Network and Communications Policies and Guidelines
Policies and Guidelines
The following policies and guidelines are an abridged version of the Santa Clara University Administrative Policies and Procedures manual. Information Technology reserves the right to revise, delete or amend these policies and guidelines at any time without prior notice.
Use of Facilities
Access to University computing resources is a privilege. Proper ID is required for entrance to public facilities. As a general guideline, no individual should make use of computer facilities in any manner which infringes on the rights of others to make equal use of those same facilities. Users are expected to adhere to established policies and procedures, such as those on usage, respect for intellectual property and copyrights, and observing canons of etiquette for applicable resources.
Copyrighted Material Security and Privacy
Unauthorized access to resources or data is not permitted. The ability to access a resource or item of data does not explicitly or implicitly imply authorization. Account security is provided via a password mechanism. Providing one's account password to another user is considered to authorize that second individual access to all information in the account. The account owner accepts responsibility for the actions of any other person they authorize to use their account. Attempts to compromise the security of the network or its connected systems are prohibited. Any attempt at this, or the introduction of viruses, worms, Trojan horses, or other forms of hacking or electronic subversion will result in the immediate loss of access. Further University, civil, or criminal action may be taken as appropriate.
The computer systems and networks at SCU are a University resource and are provided as a business and scholarship tool only. Users of the system do so at their own risk. In particular, they assume the risk of malfunction, destruction, corruption, alteration, or mis-transmission, of any information, software or hardware, whether due to negligence on the part of the University or its employees, forces beyond the University's control (such as fire, flood, or earthquake), or any other cause. Users agree to hold the University blameless for any direct or consequential damages whatsoever, which may arise from the use of the system.
In general, the practice is to treat information with as much privacy as possible. However, situations may arise where employees with legitimate business or legal purposes may have the need to view information (including E-Mail) on the systems. Approval for such access will be required from the employee, the appropriate VP area, or Dean/Dean's level director. Employees and students of the University should close any accounts on University systems upon leaving the University, and not place personal information on these system, if the privacy of that information is of concern to them.
Network and Etiquette
Many of the University systems are connected to an Ethernet local area network with access to international wide area networks. The continued access to these networks depends on the cooperation of all participants. Ethical behavior should be observed at all times, and no individual should engage in behavior over the network which would be inappropriate for a face-to-face meeting. Violators will be subject to the loss of access, or more severe action, depending on the circumstances.
Unacceptable Use of the Campus Networks
Specific examples of unacceptable uses of the network include, but are not limited to, the following:
- Users on the network shall avoid interfering with the purposes and goals of the network, avoid disrupting the network host systems (nodes), and avoid disrupting network services.
- Activities likely to result in the loss of other' work or data are prohibited.
- Advertising and marketing from commercial organizations not permitted. Similarly, institution-owned computing and network resources should not be used for operating a business or other unauthorized commercial purposes.
- Any communication which violates applicable laws and regulations are not allowed.
- "Chain letters", "broadcast" messages to lists or individuals (eg."spam"), and other types of use which would cause congestion of the networks or otherwise interfere with the work of others are not allowed.
- Any communications that would in some way injure the recipient or be deemed as inappropriate either by written policy, law, or general spirit of the University Community are not allowed.
Software Copyright and Compliance Policy
The unauthorized copying of any software or information/data which is licensed or protected by copyright is theft, and thus unethical. Failure to observe software copyrights and/or license agreements may result in disciplinary action by this institution and/or legal action by the copyright owner.