07.01.2013 Views

theundergraduateschoo ls - Wake Forest University

theundergraduateschoo ls - Wake Forest University

theundergraduateschoo ls - Wake Forest University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Council, and the Judicial Council. Complete<br />

detai<strong>ls</strong> are available at the Office of the Dean<br />

of Student Services.<br />

Summary of Computing Rights and<br />

Responsibilities<br />

The policy applies to all computer and computer<br />

communication facilities owned, leased,<br />

operated, or contracted by the <strong>University</strong>.<br />

This includes, but is not limited to, word<br />

processing equipment, microcomputers, minicomputers,<br />

mainframes, computer networks,<br />

computer periphera<strong>ls</strong>, and software, whether<br />

used for administration, research, teaching, or<br />

other purposes. The policy extends to any use<br />

of <strong>University</strong> facilities to access computers<br />

e<strong>ls</strong>ewhere.<br />

<strong>Wake</strong> <strong>Forest</strong> <strong>University</strong> provides each of<br />

its students and faculty with a computer and<br />

an e-mail account. Outside of the classroom,<br />

e-mail is an important means of communication<br />

between faculty, staff, and students. It is<br />

the responsibility of the student to regularly<br />

monitor his or her <strong>Wake</strong> <strong>Forest</strong> e-mail account<br />

for <strong>University</strong> communications.<br />

Basic Principles. The <strong>University</strong>’s computing<br />

resources are for instructional and research<br />

use by the students, faculty, and staff of <strong>Wake</strong><br />

<strong>Forest</strong> <strong>University</strong>. Ethical standards that apply<br />

to other <strong>University</strong> activities (Honor and<br />

Ethics System, the Social Rules and Responsibilities,<br />

and all local, state, and federal laws)<br />

apply equally to use of campus computing<br />

facilities.<br />

As in all aspects of <strong>University</strong> life, users of<br />

computing facilities should act honorably and<br />

in a manner consistent with ordinary ethical<br />

obligations. Cheating, stealing, making fa<strong>ls</strong>e<br />

or deceiving statements, plagiarism, vandalism,<br />

and harassment are just as wrong in the<br />

context of computing systems as they are in<br />

all other domains.<br />

Use of campus facilities is restricted to<br />

authorized users. An “authorized user” is an<br />

individual who has been assigned a login ID<br />

and password by Information Systems staff<br />

(on any relevant system), or by an authorized<br />

agent. Individual users are responsible for the<br />

proper use of their accounts, including the<br />

protection of their login IDs and passwords.<br />

Users are a<strong>ls</strong>o responsible for reporting any<br />

activities that they believe to be in violation of<br />

this policy, just as students are responsible for<br />

reporting Honor and Ethics System violations.<br />

Individua<strong>ls</strong> should use these facilities:<br />

• in a manner consistent with the terms under<br />

which they were granted access to them;<br />

• in a way that respects the rights and privacy of<br />

other users; so as not to interfere with or violate<br />

the normal, appropriate use of these facilities;<br />

and<br />

• in a responsible and efficient manner.<br />

Abusive activities which are already covered<br />

under other <strong>University</strong> policies are to be<br />

handled in the same way, and by the same<br />

authorities, as if a computer had not been<br />

involved, following established guidelines.<br />

Systems Monitoring. This statement serves<br />

as notice to all users of campus computing<br />

systems that regular monitoring of system<br />

activities may occur. Only designated staff of<br />

Information Systems have authorization to<br />

engage in systems monitoring.<br />

Privacy. All individua<strong>ls</strong>, including members of<br />

the Information Systems staff, should respect<br />

the privacy of other authorized users. Thus<br />

they should respect the rights of other users<br />

to security of files, confidentiality of data, and<br />

the ownership of their own work. Nonetheless,<br />

in order to enforce the policies set out<br />

here, designated Information Systems staff<br />

are permitted to monitor activity on local<br />

computing systems.<br />

In the event that staff should investigate<br />

a user, a record of the investigation shall<br />

be placed in a permanent file to be kept in<br />

Information Systems, beyond the standard<br />

log of all systems monitoring. This record<br />

shall state why the user was investigated,<br />

WA K E F O R E S T C O L L E G E<br />

15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!