29.01.2015 Views

Guide to Student Life - Campus Life - Adelphi University

Guide to Student Life - Campus Life - Adelphi University

Guide to Student Life - Campus Life - Adelphi University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

INFORMATION SYSTEMS: ACCEPTABLE<br />

USE POLICY<br />

The information systems (including computers, computer accounts, microcomputers, printers,<br />

networks, software, electronic mail, video, telephones and telephone long distance and<br />

voicemail accounts) and all communications and information transmitted by, received from<br />

or s<strong>to</strong>red in these systems are property of the <strong>University</strong> and are provided for the use of<br />

<strong>Adelphi</strong> students, faculty and staff, as approved, in support of the programs of the <strong>University</strong>.<br />

All students, faculty and staff are responsible for seeing that these information systems are<br />

used in an effective, efficient, ethical and lawful manner. The use of information systems is a<br />

privilege, not a right, which may be revoked at any time for misuse, including, but not limited<br />

<strong>to</strong>, violation(s) of this policy. <strong>Adelphi</strong> <strong>University</strong> will routinely exercise its right <strong>to</strong> examine the<br />

contents of its information systems and/or moni<strong>to</strong>r its usage from time <strong>to</strong> time. Their contents<br />

may be accessed only by authorized <strong>University</strong> personnel. The following policies relate <strong>to</strong> their<br />

use and the <strong>University</strong> reserves the right <strong>to</strong> modify this policy at any time:<br />

The information systems are owned by the <strong>University</strong> and are <strong>to</strong> be used for <strong>University</strong>-related<br />

activities only. All access <strong>to</strong> central information systems, including the issuing of accounts, must<br />

be approved through the Office of Information Technology (OIT). All access <strong>to</strong> school, institute,<br />

college or departmental information systems must be approved by authorized personnel.<br />

Information systems are <strong>to</strong> be used in accordance with all federal, state and local laws, only for<br />

the purpose for which they are assigned and are not <strong>to</strong> be used for commercial purposes or<br />

non-<strong>University</strong>, personal, solici<strong>to</strong>us or union-related activities.<br />

Computer programs, electronic mail, voicemail and electronic files are presumed <strong>to</strong> be private<br />

and confidential unless there is suspected misuse or they have explicitly been made available <strong>to</strong><br />

other authorized individuals. Authorized OIT personnel may access others’ files when necessary<br />

for the maintenance and security of information systems. When performing maintenance, every<br />

effort will be made <strong>to</strong> ensure the privacy of a user’s files; however, if violations of policies are<br />

discovered, they will be reported <strong>to</strong> the appropriate vice president and either the assistant vice<br />

president for human resources and labor relations for employee accounts or the dean of student<br />

affairs for student accounts.<br />

Fraudulent, harassing, illegal or obscene messages and/or materials are not <strong>to</strong> be sent, printed,<br />

requested or s<strong>to</strong>red. Chain letters and other forms of Internet mass mailings are also not<br />

allowed.<br />

A computer account, electronic mail account or voicemail account assigned <strong>to</strong> an individual<br />

must not be used by others without explicit permission from the instruc<strong>to</strong>r or administra<strong>to</strong>r<br />

requesting the account. The individual is responsible for the proper use of the account,<br />

including proper password protection.<br />

Information system accounts that expire, along with the files in the expired accounts, will be<br />

deleted. Accounts expire in accordance with the terms of the account. Email and voicemail<br />

messages that are older than the limit set by the system administra<strong>to</strong>r will be deleted. For active<br />

employees and others who have an ongoing relationship with the <strong>University</strong>, such as emeritus<br />

professors, the account will not be closed and files will not be deleted without every effort<br />

being made <strong>to</strong> contact the account holder. The Office of Information Technology will assist in<br />

whatever way possible <strong>to</strong> its best ability and practices <strong>to</strong> help account holders archive their<br />

files.<br />

Software systems that allow access through the network <strong>to</strong> the contents of microcomputer<br />

files will not be installed on a microcomputer without the approval of the faculty or staff<br />

140

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!