Skip to main contentSkip to main navigationSkip to footer content

Acceptable Use of Technology

Policies and Expectations

Access to Saint Xavier University information technologies and communications facilities is provided for the University-related activities of learning, instruction, enrichment, dissemination of scholarly information and administration.  An individual’s right of access to information technologies and facilities should not be denied or in any way limited because of race, creed, color, age, national origin, gender, sexual orientation, disability or other protected characteristic.  Acceptable use is an application of the core values of the University:  respect, excellence, compassion, service, hospitality, integrity, diversity and learning for life.

The University community is encouraged to make innovative and creative use of information technologies and communications facilities in support of multiple learning experiences.  These technologies and facilities are limited and should be used wisely and carefully, consistent with the University’s Catholic Mercy Mission, Mercy Core Values and Service Excellence Standards, and in consideration for the needs of others.  The University reserves the right to take appropriate remedial measures, including but not limited to suspending access to its information and communication systems, to address conduct that is inconsistent with this policy. 

It is inappropriate to interfere with or compromise access to information technologies and communications facilities by others. It is University policy to educate users about how they could inadvertently interfere with this access, to warn users when they interfere with access, and to remove access from those who continue to interfere with the access of others. While the University expects to remove individual access only after reviewing the facts and careful consideration, in those situations in which interference is general or continuous, Information Technology will react immediately to provide and guarantee general access.  In all cases, Information Technology will collect evidence indicating interference, will present it to the area vice president or to the appropriate supervisor and will notify the suspected offender.  In situations in which an individual may inadvertently interfere with the access of others, that individual is expected to identify, learn to avoid and stop the interfering behavior when it is brought to their attention by an affected user or by Information Technology staff.

 Expectations of Acceptable Use

Respect the need for others to use systems to work. 

  • Allow others to have normal response times and sufficient resources from the network, servers, printers and other multi-user systems.
  • Never inadvertently or intentionally waste or usurp resources or access to resources such as storage space, processor time, network bandwidth, access ports, or printers and other Such waste includes excessive storage for mail messages, excessive processes and excessive network messages such as chain letters, broadcasts, downloads and file sharing.
  • Conscientiously limit your use of paper and other printing

Respect the work of others.

  • Never copy or modify information belonging to others without explicit authorization. This includes personal information, programs authored for sale and material authored for presentation in class or elsewhere.  Unauthorized duplication may constitute plagiarism, cheating, theft and/or violations of copyright.  The University respects software   Unauthorized modification includes generating and transmitting malware and  other destructive programs.
  • Never place files in folders for which you do not have explicit
  • Check your files and folders for viruses The spread of viruses damages everyone’s personal and system files and folders.
  • Update and patch your software regularly to remove
  • When using University email functions, messages should be addressed to recipients on a ‘need to know’ basis, and should not usurp essential, basic University business. Messages sent to unnecessary recipients, including but not limited to those on University e-mail lists, may be disrespectful of others’ time, annoying to recipients and/or result in numerous unwanted or unsolicited e-mail messages. 

Respect the sensitivities of others.

  • Consider what you display on screen, what you print and what you send using e-mail, just like considering how you behave and what you say
  • Be mindful of the effect your messages may have on others. As an institution of higher education, our EEO and other policies apply equally when using our technology systems.  Please use good professional judgment at all times. In this regard, continuing to address messages to those who have asked not to be included on messages on certain subjects may result in messages being misinterpreted and/or cause the recipient to feel hurt, disrespected or personally attacked.
  • Adhere to the University’s Service Excellence Standards (responsive, collaborative, effective, respectful) when communicating with others, including but not limited to, engaging in a cooperative spirit, being thorough, accurate, courteous and professional, showing empathy to others and being accountable to yourself and others.
  • Never act in such a way that another user would feel uncomfortable accessing systems, for example, by sending or presenting defamatory, obscene, harassing, intimidating, abusive or patently untrue or unwanted material to others. This includes presentation in messages, on screen and in print, where others might
  • If you no longer wish to receive certain messages and/or be included in certain user-generated group communications, promptly ask the sender(s) to remove you. If the sender(s) fail to respond, contact the Human Resources Department.

Respect the integrity of the systems.

  • Never share a username and password to access information. A username should be associated with a single individual or position.
  • Never use the identity of another or other methods to evade security to gain access to systems and information.
  • Never conceal or misrepresent your identity or affiliation in communications on the University systems.
  • Never choose a password that is in any way associated with you or your name or that is in a dictionary or similar list. This information is too easy to search or generate with a program and to use to break into a system with your username.
  • Never choose a simple Replace your password with some string of uppercase and lowercase letters and numbers.
  • Never write your password alongside your The first letters of each word in a memorable phrase, and including some numeric digits, could make a good and memorable password.  For instance, “To be or not to be” might be used to remember “Tb0nTb” where zero is used for “or.”
  • Never leave an unsecured station unattended.
  • Never attempt to discover the identities, passwords and encryption keys of
  • Never intercept or alter network packets.
  • Never upload sensitive university data obtained through your work for the University and confidential in nature to unauthorized / unapproved cloud systems (i.e., Dropbox, etc.). These systems are not secure, and your risk the information being stolen or compromised.

Respect the equipment.

