19.08.2015 Views

11824_JFKU_Catalog Front Cover.indd - John F. Kennedy University

11824_JFKU_Catalog Front Cover.indd - John F. Kennedy University

11824_JFKU_Catalog Front Cover.indd - John F. Kennedy University

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

General InformationMisuseMisuse of computing, networking, or information resources mayresult in the loss of computing privileges. Additionally, misuse maybe prosecuted under applicable statutes. Users may also be heldaccountable for their conduct under any applicable universitypolicies and procedures. Complaints alleging misuse of computingresources will be directed to those responsible for takingappropriate disciplinary action as specified under enforcement,below. Storage, reproduction, or other use of any material protectedby copyright law may lead to severe legal penalties—see the sectionin this document titled Notice Regarding Copyright.other organizations operating computing and network facilitiesthat are reachable via the <strong>John</strong> F. <strong>Kennedy</strong> <strong>University</strong> network mayhave their own policies governing the use of those resources. Whenaccessing remote resources from the JFK <strong>University</strong> facilities, usersare responsible for learning and obeying both the policies set forthin this document and the policies of the other organization(s).EnforcementMinor infractions of this policy, when likely accidental in nature,are typically handled internally by the Information technologyDepartment in an informal manner via e-mail or in-persondiscussions. Some examples are poorly chosen passwords,overloading the system, and excessive disk space consumption.More serious violations are handled via formal procedures. Someexamples are sharing accounts or passwords, harassment orrepeated minor infractions, as described in but not limited to thosedescribed in the preceding paragraph, may result in the temporaryor permanent loss or modification of access to the university’scomputing resources and notification of the student’s instructors,department/division chairs, the director of student affairs, or theappropriate manager in the case of a faculty or staff individual.Particularly grave abuses, such as unauthorized use; attempts tosteal passwords or data, or to examine data without authorization;unauthorized use or copying of licensed software; violations of otheruniversity policies; or repeated lesser violations as described in theabove paragraphs may also result in the temporary or permanentloss of computing access privileges, as well as other disciplinaryactions. In such cases, the offender’s appropriate instructor(s)/department(s) will be notified of the infractions. If the offender is astudent at the university, the case will also be referred to theappropriate vice president for appropriate action.Any offenses that may be in violation of local, state, or federal lawwill result in the immediate suspension of all computing privileges,and will be reported to the appropriate university and lawenforcement authorities. Additionally, the university’s appropriatedisciplinary procedures will apply, and the university reserves theright to classify any particular violation’s severity, and determinethe appropriate administrative response.Examples of Misuse• Using a computer account that you are not authorized to use, byany means whatsoever. obtaining a password for another’scomputer account without the consent of the account owner. Ifyou, as an authorized user, give our your account and passwordto another individual, you can still be held accountable for anyactions that may arise that are associated with your account.• Knowingly or carelessly performing any act that will interferewith the normal operation of computers, terminals, peripheralsor networks, or data or software therein, or impair their securityor integrity.• Attempting to circumvent data protection schemes or uncoversecurity loopholes. is includes creating or running programsthat are designed to identify security loopholes or decrypt oraccess intentionally secure data. is also includes storingprograms within an account, or under the ownership of anaccount, that are designed or associated with security cracking.• violating terms of applicable software licensing agreements orcopyright laws.• Using e-mail to harass others.• Creating mail or other electronic distribution lists larger than 10addresses that send electronic communications to other accountswithout prior permission of the receiving individual, or sendingexcessive electronic communications to any user withoutconsent.• Moving large files across networks during peak usage periods orprime hours such that it degrades resource performance. Primehours will be considered to be Monday through Friday from 10a.m. to 6 p.m.• Storing large files on the systems that could compromise systemintegrity or interfere with other users’ access to storage resources.e Information technology Department staff may remove orcompress any files that in their judgment are consumingexcessive amounts of disk or other storage space, with or withoutprior notification.• Masking the identity of an account or machine. is includes,but is not limited to, sending mail anonymously.• Using university computing resources for any activity that is forprofit, or that is commercial in nature, i.e., paid for bynon-university funds. Commercial activities include, but are notlimited to, consulting, typing services, developing software forsale, and advertising.• Posting on electronic bulletin boards or other generallyaccessible locations materials that violate existing laws or theuniversity codes of conduct.• Posting on Internet services, or in any non-private location,information that may be slanderous or defamatory in nature.• Displaying sexually explicit, graphically disturbing, or sexuallyharassing images or text in a public computer facility or othernon-private location that can potentially be in view of otherindividuals, or transmitting such material to another withouttheir advance consent.• Attempting to monitor or tamper with another user’s electroniccommunications, or reading, copying, changing, or deletinganother user’s files or software without the explicit agreement ofthe owner. Accounts and files owned by individual users are tobe considered private property, whether or not they areaccessible to other users.Activities will not be considered misuse when authorized in writingby appropriate university officials for security or performancetesting.Notice Regarding CopyrightUnder the provisions of title 17, United States Code, as well asunder the provisions of domestic and international law, the26 General Information <strong>John</strong> F. KenneDy UnIverSIty

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!