Student Handbook - Butler University
Student Handbook - Butler University
Student Handbook - Butler University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
(a) A number of websites exist today that make it easy to download music and video files<br />
from the Internet. However, many of these materials available for download are illegal duplications<br />
and made available without permission of the copyright owner. Downloading<br />
and other duplication of copyrighted materials is only legal with the permission of: the actual<br />
copyright owner; or a legitimate claim of “fair use.” Therefore, music and/or video<br />
files nay not be downloaded or otherwise copied from the Internet without the specific<br />
written approval of an authorized officer of the <strong>University</strong>. When such downloads are<br />
authorized, you must promptly check any downloaded files of software for viruses.<br />
Software Licensing<br />
1. <strong>Butler</strong> <strong>University</strong>’s policy is to license all software used on campus according to applicable law.<br />
In order to maintain documentation of compliance with these laws, the department of information<br />
resources must maintain certain records on all faculty/staff software acquisition and track information<br />
about our investment in software.<br />
2. The information resources department will retain original distribution media, and other proofs<br />
of purchase when applicable, for all <strong>University</strong>-owned software. The proof of purchase is often<br />
needed for software upgrades and/or to establish proof of legal license. Media also provide protection<br />
for the <strong>University</strong>’s investment if a faculty/staff member leaves and the software is transferred<br />
to a new person. Media allows for re-installation and/or personalization of the software for<br />
the new user and can serve as a form of backup for the original user if the application software is<br />
accidentally corrupted or destroyed.<br />
3. Software license rules must be followed regardless of the physical location of the software that is<br />
used and the access method used to activate the software.<br />
4. Faculty/staff members may also use personally purchased software on the <strong>University</strong> systems<br />
providing:<br />
(a) The software is used according to its license requirements.<br />
(b) The software is registered with the department of information resources along with a<br />
signed statement or copies of appropriate proof of purchase of license.<br />
(c) The software does not adversely react with other <strong>University</strong> software installed on the system, or<br />
violate any licensing requirements of the <strong>University</strong> software.<br />
(d) The software does not adversely affect operation, traffic or security of the network and its other<br />
computer nodes.<br />
(e) Operation and/or consulting assistance is not needed for successful use of the software.<br />
Scanning Documents<br />
1. It is <strong>Butler</strong>’s policy to comply with any federal, state, or local regulation related to electronic<br />
scanning of documents, including “fair use” policies on copyrighted material.<br />
2. Under guidelines from the U.S. government it is stated that anyone who scans “sensitive documents”<br />
risks “Constructive Seizure” of their computer equipment, up to $25,000 in fines, or<br />
up to 15 years imprisonment. These guidelines define “sensitive documents” to include the following:<br />
(a) Money<br />
(b) Federal Reserve notes<br />
(c) U.S. postage stamps<br />
(d) Foreign postage stamps<br />
(e) Revenue stamps<br />
(f) Other negotiable valuated articles (for example, checks, bonds, and securities)<br />
1 Adapted from the Acceptable Use Policy of the Corporation for Research and Educational Networking<br />
96