Subject: TECHNOLOGY USAGE
USE OF AMBERTON UNIVERSITY’S TECHNOLOGIES
The purpose of this regulation is to establish and promote the ethical, legal, and secure use of computing and electronic communications for all members of the Amberton community. This regulation will be reviewed annually by the Offices for Strategic Planning and Administrative Services.
The use of the University’s computer, network and system services are considered extraneous to the educational process and the University is not obligated to provide such services or to maintain such services. Students taking distance-learning courses may be directed to utilize alternative communication systems (mail/telephone/email providers/etc.) at the discretion of the University.
PRIVACY AND ACCESS
All files, e-mails, and records held by Amberton University technologies are the property of Amberton University and may be viewed, reviewed, downloaded, or deleted at the discretion of the University’s administration.
The University may find it necessary to access and disclose information from computer and network users to the extent required by law or to uphold legal agreements or University policies, and to diagnose and correct problems in network or systems performance. Because of this, no user of Amberton computing resources or electronic communications systems should consider their messages or files private. In addition, because of the volatile nature of digital information, and the possibility of system failures, and possible software or hardware problems, no user should consider that their messages or files are secure or preserved.
The diversity of information published and available on the Internet includes controversial material. Amberton believes that access to valuable information and interaction on a global scale outweighs the possibility of encountering material that is inconsistent with the University’s purpose. Therefore, the University assumes no responsibility for monitoring or restricting access to material freely published on the Internet. The University does, however, reserve the right to limit access to its networks and computers, and to limit access to or remove links and materials stored on University computers and networks as deemed appropriate by the University.
Only University authorized devices may be connected to the University’s network (LAN or WAN). Authorized devices include University servers, office desktop computers, laptops and network appliances used in the day-to-day operations of the University. Faculty may, as a part of the instructional process, connect to the network in a classroom setting for Internet access. Any attempt to disrupt network operations of the University or to use the University’s network or equipment for personal gain or non-educational purposes is prohibited and may be punishable by termination of employment (for employees) or suspension (for students).
RESPONSIBLE AND ACCEPTABLE USE
Amberton University owns and operates the campus network to provide services that directly support the educational goals of the University. Use of Amberton University’s technologies outside of direct educationally related activities is forbidden unless permission has been granted by the Administration of the University. No user may use these services for commercial ventures, political causes, outside organizations, solicitation, or any venture not directly related to the educational mission of Amberton University.
The use of Amberton’s computer and/or network services is governed by policies prohibiting any type of harassment (sexual, racial, political, religious or national origin) or any other type of abusive behavior. All such violations shall be subject to immediate disciplinary action.
Use of any copyrighted material, whether text, digital image, audio, or video, via the University’s network and/or systems is subject to all restrictions imposed by the copyright law. Individual users will be held accountable for violating copyright restrictions or Amberton’s copyright policy.
Amberton purchases site licenses for software used on campus machines and on its networks. Individuals who knowingly make, acquire, or use unauthorized software on Amberton University’s premises or equipment shall be subject to immediate disciplinary action.
Users are responsible for maintaining current virus protection on their systems, and for implementing virus checks of any downloaded files from Amberton. Users who do not follow these procedures and/or who knowingly spread computer viruses shall be subject to disciplinary action. Deliberate attempts to degrade or disrupt Amberton’s computers, network and/or systems will be viewed as criminal activity under applicable state and federal law.
Any user may be denied access to Amberton’s computers, networks, and/or systems when, in the judgment of the University, the user is a security risk, unqualified, or unfit to use such services. The use of the University’s computer, network and system services are considered extraneous to the educational process and the University is not obligated to provide such services or to maintain such services. Students taking distance-learning courses may be directed to utilize alternative communication systems (mail/telephone/email providers/etc.) at the discretion of the University.
Anyone who observes or experiences a violation of Amberton’s policies on computing and electronic communications should report the violation to the Chief Technical Officer. Violations will generally be treated in the same manner as violations of other University policies. If violations appear to constitute a criminal offense, as defined by local, state, or federal statutes, the appropriate authorities will be notified.
SYSTEM OPERATORS OF AMBERTON UNIVERSITY TECHNOLOGIES
System Operators (SYSOP) are appointed to operate and maintain the integrity of the Technological Systems of Amberton University. SYSOPS of Amberton University are of faculty rank and have jurisdiction in allowing or denying access to the Systems. Appeals of SYSOP decisions may be filed by following the appeal process as outlined in the University’s official catalog. All University technology is under the authority of the University’s Chief Technical Officer.