contract with the owner of the copyright. In addition all Barry University computer users are required to abide by the guidelines of the university's Computer Software Policy.
Other organizations operating computing and network facilities that are reachable via the Barry University Network (BarryNet) may have their own policies governing the use of those resources. When accessing remote resources through Barry University facilities, users are responsible for obeying both the policies set forth in this document and the policies of the other organizations.
Users must first consult with the Division of Information Technology prior to engaging in the following activities: establishing electronic data interchange (EDI) arrangements, electronic commerce activities, installing online database services, etc.
Files downloaded from the internet must be scanned with virus detection software before installation or execution. All appropriate precautions must be taken to detect viruses and to prevent the infection of university computers.

Examples Of Misuse

Examples of misuse include, but are not limited to, the activities in the following list.

Using the Campus Network to gain unauthorized access to any computer system.

Knowingly or carelessly performing an act which will interfere with the normal operation of computers, terminals, peripherals, or networks.

Knowingly or carelessly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan Horses and worms as well as programs like Napster that utilize a disproportionate amount of available network bandwidth.

Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or intentionally decrypt secure data. This also includes programs contained within an account, or under the ownership of an account that are designed or associated with security cracking.

Deliberately wasting/overloading computing resources. This includes, but is not limited to, printing multiple copies of a document or printing out large documents that may be available on-line that could significantly impact other users printing resources.

Sending unsolicited electronic mail messages to more than 15 individual recipients. If legitimate messages need to be sent to large groups of people such as classes, clubs or other administrative groups then distribution lists must be properly requested and/or utilized.

Moving large files across networks during peak usage periods or prime hours such that it degrades resource performance. Prime hours will be considered to be Monday through Friday from 8am to 5pm.

Storing large files on the systems which could compromise system integrity or preclude other users right of access to disk storage. Systems Administration staff may remove or compress disk files that are consuming large amounts of disk space, with or without prior notification.

Masking the identity of an account or machine. This includes, but is not limited to, sending mail anonymously.

Using your account for any activity that is commercial in nature, i.e. paid for by non-University funds. Commercial activities include, but are not limited to, consulting, typing services, and developing software for sale.

Posting on electronic bulletin boards materials that violate existing laws or the University's codes of conduct.

Displaying sexually explicit, graphically disturbing, or sexually harassing images or text in a public computer facility, or location that can potentially be in view of other individuals.

Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner. Files owned by individual users are to be considered private property, whether or not they are accessible by other users.

Installing unauthorized devices to the campus network without prior approval. This includes the installation of network server computers (machines configured to provide file/print sharing services, DHCP services, DNS services, WINS services, web page services, etc.) network appliances, network workstations, miscellaneous internet protocol devices, etc.

Activities will not be considered misuse when authorized in writing by appropriate University officials for academic or administrative purposes.

Violations

Violations of this policy will be dealt with in the same manner as violations of other university policies and may result in disciplinary review. In such a review, the full range of disciplinary sanctions is available including the loss of computer use privileges, dismissal from the University, and legal action. Violations of some of the policies may constitute a criminal offense. Barry University employees are responsible for understanding and observing the provisions of this policy.

Review Cycle

This policy will be reviewed annually. The review process will be managed by the Associate Vice President for Information Technology.

Policy for Compliance with Copyright Infringement as Related to the Higher Education Opportunity Act

Purpose

The Higher Education Opportunity Act (HEOA) was signed into law on August 14, 2008.  A portion of it is aimed at combating unauthorized file sharing and copyright infringement on university networks.  Specifically, all colleges and universities must meet three general requirements:

  • An annual disclosure to students describing copyright law and campus policies related to violating copyright law.
  • A plan to "effectively combat the unauthorized distribution of copyrighted materials" by users of its network, including "the use of one or more technology-based deterrents".
  • A plan to "offer alternatives to illegal downloading".

The following sections provide information on Barry University’s adherence to the requirements.

POLICY

Annual Disclosure

The annual disclosure requires a description of institutional policies and sanctions related to the unauthorized distribution of copyrighted material.  This description includes:

  • An annual disclosure that explicitly informs students that unauthorized distribution of copyrighted material, including peer-to-peer file sharing, may subject the students to civil and criminal liabilities.
  • A summary of the penalties for violation of Federal copyright laws.
  • The institution’s policies with respect to unauthorized peer-to-peer file sharing, including disciplinary actions that are taken against students who engage in unauthorized distribution of copyrighted materials using the institution’s information technology system.

Below is the information that will be sent to students via e-mail to their university e-mail address at the beginning of each academic year in the fall.  In addition to the three items listed above, information on the Plan to Effectively Combat Unauthorized Distribution of Copyrighted Materials, as well as Alternatives to Illegal Downloading, will be included.

Summary of Civil and Criminal Penalties for Violation of Federal Copyright Laws
Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.
Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or "statutory" damages affixed at not less than $750 and not more than $30,000 per work infringed. For "willful" infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys' fees. For details, see Title 17, United States Code, Sections 504, 505.
Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense.

