Victory University 2012-2013 Academic Catalog
Victory University 2012-2013 Academic Catalog
Victory University 2012-2013 Academic Catalog
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
• Computer users are expected to use the <strong>University</strong>’s computing resources responsibly<br />
and appropriately, respecting the rights of other users and all contractual and license<br />
agreements.<br />
• Users are responsible for their own computer resources including data, files, and<br />
processes associated with usage of the <strong>University</strong>’s computing resources.<br />
• All users are expected to comply with the policies governing the use of the <strong>University</strong>’s<br />
computing resources, including the protection of username and passwords.<br />
• The IT Department reserves the right to delete unused or inappropriate data from any<br />
<strong>University</strong> computing resource without prior notice.<br />
• Users should refrain from unnecessary and inappropriate use of bandwidth, storage<br />
space, printing facilities, and/or processing capacity.<br />
PROHIBITED USES OF COMPUTER RESOURCES<br />
While the <strong>University</strong>’s Computer Use Policy defines the responsibilities associated with<br />
computer usage, the following broad categories provide examples of behavior deemed<br />
inappropriate and unacceptable by the <strong>University</strong>.<br />
Misuse of Service<br />
This is any action that renders facilities unusable to those who rely on them, or that interferes<br />
with another’s use of facilities. Examples include:<br />
• Overuse or abuse of the <strong>University</strong>’s computing resources<br />
• Damage to hardware or software<br />
• Recreational game playing when resources are needed by others for legitimate<br />
<strong>University</strong> purposes<br />
• Introducing a computer virus into <strong>Victory</strong> <strong>University</strong>’s computing resources<br />
• Sending obscene or otherwise offensive or unwanted electronic mail<br />
• Not respecting the privacy of other users of the <strong>University</strong>’s computing resources<br />
• Inspecting, modifying, distributing or copying software or data without proper<br />
authorization, or attempting to do so<br />
• Failure to comply with posted policies governing use of public computing facilities<br />
such as the Library or Computer Lab<br />
• Inefficient use of computer resources including, but not limited to, the downloading of<br />
copyrighted music, the sending/forwarding of chain letters, the transmission of nonbusiness<br />
related e‐mails and the downloading of any files where the possibility of<br />
infection by a computer virus is possible<br />
• Installing or attempting to install any software, hardware, or other resource on the<br />
<strong>University</strong>’s computers or networks<br />
52