Computer Technology and the Internet
Subpages
COMPUTER TECHNOLOGY AND THE INTERNET
Rights And Responsibilities
Computers and networks can provide access to resources both on and off campus, as well as the ability to communicate with other users worldwide. This access is a privilege and requires responsible behavior from each user. Users must respect the rights of others, maintain the integrity of the systems and related physical resources, and comply with all applicable laws, regulations, and contractual obligations.
Under federal and state laws, students have rights to access information about themselves contained in computer files. Files may be subject to search under court order. Additionally, system administrators may access user files in order to protect the integrity of computer systems. For example, system administrators, following organizational guidelines, may access or examine files or accounts suspected of unauthorized use, misuse, or any form of compromise.
Appropriate Use
Joyce University grants students, faculty, and staff the privilege to use its computers and network. With access to the campus network, users can send and receive electronic mail messages, share ideas through appropriate media, and use browsers and other tools to search and find necessary information.
The internet is a vast network of connected computers whose users make up a worldwide community. In addition to formal policies, regulations, and laws governing the use of computers and networks, the Internet user community follows informal standards of conduct. These standards, based on common understandings of appropriate and considerate behavior, evolved in the early days of the Internet when it was primarily used by an academic and highly technical community. While the Internet now has a much wider broader user base, these early codes of conduct persist, transcending geographical and governmental boundaries to foster a positive and productive experience. Students are expected to observe these informal standards and be "good digital citizens.”
Existing Legal Context
All existing laws (federal and state) and University regulations and policies apply, including those specific to computers and networks, as well as those applicable to general personal conduct. Activities authorized by appropriate University officials for security or performance testing are not considered misuse.
Misuse of computing, networking, or information resources may result in the restriction of computing privileges. Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable University or campus policies, procedures, or collective bargaining agreements. Complaints alleging misuse of campus computing and network resources will be directed to the appropriate authorities for disciplinary action.
Reproduction or distribution of copyrighted works, including but not limited to images, text, or software, without the owner’s permission is an infringement of U.S. Copyright Law. Such infringement is subject to civil damages and criminal penalties, including fines and imprisonment. Please consult the Copyright Policy for more information.
Additional Use Policies
The Computer Use Policy applies to all Joyce University computer and network resources. Additional policies, terms and conditions may apply to other electronic services offered by the campus. Users are responsible for reviewing and adhering to these additional policies as they engage with different services.
Examples Of Misuse
Examples of misuse include, but are not limited to, the following activities:
1. Using an unauthorized computer account.
2. Obtaining a password for a computer account without the consent of the account owner.
3. Using the campus network to gain unauthorized access to any computer systems.
4. Knowingly performing an act that interferes with the normal operation of computers, terminals, peripherals, or networks.
5. Knowingly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place an excessive load on a computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan horses, worms, spyware, and other forms of malicious software.
6. Attempting to circumvent data protection schemes or uncover security loopholes.
7. Violating terms of applicable software licensing agreements or copyright laws.
8. Deliberately wasting computing resources or viewing inappropriate content.
9. Using electronic mail or social media to harass others.
10. Masking the identity of an account or machine.
11. Posting materials on electronic bulletin boards that violate existing laws or the University codes of conduct.
12. Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner.
13. Creating media representing Joyce University of Nursing and Health Sciences on the internet or through other medium without the express consent of Joyce University.
Enforcement
Penalties for misuse of computing resources may be imposed under Joyce University policy, as well as state and federal laws.
Infractions by students may result in the temporary or permanent restriction of access privileges, notification to university administration, or possible dismissal from the program. Offenses in violation of local, state, or federal laws will be reported to the appropriate authorities.