{"id":236,"date":"2012-07-18T14:49:35","date_gmt":"2012-07-18T14:49:35","guid":{"rendered":"https:\/\/huangshizhaopin.com\/information-technology-services\/?page_id=236"},"modified":"2024-08-08T16:08:43","modified_gmt":"2024-08-08T20:08:43","slug":"acceptable-use-policy","status":"publish","type":"page","link":"https:\/\/huangshizhaopin.com\/its\/policies\/acceptable-use-policy\/","title":{"rendered":"Acceptable Use Policy"},"content":{"rendered":"
This Acceptable Use Policy (the \u201cPolicy\u201d) of Saint Peter\u2019s University (the \u201cUniversity\u201d) establishes the rights and responsibilities of all Users (defined herein) regarding the appropriate use of the University Information Systems (defined herein). This Policy is not intended to cover every situation, but instead to provide general guidelines for all users. The University may change this Policy at any time without notice.<\/p>\n
\u201cUniversity Information Systems\u201d refers to all information technology resources including but not limited to computers, networks, network user accounts, servers, printers, software, phones, video and voicemail systems, electronic mail, and web pages developed, maintained and\/or managed by the University and\/or its affiliates. This includes all University owned, licensed, or managed hardware and software and the use of the University networks via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.<\/p>\n
\u201cUser\u201d refers to any University student, faculty, staff, or affiliate using the University Information Systems.<\/p>\n
\u201cDomain Administrator\u201d refers to any individual with express permission and authority from the University to administer and facilitate access to the University Information Systems.<\/p>\n
\u201cUser Account\u201d refers to any account assigned by a University Domain Administrator to faculty, student, staff, or affiliate. A User who has been assigned a User Account has permission to use the University Information Systems within the parameters determined by the Domain Administrator, this Acceptable Use Policy, and other University policies and regulations.<\/p>\n
Principal of Least Privilege (PoLP) is a basic security guideline stating that \u201cevery program and every user of the system should operate using the least set of privileges necessary to complete the job.\u201d<\/p>\n
This Policy applies to all Users of the University Information Systems. All Users are subject to the applicable provisions of the University Personnel Policies and Procedures manual, the student handbook, The NET, and all other policies and procedures established by the schools and administrative offices of
\nthe University. The requirements set forth in this Policy apply to all Users, regardless of the ownership or locations of the device (e.g., computer) used to access the University Information Systems.<\/p>\n
A. Restrictions<\/strong><\/p>\n The University reserves the right to protect its University Information Systems and to restrict User access to University Information System activities that are related to the University. These systems are primarily intended for the academic, educational, and research purposes of the University. The University reserves the right to define what constitutes unauthorized use.<\/p>\n The University and its Users must comply with relevant federal and state laws, including but not limited to, appropriate use, copyright and fair use, and privacy laws.<\/p>\n B. Use of Computers and Equipment Not Owned by the University<\/strong><\/p>\n There are many possible combinations of interaction among the software needed by the remote user and the average mix of programs on most home computers. Troubleshooting software and hardware conflicts can take many hours, and a complete reinstall of operating systems and application software is often the only remedy for problems. For these reasons, the University will provide support for University-owned equipment and software only.<\/p>\n The owner of any device connected to the University Information Systems is responsible for the security of and activity generated by that device. Users must ensure that the latest patches, software and antivirus updates are installed on their devices.<\/p>\n The University will bear no responsibility if the installation or use of any University software on individually-owned computers (computers not owned by the University) causes system lockups, crashes, or complete or partial data loss on such individually-owned equipment.<\/p>\n Upon separation from the University, all University-owned software, including all University-licensed software, must be removed from non-University owned computers. This includes but is not limited to mobiles devices, laptops, and home computers.<\/p>\n C. Computer Usage<\/strong><\/p>\n Computers, computer files, internet access, and software furnished to employees at the University are primarily for business purposes and employees are responsible for seeing that these systems are used in an effective, ethical, and lawful manner. Although incidental personal use of these systems is permitted, any personal use of these systems is expected to be on the User\u2019s own time and is not to interfere with the person\u2019s job responsibilities. Use of these systems may not cause any harm or embarrassment to the University and such use must comply with this Acceptable Use Policy.