  • Keep trash, smoking, eating or drinking away from hardware.
  • Never damage equipment through acts of vandalism, spite, anger, negligence or
  • Authorized users may not install and/or should not connect any device on a computer or to the network without authorization from the system administrator. These include, but are not limited to:  laptops, cell phones, cameras, electronic media and/or flash drives.

Respect the law. 

  • Never use systems for any purpose that violates federal or state
  • Never use systems for commercial purposes without explicit
  • Respect all intellectual property laws, including laws governing copyright, trademarks and other intellectual property, including the University’s own copyrights, trademarks, and website.

Use and maintain your University electronic mailbox.

 The University provides each student and each member of the faculty and the staff with an electronic mailbox (@sxu.edu for faculty and staff; @mymail.sxu.edu for students) that is used as an official means of e-mail communication by and with the University.

Only a Saint Xavier University e-mail account (i.e., @sxu.edu for faculty and staff, @mymail.sxu.edu for students) is acceptable for official University and/or business-related e-mail correspondences.  The use of personal e-mail accounts to conduct such University business or to represent oneself or one’s enterprises on behalf of the University is prohibited.  Students should use the e-mail account that has been provided by Saint Xavier University as their official means of e-mail communication with the University.

All University e-mail communication should be from and to sxu.edu and mymail.sxu.edu e-mail addresses.  All faculty should communicate with each other and students using the sxu.edu suffix, and faculty require students to reply using their mymail.sxu.edu e-mail account.  For security of the University, compliance with governmental regulations, and protection of University information, use the sxu.edu address, and direct your students to do the same.  To restate, effective immediately, we will only use the sxu.edu address for University e-mail communications.

Communication between faculty and students can also safely occur within the University’s official Learning Management System.  The LMS is an appropriate and secure means of interaction between instructor and students.

Members of the University community are responsible for the information that is sent to their University electronic mailbox and are expected to:

  • Maintain their mailbox so there is sufficient space for the receipt of University
  • Examine frequently the messages in their mailbox for University announcements and requests for
  • Respond in a timely fashion to requests for

Members of the community should also recognize that these announcements will often point to the University’s website for additional information and instructions.

Members of the community who send notices to large groups of recipients should limit their  notices to short announcements that point to web pages with further information and instructions.  This will conserve resources by not sending and storing multiple large documents and by providing a lasting copy for those who lost or did not initially receive the information and instructions.

The University recognizes that individuals should be allowed to access, present and communicate information representing a variety of views on current and historical issues for the interest, information and enlightenment of the University community and within the concept of academic freedom.  Nevertheless, because anything published through electronic resources of the  University may appear to represent the views of the University and not just an individual author,  it is important to explicitly recognize where the views are the individual’s and not the University’s when there is a risk of confusion.  When presenting a product of the University, such as institutional web pages and electronic mail messages, the appropriate and established language and style should be identified  and used.

Saint Xavier University reserves the right to eliminate the access to and the services of its information and communications systems and to periodically disable or delete e-mail/computer accounts when an individual separates from the community. 

“No longer affiliated” is defined as:

  • Students who have graduated or are no longer enrolled.
  • Faculty or staff who have voluntarily left or have been terminated.

For your own protection, you should recognize that:

  • The security of your information, while seriously attempted, cannot be guaranteed.
  • The University is the owner of these systems and, therefore, of the information stored
  • The University could, if required to substantiate instances of interference, duplicate and examine information stored on these
  • There shall be no expectation of privacy in any computer system, hardware, software, e- mail usage history or Internet history. All computers are the property of the University and are subject to inspection and search at any
  • The voice mail system is the property of the University. All communications and information transmitted by, received from or stored in this system is the property of Saint   Employees have no right to personal privacy within the voice mail system.  The University, at its discretion, reserves and may exercise the right to monitor, access, retrieve and delete any matter stored in, created, received or transmitted in the voice mail system without permission of, or notice to, the employee.
  • The nature of electronic mail, unlike other conversational media, is to record all If you don’t want personal or otherwise compromising information found on a system, inadvertently or intentionally, don’t leave it there.
  • Use of e-mail may be subject to monitoring for security and/or network management
  • Do not send passwords with usernames or confidential and otherwise sensitive information in electronic mail messages. Use the message to point to a secure web page where the information can be released only to the authenticated recipient.  Electronic mail is, by nature, insecure.
  • Do not open attachments in messages from senders you do not
  • Do not expect that the sender in a message or a reply is actually the authentic sender of the Electronic mail addresses can easily be co-opted.
  • Do not respond to messages that request information you normally would keep confidential, that create an urgent sense of loss, and that request an urgent
  • The University cannot protect individuals against the existence or receipt of text or images that may be offensive to them. As such, those who make use of electronic communications are warned that they may come across or be recipients of material they find
  • Those who make information about themselves available on the Internet (through e-mail or some other means) should be forewarned that the University cannot protect them from invasions of privacy and other possible dangers that could result from the individual’s distribution of personal information.
  • While the University provides resources in its buildings and on its campuses, this should not be interpreted as the University sanctioning the materials developed or propagated by the individuals using those resources.
  • The inappropriate access to and use of information and communications systems can in many cases result in criminal prosecution and civil
  • Anyone who deploys their SXU e-mail account to their personal device (PC or mobile), gives the University the right/ability to wipe that information when and where relevant for data security, theft and/or termination reasons.

Should you have any questions or comments about these expectations and policies, please contact Information Technology at it@sxu.edu.