theundergraduateschoo ls - Wake Forest University
theundergraduateschoo ls - Wake Forest University
theundergraduateschoo ls - Wake Forest University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Council, and the Judicial Council. Complete<br />
detai<strong>ls</strong> are available at the Office of the Dean<br />
of Student Services.<br />
Summary of Computing Rights and<br />
Responsibilities<br />
The policy applies to all computer and computer<br />
communication facilities owned, leased,<br />
operated, or contracted by the <strong>University</strong>.<br />
This includes, but is not limited to, word<br />
processing equipment, microcomputers, minicomputers,<br />
mainframes, computer networks,<br />
computer periphera<strong>ls</strong>, and software, whether<br />
used for administration, research, teaching, or<br />
other purposes. The policy extends to any use<br />
of <strong>University</strong> facilities to access computers<br />
e<strong>ls</strong>ewhere.<br />
<strong>Wake</strong> <strong>Forest</strong> <strong>University</strong> provides each of<br />
its students and faculty with a computer and<br />
an e-mail account. Outside of the classroom,<br />
e-mail is an important means of communication<br />
between faculty, staff, and students. It is<br />
the responsibility of the student to regularly<br />
monitor his or her <strong>Wake</strong> <strong>Forest</strong> e-mail account<br />
for <strong>University</strong> communications.<br />
Basic Principles. The <strong>University</strong>’s computing<br />
resources are for instructional and research<br />
use by the students, faculty, and staff of <strong>Wake</strong><br />
<strong>Forest</strong> <strong>University</strong>. Ethical standards that apply<br />
to other <strong>University</strong> activities (Honor and<br />
Ethics System, the Social Rules and Responsibilities,<br />
and all local, state, and federal laws)<br />
apply equally to use of campus computing<br />
facilities.<br />
As in all aspects of <strong>University</strong> life, users of<br />
computing facilities should act honorably and<br />
in a manner consistent with ordinary ethical<br />
obligations. Cheating, stealing, making fa<strong>ls</strong>e<br />
or deceiving statements, plagiarism, vandalism,<br />
and harassment are just as wrong in the<br />
context of computing systems as they are in<br />
all other domains.<br />
Use of campus facilities is restricted to<br />
authorized users. An “authorized user” is an<br />
individual who has been assigned a login ID<br />
and password by Information Systems staff<br />
(on any relevant system), or by an authorized<br />
agent. Individual users are responsible for the<br />
proper use of their accounts, including the<br />
protection of their login IDs and passwords.<br />
Users are a<strong>ls</strong>o responsible for reporting any<br />
activities that they believe to be in violation of<br />
this policy, just as students are responsible for<br />
reporting Honor and Ethics System violations.<br />
Individua<strong>ls</strong> should use these facilities:<br />
• in a manner consistent with the terms under<br />
which they were granted access to them;<br />
• in a way that respects the rights and privacy of<br />
other users; so as not to interfere with or violate<br />
the normal, appropriate use of these facilities;<br />
and<br />
• in a responsible and efficient manner.<br />
Abusive activities which are already covered<br />
under other <strong>University</strong> policies are to be<br />
handled in the same way, and by the same<br />
authorities, as if a computer had not been<br />
involved, following established guidelines.<br />
Systems Monitoring. This statement serves<br />
as notice to all users of campus computing<br />
systems that regular monitoring of system<br />
activities may occur. Only designated staff of<br />
Information Systems have authorization to<br />
engage in systems monitoring.<br />
Privacy. All individua<strong>ls</strong>, including members of<br />
the Information Systems staff, should respect<br />
the privacy of other authorized users. Thus<br />
they should respect the rights of other users<br />
to security of files, confidentiality of data, and<br />
the ownership of their own work. Nonetheless,<br />
in order to enforce the policies set out<br />
here, designated Information Systems staff<br />
are permitted to monitor activity on local<br />
computing systems.<br />
In the event that staff should investigate<br />
a user, a record of the investigation shall<br />
be placed in a permanent file to be kept in<br />
Information Systems, beyond the standard<br />
log of all systems monitoring. This record<br />
shall state why the user was investigated,<br />
WA K E F O R E S T C O L L E G E<br />
15