logo

Acceptable Use Policy

All computers attached to the network must have appropriate software running on their machine to ensure a secure environment for all users. Monitoring software will be provided to ensure compliance with this policy. The software will assist users in maintaining their computer in the manner prescribed by the network. Software needed to ensure a secure environment will include:

  1. Organization approved anti-virus software
  2. The most current security patch software for your operating system(s).
  3. Monitoring software to ensure that copyrighted files are not freely shared over the Internet.
  4. Other software as periodically deemed appropriate by the organization to ensure a safe and secure Internet and Intranet for all users.
  5. In addition, bandwidth consumption is monitored to prevent inappropriate use of network resources (for example, setting up a public web site). Excessive or sustained bandwidth consumption may burden the network and such usage may be restricted.
  6. The use of the network is a privilege that may be revoked at any time for inappropriate behavior. Such behavior would include, but not be limited to, the use of obscene, abusive, or otherwise objectionable language and/or materials in either public or private messages.
  7. The primary purpose of the network is to support organizational goals. In support of these goals, the following activities are prohibited without the express written consent of the organization. Participating in these activities may result in revocation of network access without refund and possible judicial action and/or criminal charges:
    • Setting up a router and building a private subnet.
    • Setting up any type of information server such as a web, gopher, e-mail, game, etc.
    • Propagating e-mail chain letters.
    • Forging mail.
    • Allowing unauthorized persons access to the network.
    • Using the network for personal financial gain.
    • Copying organization-owned or licensed information to another computer without prior written approval.
    • Sharing copyrighted files and software over the network.
    • Modifying or attempting to modify organization-owned or licensed information including software and data.
    • Attempting to damage or disrupt networking services.
    • Using the network or related resources in the commission of a crime.
    • Using traffic intensive applications that may cause problems within the network or diluting the level of service to other users. No print servers, mail servers, FTP servers, etc. are allowed. The network sharing of any computer-related device or materials that may cause excessive network traffic is forbidden.
  8. The user will abide by all policies and statutes included in the Computer Crimes Act. Crimes against this Act will result in judicial action and/or investigation by law enforcement for criminal offense. The Act includes offenses against intellectual property; offenses against computer equipment and supplies; and offenses against computer access.