<\/p>\n Employees should not use a password, access a confidential file, or retrieve any stored confidential communication without authorization.<\/p>\n The University purchases and licenses the use of various computer software for business purposes and does not own the copyright to this software or its related documentation. Unless authorized by the software developer, the University does not have the right to reproduce such software for use on more than one computer.<\/p>\n Employees may only use software on local area networks or on multiple machines according to the software license agreement. The University prohibits the illegal duplication of software and its related documentation.<\/p>\n Unless permission is granted by the Information Technology Department, employees are not permitted to install or copy software on University equipment. Only software that is licensed to or owned by the University is to be installed on University computers.<\/p>\n D. Network User Accounts<\/strong><\/p>\n To utilize the University network, the University requires all Users to log on with the accounts that have been provided to them by the Office of Information Technology. Users are strictly prohibited from sharing User Account information with others or using someone else\u2019s User Account, with or without their permission. Any Users suspecting unauthorized use of their accounts are responsible for changing their passwords and\/or contacting the Office of Information Technology through the help desk to have their accounts temporarily or permanently disabled.<\/p>\n E. Appropriate Use of Information Systems<\/strong><\/p>\n Users are responsible for using the University Information Systems in an efficient, ethical, and lawful manner. Usage that conflicts with this Policy is prohibited, and includes, but is not limited to, the following:<\/p>\n F. Non-commercial, Personal Use<\/strong><\/p>\n The University acknowledges that Users of the University Information Systems may engage in non-commercial, personal use (e.g. personal email). Such use is permitted within the following guidelines:<\/p>\n The University is not responsible for the content of individuals\u2019 personal web spaces, nor the content of servers, programs or files that individuals maintain on personally-owned computers connected to the University\u2019s Information Systems.<\/p>\n G. Electronic Harassment<\/strong><\/p>\n The University has set forth explicit policies in the student and faculty\/staff handbooks regarding harassment. Harassment within the context of the University Information Systems is prohibited and all incidents will be dealt with appropriately.<\/p>\n H. Privacy<\/strong><\/p>\n The University acknowledges its responsibility \u2013 pursuant to this Policy, the Family Educational Rights & Privacy Act (FERPA), the USA Patriot Act of 2001, U.S. Privacy Act, and the Electronic Communications Privacy Act (ECPA) \u2013 to respect the privacy of students\u2019 electronic files and communications within the University Information Systems. However, Users of the Information Systems should be aware of the inherent limitations of shared information system resources. The University cannot guarantee the privacy or confidentiality of stored information or electronic communications. The University is not responsible for non-University resources, including but not limited to information residing on the Internet, even if those non-University resources are accessed through the University\u2019s networks.<\/p>\n Information created, sent, received or stored on the University networks are not private. At all times, the University has the right to monitor and access a User\u2019s communications, files, stored information, and activities using the University Information Systems pursuant to applicable state and federal law, rules and regulations and University policies.<\/p>\n If the University monitors or accesses a User\u2019s files, communications, or activities using the University Information Systems, it will respect that which is privileged or otherwise protected from disclosure by law.<\/p>\n I. Sanctions<\/strong><\/p>\n Violation of this Policy may result in the temporary or permanent disabling of the User Account, depending on the severity of the offense. Other sanctions, including disciplinary action, dismissal and\/or termination, and prosecution under applicable state and federal laws, rules and regulations, may apply.<\/p>\n","protected":false},"excerpt":{"rendered":" Purpose This Acceptable Use Policy (the \u201cPolicy\u201d) of Saint Peter\u2019s University (the \u201cUniversity\u201d) establishes the rights and responsibilities of all Users (defined herein) regarding the appropriate use of the University Information Systems (defined herein). This Policy is not intended to cover every situation, but instead to provide general guidelines for all users. The University may […]<\/p>\n","protected":false},"author":95,"featured_media":0,"parent":234,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-236","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/comments?post=236"}],"version-history":[{"count":8,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/236\/revisions"}],"predecessor-version":[{"id":2352,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/236\/revisions\/2352"}],"up":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/234"}],"wp:attachment":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/media?parent=236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
\n