COMPUTER USAGE POLICY
The computing facilities are provided for the use of registered students. All computer users are responsible for using the facilities in an effective, efficient, ethical and lawful manner. The university views the use of computer facilities as a privilege, not a right, and seeks to protect legitimate computer users by imposing sanctions on those who abuse the privilege.
The following conditions apply to all users of the academic computing facilities. Violations of any of the conditions are considered unethical and possibly unlawful. An individual's computer use privileges may be suspended immediately upon the discovery of a possible violation of these policies.
- Computer users agree to use facilities and accounts for university related activities only. Accounts are considered the property of Barry University. The Division of Information Technology must approve all access to central computer systems, including the issuing of passwords. Authorization for the use of the accounts is given for specific academic purposes. Attempts to use accounts without authorization or to use accounts for other than their intended purposes are all violations of this rule. Loopholes in computer security systems or knowledge of a special password should not be used to damage computer systems, obtain extra resources, take resources from another user, gain access to systems or use systems for which proper authorization has not been given. Any attempt to overcome the security systems of any Barry University machine is strictly prohibited. The Division of Information Technology reserves the right to disable an account if any misuse is determined. Computer equipment and accounts are to be used only for the purpose for which they are assigned and are not to be used for commercial purposes or non-university related activities such as running a word processing service. Game playing is not allowed on the system during the academic semester if the machine is otherwise needed for legitimate academic use.
- An account assigned to an individual, by the Division of Information Technology, must not be used by others without explicit permission from the instructor or administrator requesting the account and by the computer center assigning the account. The individual is responsible for proper password protection.
- Programs and files are considered confidential unless they have explicitly been made available to other authorized individuals. Personnel from the Division of Information Technology may access files when necessary for the maintenance of central computer systems. When performing maintenance, every effort is made to insure the privacy of a user's files. However, if violations are discovered, they will be reported immediately to the appropriate vice president.
- Electronic communications facilities, such as MAIL are for the university related activities only. Fraudulent, harassing or obscene messages and/or materials are not to be sent or stored.
- Computer users agree to respect the integrity of the system. No one should deliberately attempt to degrade the performance of a computer system or to deprive authorized personnel of resources or access to any university computer system.
- Users shall not intentionally develop or use programs for the purpose of harassing other users of the facility, breaking into the system, or damaging system components. Computer users agree to the proprietary rights of software. Computer software protected by copyright is not to be copied from, into, or by using campus computing facilities, except as permitted by law or by the contract with the owner of the copyright. In addition all Barry University computer users are required to abide by the guidelines of the university's Computer Software Policy. The administrative staff or supervising department chairperson will judge an offense as either major or minor.
A first minor offense will normally be dealt with by the Information Technology administrative staff or supervising department chairperson after consultation with the instructor or administrator requesting the account. Additional offenses will be regarded as major offenses. Violations of these policies will be dealt with in the same manner as violations of other university policies and may result in disciplinary review. In such a review, the full range of disciplinary sanctions is available including the loss of computer use privileges, dismissal from the university, and legal action. Violations of some of the policies may constitute a criminal offense.
As with all matters of law and ethics, ignorance of the rules does not excuse violations.