Acceptable Use of Technology
Policies and Expectations
Access to Saint Xavier University information technologies and communications facilities is provided for the University-related activities of learning, instruction, enrichment, dissemination of scholarly information and administration. An individual's right of access to information technologies and facilities should not be denied or in any way limited because of race, creed, color, age, national origin, gender, sexual orientation or disability. Acceptable use is an application of the core values of the University: respect, excellence, compassion, service, hospitality, integrity, diversity and learning for life.
The University community is encouraged to make innovative and creative use of information technologies and communications facilities in support of multiple learning experiences. These technologies and facilities are limited and should be used wisely and carefully, with consideration for the needs of others. The University reserves its right to eliminate the access to and the services of its information and communications systems when an individual separates from the community.
It is inappropriate to interfere with or compromise access to information technologies and communications facilities by others for these purposes. It is University policy to educate users about how they could inadvertently interfere with this access, to warn users when they interfere with access, and to remove access from those who continue to interfere with the access of others. While the University expects to remove individual access only after due process and careful consideration, in those situations in which interference is general or continuous, Information Technology will react immediately to provide and guarantee general access. In all cases, Information Technology will collect evidence indicating interference, will present it to the area vice president or to the appropriate supervisor and will notify the suspected offender. In situations in which an individual may inadvertently interfere with the access of others, that individual is expected to identify, learn to avoid and stop the interfering behavior when it is brought to their attention by an affected user or by Information Technology staff.
Expectations of Acceptable
Respect the need for others to use systems to do work.
- Allow others to have normal response times and sufficient resources from the network, servers, printers and other multi-user systems.
- Never inadvertently or intentionally waste or usurp resources or access to resources such as storage space, processor time, network bandwidth, access ports, or printers and other peripherals. Such waste includes excessive storage for mail messages, excessive processes and excessive network messages such as chain letters, broadcasts, downloads and file sharing.
- Conscientiously limit your use of paper and other printing resources.
Respect the work of others.
- Never copy or modify information belonging to others without explicit authorization. This includes personal information, programs authored for sale and material authored for presentation in class or elsewhere. Unauthorized duplication may constitute plagiarism, cheating, theft and/or violations of copyright. The University respects software copyrights. Unauthorized modification includes generating and transmitting viruses and other destructive programs.
- Never place files in folders for which you do not have explicit authorization.
- Check your files and folders for viruses regularly. The spread of viruses damages everyone's personal and system files and folders.
- Update and patch your software regularly to remove vulnerabilities.
Respect the sensitivities of others.
- Consider what you display on screen, what you print and what you send using mail, just like considering how you act and what you say aloud.
- Never act in such a way that another user would feel uncomfortable accessing systems, for example, by sending or presenting harassing, intimidating, abusive or patently unwanted material to others. This includes presentation in messages, on screen and in print, where others might see.
Respect the integrity of the systems.
- Never share a username and password to access information. A username should be associated with a single individual or position.
- Never use the identity of another or other methods to evade security to gain access to systems and information.
- Never conceal or misrepresent your identity or affiliation in communication.
- Never choose a password that is anyway associated with you or your name or that is in a dictionary or similar list. This information is too easy to search or generate with a program and to use to break into a system with your username.
- Never choose a simple password. Replace your password with some string of uppercase and lowercase letters and numbers.
- Never write your password alongside your username. The first letters of a five- or six-word phrase that you can remember with a digit thrown in make a good and memorable password. For instance, "To be or not to be" might be used to remember "Tb0nTb" where zero is used for "or."
- Never leave an unsecured station unattended.
- Never attempt to discover the identities, passwords and encryption keys of others.
- Never intercept or alter network packets.
Respect the equipment.
- Keep trash, smoking, eating or drinking away from hardware.
- Never damage equipment through acts of vandalism, spite, anger, negligence or overuse.
Respect the law.
- Never use systems for any purpose that violates federal or state laws.
- Never use systems for commercial purposes without explicit authorization.
Use and maintain your University electronic mailbox.
The University provides each student and each member of the faculty and the staff with an electronic mailbox (@sxu.edu for staff and faculty; @mymail.sxu.edu for students) that is used as an official means of communication by and with the University. Members of the University community are responsible for the information that is sent to their University electronic mailbox and are expected to:
- Maintain their mailbox so there is sufficient space for the receipt of University announcements.
- Examine frequently the messages in their mailbox for University announcements and requests for information.
- Respond in a timely fashion to requests for information.
Members of the community should also recognize that these announcements will often point to the University's website for additional information and instructions.
Members of the community who send messages to large groups of recipients should limit their messages to short announcements that point to web pages with further information and instructions. This will conserve resources by not sending and storing multiple large documents and by providing a lasting copy for those who lost or did not initially get the information and instructions.
The University recognizes that members of its community can and may wish to forward messages from their University mailbox to another more convenient, personal mailbox. Nevertheless, it is the responsibility of the student or the member of the faculty or staff to assure that official messages are received by and examined in that external mailbox.
The University recognizes that individuals should be allowed to access, present and communicate information representing a variety of views on current and historical issues for the interest, information and enlightenment of the University community and within the concept of academic freedom. Nevertheless, because anything published through electronic resources of the University may appear to represent the views of the University and not just an individual author, it is important to explicitly recognize where the views are the individual's and not the University's. When presenting a product of the University, such as institutional web pages and electronic mail messages, the appropriate and established language and style should be identified and used.
For your own protection, you should recognize that:
- The security of your information, while seriously attempted, cannot be guaranteed.
- The University is the owner of these systems and, therefore, of the information stored there.
- The University could, if required to substantiate instances of interference, duplicate and examine information stored on these systems.
- The nature of electronic mail, unlike other conversational media, is to record all interactions. If you don't want personal or otherwise compromising information found on a system, inadvertently or intentionally, don't leave it there.
- Do not send passwords with usernames or confidential and otherwise sensitive information in electronic mail messages. Use the message to point to a secure web page where the information can be released only to the authenticated recipient. Electronic mail is, by nature, insecure.
- Do not open attachments in messages from senders you do not know.
- Do not expect that the sender in a message or a reply is actually the authentic sender of the message. Electronic mail addresses easily can be co-opted.
- Do not respond to messages that request information you normally would keep confidential, that create an urgent sense of loss, and that request an urgent reply.
- The University cannot protect individuals against the existence or receipt of text or images that may be offensive to them. As such, those who make use of electronic communications are warned that they may come across or be recipients of material they find offensive.
- Those who make information about themselves available on the Internet (through email or some other means) should be forewarned that the University cannot protect them from invasions of privacy and other possible dangers that could result from the individual's distribution of personal information.
- While the University provides resources in its buildings and on its campuses, this should not be interpreted as the University sanctioning the materials developed or propagated by the individuals using those resources.
- The inappropriate access to and use of information and communications systems can in many cases result in criminal prosecution and civil litigation.
Should you have any questions or comments about these expectations and policies, please contact Information Technology at firstname.lastname@example.org.