Fairfield University Computer Systems Acceptable Use Policy
November 13, 2000,
Updated June 30, 2004
This policy is designed to guide students, faculty, staff, and other authorized users in the acceptable use of computer and information systems and networks provided by Fairfield University according to the mission of the University. It is meant as an application of the principles of respect and reverence for every person, the development of community and the ideals of liberal education that are at the core of Fairfield's Catholic, Jesuit identity. This policy supersedes the "Acceptable Use Policy" (number 610) adopted 1/1/94. This policy does not supersede any other University policies, including those pertaining to student grievances, sexual harassment, and personal conduct (Policy No. 480, Item #27).
Guiding Principles:
The Fairfield University community is encouraged to make innovative and creative use of information technologies in support of education and research. Access to information representing a multitude of views on current and historical issues should be allowed for the interest, information and enlightenment of the University community. Consistent with other University policies, this policy is intended to respect the rights and obligations of Academic Freedom, and recognizes that the educational mission of the University is served in a variety of ways.
The University recognizes that the purpose of copyright is to protect the rights of the creators of intellectual property and to prevent the unauthorized use or sale of works available in the private sector. Publication, distribution, or broadcast of copyright protected materials with out permission is prohibited. Also consistent with other University policies, an individual's right of access to computer materials should not be denied or abridged because of race, creed, color, age, national origin, gender, sexual orientation, or disability.
The University cannot protect individuals against the existence or receipt of material that may be offensive to them. As such, those who make use of electronic communications are warned that they may come across or be recipients of material they find offensive. Those who use e-mail and/or make information about themselves available on the Internet should be forewarned that the University cannot protect them from invasions of privacy and other possible dangers that could result from the individual's distribution of personal information.
In the interests of promoting the free exchange of ideas, Fairfield University does not exercise prior review of electronic documents available on its network and accessible locally or through the internet. Individuals who access materials available on the Fairfield University network should understand that these materials, unless otherwise posted, do not necessarily reflect the views of Fairfield University. Individuals who feel that particular materials posted on the Fairfield University network are inappropriate or otherwise objectionable, may lodge a formal complaint through the office of Computing and Network Services.
Fairfield University computing and network resources are to be used for University-related research, instruction, learning, enrichment, dissemination of scholarly information, and administrative activities. The computing and network facilities of the University are limited and should be used wisely and carefully with consideration for the needs of others. Computers and network systems offer powerful tools for communication among members of the community and of communities outside the University. When used appropriately, these tools can enhance dialog and communication. When used unlawfully or inappropriately, however, these tools can infringe on the rights of others.
Responsibilities:
The following examples, though not covering every situation, specify some of the responsibilities that accompany computer use at Fairfield and/or on networks to which Fairfield is connected.
- Users may not attempt to modify the University system or network facilities or attempt to crash systems. They should not tamper with any software protections or restrictions placed on computer applications or files.
- All users must obtain authorized computing accounts and may only use their own user namesand passwords to access University computing and network systems. Users may not supply false or misleading data nor improperly obtain another's password in order to gain access to computers or network systems, data or information. The negligence or naiveté of another user in revealing an account name or password is not considered authorized use. Convenience of file or printer sharing is not sufficient reason for sharing a computer account. Users should not attempt to subvert the restrictions associated with their computer accounts.
- Users are responsible for all use of their computer account(s). They should make appropriate use of the system and network-provided protection features and take precautions against others obtaining access to their computer resources. Individual password security is the responsibility of each user.
- Users may not encroach on others' use of computer resources. Such activities would include, but are not limited to, tying up computer resources for excessive game playing or other trivial applications; sending harassing messages; sending frivolous or excessive messages, including chain letters, junk mail, and other types of broadcast messages, either locally or over the Internet; using excessive amounts of storage (as determined by Computing and Network Services policies); intentionally introducing any computer viruses, worms, Trojan Horses, or other rogue programs to Fairfield University hardware or software; physically damaging systems; or running grossly inefficient programs when efficient ones are available.
- Users are responsible for making use of software and electronic materials in accordance with copyright and licensing restrictions and applicable university policies. Fairfield University equipment and software may not be used to violate copyright or the terms of any license agreement. No one may inspect, modify, distribute, or copy proprietary data, directories, programs, files, disks or other software without proper authorization.
- Users must remember that information distributed through the University's computing and networking facilities is a form of publishing, and some of the same standards apply. For example, anything generated at Fairfield that is available on the Internet through the University's network represents the University and not just an individual. Even with disclaimers, the University is represented by its students, faculty and staff, and appropriate content, language and behavior is warranted.
- Users may not transmit any material that is unlawful, libelous, or encourages conduct that would constitute a criminal offense, give rise to civil liability, or otherwise violate any federal, state, or local laws. Materials made available or transmitted on University Computer systems must comply with all University policies governing conduct of students, faculty and staff.
Administration:
The University encourages all members of its community to use electronic communications in a manner that is respectful to others. While respecting users' confidentiality and privacy, the University reserves the right to examine computer files and monitor electronic activity within the limits of other applicable University policies. The University may exercise this right in order to enforce its policies regarding harassment and the safety of individuals; to prevent the posting of proprietary software or electronic copies of electronic texts or images in disregard of copyright restrictions or contractual obligations; to safeguard the integrity of computers, networks, and data either at the University or elsewhere; and to protect the University against seriously damaging consequences. The University may restrict the use of its computers and network systems for electronic communications when faced with evidence of violation of University policies, or federal, state or local laws. The University reserves the right to limit access to its networks through University-owned or other computers, and to remove or limit access to material posted on University-owned computers.
All users are expected to conduct themselves consistent with these responsibilities and all other applicable University policies. Abuse of computing privileges will subject the user to disciplinary action according to established University procedures. Abuse of networks or computers at other sites through the use of Fairfield University resources will be treated as an abuse of computing privileges at the University. When appropriate, temporary restrictive actions will be taken by system or network administrators pending further disciplinary action; the loss of computing privileges may result.
The University and users recognize that all members of the University community are bound by federal, state and local laws relating to civil rights, harassment, copyright, security and other statutes relating to electronic media. It should be understood that this policy does not preclude enforcement under the laws and regulations of the United States of America nor the State of Connecticut.
This policy may be amended or changed by the University Vice-Presidents, and in matters affecting the Academic Division, with the mutual consent of the Academic Council.
Click here for information on Interpreting the Acceptable Use Policy
