13.11.2014 Views

Victory University 2012-2013 Academic Catalog

Victory University 2012-2013 Academic Catalog

Victory University 2012-2013 Academic Catalog

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Computer users are expected to use the <strong>University</strong>’s computing resources responsibly<br />

and appropriately, respecting the rights of other users and all contractual and license<br />

agreements.<br />

• Users are responsible for their own computer resources including data, files, and<br />

processes associated with usage of the <strong>University</strong>’s computing resources.<br />

• All users are expected to comply with the policies governing the use of the <strong>University</strong>’s<br />

computing resources, including the protection of username and passwords.<br />

• The IT Department reserves the right to delete unused or inappropriate data from any<br />

<strong>University</strong> computing resource without prior notice.<br />

• Users should refrain from unnecessary and inappropriate use of bandwidth, storage<br />

space, printing facilities, and/or processing capacity.<br />

PROHIBITED USES OF COMPUTER RESOURCES<br />

While the <strong>University</strong>’s Computer Use Policy defines the responsibilities associated with<br />

computer usage, the following broad categories provide examples of behavior deemed<br />

inappropriate and unacceptable by the <strong>University</strong>.<br />

Misuse of Service<br />

This is any action that renders facilities unusable to those who rely on them, or that interferes<br />

with another’s use of facilities. Examples include:<br />

• Overuse or abuse of the <strong>University</strong>’s computing resources<br />

• Damage to hardware or software<br />

• Recreational game playing when resources are needed by others for legitimate<br />

<strong>University</strong> purposes<br />

• Introducing a computer virus into <strong>Victory</strong> <strong>University</strong>’s computing resources<br />

• Sending obscene or otherwise offensive or unwanted electronic mail<br />

• Not respecting the privacy of other users of the <strong>University</strong>’s computing resources<br />

• Inspecting, modifying, distributing or copying software or data without proper<br />

authorization, or attempting to do so<br />

• Failure to comply with posted policies governing use of public computing facilities<br />

such as the Library or Computer Lab<br />

• Inefficient use of computer resources including, but not limited to, the downloading of<br />

copyrighted music, the sending/forwarding of chain letters, the transmission of nonbusiness<br />

related e‐mails and the downloading of any files where the possibility of<br />

infection by a computer virus is possible<br />

• Installing or attempting to install any software, hardware, or other resource on the<br />

<strong>University</strong>’s computers or networks<br />

52

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!