Appropriate Use of the Campus Computing Facilities and Network
The Willamette University campus computing facilities and network are provided as a service to students, faculty, staff, and other members of the Willamette community to support the instruction, research, and service missions of the university. The university strives to provide fair and distributed access to computing and network facilities for a large number of users. Proper use follows the same standards of common sense, courtesy, and restraint in the consumption of shared resources that govern the use of other campus facilities. Improper use violates those standards by preventing others from accessing shared facilities.
The interplay of privileges and responsibilities within each individual situation and across campus engenders the trust and intellectual freedom that form the heart of our community. This trust and freedom depend upon each person developing the skills necessary to be an active and contributing member of the community. These skills include an awareness and knowledge about information and the technology used to process, store, and transmit it.
This policy applies to all computers connected to the campus network, including those in all campus buildings and facilities, and also those using remote access connections. Use of the computing facilities and network is a privilege, not a right. The University provides uncensored access to information on the Internet. Each individual is responsible for selecting, viewing, and utilizing appropriate resources and avoiding excessive use of the system that could interfere with University purposes.
In addition to access to its own system, the University provides access to other networks or computers. Each network or system has its own set of policies and procedures. Users must abide by the policies and procedures of these other networks and systems.
The University does not guarantee the confidentiality of any information entering or residing on the system. It also reserves the right to access and examine any information on the system.
All users must respect the integrity of the physical computing facilities and controls, and respect all pertinent policies, laws, licenses, and contractual agreements. In accord with the University standards of conduct, it is a violation of policy to:
- copy, rename, alter, examine, or delete the files or programs of another person or a Willamette University department without permission
- use a computer for any of the following prohibited actions:
- sending abusive, threatening, or harassing messages
- sending messages that are likely to result in the loss of recipients’ work or systems
- sending ‘chain letters’ or ‘broadcast messages’ to lists or individuals
- any other uses that would cause congestion of the networks or otherwise interfere with the work of others
- inserting programs on another’s computer without permission
- create, disseminate, or run a self-replicating program (‘virus’) whether destructive or not
- tamper with the switch settings, move, reconfigure, or otherwise damage terminals, computers, printers or other equipment
- collect, read, or destroy output other than your own work without the permission of the owner
- use the computer account of another person with or without permission unless the account is designated for group work
- forge or misrepresent one’s identity in electronic communication for any purpose
- copy any copyrighted software provided by Willamette University. Users should be aware that it is a criminal offense to copy any software that is protected by copyright
- use licensed software in a manner inconsistent with the licensing arrangement as provided by WITS
- access or attempt to access a host computer, either at Willamette University or through a network, without the owner’s permission, or through the use of log-in information belonging to another person
- make use of the facility for commercial purposes or financial gain
The content and maintenance of a user’s electronic mailbox are the user’s responsibility. Users are expected to check their electronic mail frequently and delete unwanted messages as soon as possible.
Note that the University does not provide facilities for sending or receiving confidential messages, as outlined in the Electronic and Communications Privacy Act of 1989, Title 18, United States Code, Sections 2510 and following. This means that electronic mail messages are not private and can be accessed by others.
The contents and maintenance of a user’s own storage area is the user’s responsibility. As such, the user is expected to keep the number of files to a minimum, and routinely check for viruses.
Alleged violations of policy shall be investigated under provisions of the appropriate employee or faculty handbooks or the University Standards of Conduct, as applicable. During an investigation, University representatives, with due regard for the right of privacy of users and the confidentiality of their data, reserve the right to suspend or modify computer access privileges, monitor network access, examine files, passwords, and accounting information, printouts, tapes, and any other material which may aid in an investigation of possible violation. Whenever possible, the cooperation and agreement of the user will be sought in advance. Users are expected to cooperate in such investigations. Violations of policy may result in disciplinary actions as prescribed by University policies and procedures.
Additional information on policies and procedures may be found in the documents relating to electronic mail, the Web site, hardware and software support, and the administrative system.Approved by Administrative Council, April 23, 1999