Copyright Law of the United States, including penalties for violation, is available from the U.S. Copyright Office.

Some copyright owners search for copyright infringement on-line, and when an infringement is found, send notices to the Online Service Provider (OSP) hosting the user.  Under the Digital Millennium Copyright Act, Barry University is an OSP.  As such, Barry University is required to remove the material in a timely manner when a DMCA complaint is sent to its registered agent, which prevents the University from being held liable for the infringement.

In recent years, with so many individuals illegally sharing music on-line, the Recording Industry Association of America (RIAA) began aggressively searching for individuals illegally sharing music.  Notices of the copyright infringement(s) were sent to the Online Service Provider.  In addition, OSP’s were sent preservation notices, which asked the identifying information (e.g. IP address) be preserved.  The preservation notice also indicated a settlement letter addressed to the individual who allegedly made the infringement would be sent, and asked that it be forwarded on to him/her.  If the individual responded to the letter and settled the claim, there would be no need to serve a subpoena requesting the individual’s name and contact information. 

Violations - DMCA Compliance and Action
Barry University will act on DMCA notices received by its agent.  Unauthorized use of copyrighted material will be removed expeditiously.  For those who engage in copyright infringement, the following will be enforced.

Students
First Violation

  • A Copyright Violation Notice will be sent to the student’s Barry e-mail account, which will need to be printed, signed, and returned to the IT Support Desk in Garner 241.
  • Access to BarryNet via the residence halls and wireless will be denied until the signed Copyright Violation Notice is returned.  Students will be able to use PC’s located in any of the labs on campus.
  • All illegally obtained copyrighted material from the computer must be removed by the student.

    Subsequent Violations
  • A Copyright Violation Notice will be sent to the student’s Barry e-mail account, which will need to be printed, signed, and returned to the IT Support Desk in Garner 241.
  • Access to BarryNet via the residence halls and wireless will be denied for the remaining of the academic year.  Students will be able to use PC’s located in any of the labs on campus.
  • All illegally obtained copyrighted material from the computer must be removed by the student.
  • The student will be referred to the Dean of Students for disciplinary action.

Plan to Effectively Combat Unauthorized Distribution of Copyrighted Materials

The plan to "effectively combat" copyright abuse must be implemented and in writing.  It must also be "periodically reviewed" using "relevant assessment criteria" as determined by each campus.
The University employs several deterrents to combat the unauthorized distribution of copyrighted materials.   While no one deterrent will be completely effective, the number of DMCA notices received by the University’s registered agent under the DMCA will be reviewed annually to determine if the deterrents below are effective.

  • Bandwidth Shaping
    Traffic from peer-to-peer programs is capped at 100Kb/s across all bandwidth available for all peer-to-peer programs recognized by the bandwidth shaping appliance.  In addition to this, individuals connected to the University’s wireless network and wired network in the residence halls cannot exceed 1.5 Mb/s of bandwidth usage at any given time.
  • Traffic monitoring
    The University does monitor bandwidth use to ensure bandwidth is available for mission critical applications, as well as for academic purposes.  Network administrators follow up should aberrations in bandwidth usage be noticed. 
  • DMCA Compliance
    The University will act on DMCA notices, following the policy it has in place on DMCA Compliance and Action.
  • Products Designed to Reduce or Block Illegal File Sharing
    The University has implemented a product called SafeConnect.  Individuals running Windows and Macintosh operating systems who connect to the University’s wireless network and wired network in the residence halls are required to install the SafeConnect policy key.  The policy key checks if any of the more common peer-to-peer applications are actively running.  If so, the individual’s machine is quarantined from network and Internet access until the peer-to-peer program is disabled.  A page listing the alternatives to illegal downloading listed on EDUCAUSE’s website is displayed. 

Alternatives to Illegal Downloading

Universities are required to periodically review the legal alternatives for downloading or otherwise acquiring copyrighted material and make the results of the review available to their students through a web site or other means.
Alternatives to unauthorized file sharing are available on EDUCAUSE’s website.  The Recording Industry Association of America (RIAA) also maintains a listing of alternatives. 

Review Cycle

The Plan to Effectively Combat Unauthorized Distribution of Copyrighted Materials shall be reviewed annually to determine its effectiveness.  The University will review the number of DMCA complaints received during the year to determine if the technology deterrents in place are effective.  If a DMCA complaint is due to the circumvention of an existing technology deterrent in use by the University, the University will assess if any of them can be adjusted to prevent future unauthorized distribution.  If an existing technology deterrent in use by the University cannot be adjusted to prevent future unauthorized distribution, the use of other technology based deterrents will be evaluated.
The Alternatives to Illegal Downloading will be reviewed annually, and these alternatives will be included in the Annual Disclosure sent to the students each year.

Back to Table of Contents

Oh oh ....

We are sorry but it appears that JavaScript is disabled on your browser.
Our site is very interactive and it requires JavaScript to be enabled.
Click on the link below for instructions on how to enable JavaScript on your browser.

Enable JavaScript on your browser