Computer & Electronic Resource Policy

Computer & Electronic Resource Policy

I. Purpose

推荐全球十大博彩公司排行榜拥有并经营着学校提供的各种技术资源 for the use of Wilkes University students, faculty, staff, alumni, contractors, and 以支持大学的使命,并将用于教育, research, academic development, and public service. All users are responsible for 确保这些资源有效、高效、合乎道德、合法地使用 manner.

适当和负责任地使用推荐全球十大博彩公司排行榜的技术资源 作为与教学、学习、研究和管理相一致的用途 大学的目标,以及项目或任务的具体目标 for which such use was authorized. All uses inconsistent with these objectives are considered to be inappropriate use.

本文档建立了规则和禁令,定义了这些可接受的使用 systems. Unacceptable use is prohibited and is grounds for loss of computing privileges as well as University disciplinary sanctions and/or legal sanctions under Federal, State, and local laws.

II. Applicability

本政策适用于所有访问推荐全球十大博彩公司排行榜技术资源的人, 包括教职员工、学生、校友、退休人员、承包商、嘉宾或其他人 other authorized user. All technology resources of the University are covered by this 政策,包括但不限于所有网络、支持的基础设施、服务器、 电脑,打印机,复印机,扫描仪,其他外围设备,移动设备包括 tablets and cell phones, remote systems, software, and connecting resources of any kind, including external networks.

III. Policy

Agreement
By using any of Wilkes University’s technology resources, users consent to assume 个人有责任正确使用并同意遵守所有适用的规定 university policies and local, State, and Federal laws and regulations. Commercial 禁止与大学使命无关的党派政治活动.

Rights
These technology resources are owned and operated by Wilkes University. The University 保留对该技术的所有权利,包括在不通知的情况下终止服务 resources that it owns and operates. These procedures shall not be construed as a waiver of any rights of Wilkes University, nor shall they conflict with applicable acts of law. Users have rights that may be protected by Federal, State, and local laws.

Privileges
推荐全球十大博彩公司排行榜技术资源的访问和特权进行分配和管理 by the administrators of specific individual systems. Eligible individuals may become 系统的授权用户,并通过以下方式授予适当的访问权限和特权 the approval steps prescribed for that system. Users may not, under any circumstances, 转移或授予这些特权或与其他人共享其访问凭据 资讯科技服务支援人员除外 functions. The authorized user is responsible for the proper use of the system, including any password protection.

Accounts
Once an account is assigned to an individual, others must not use that account. The 个人有责任正确使用帐户,包括正确的密码 protection, safeguarding confidential data, and following security policies.

Confidentiality
程序和文件是保密的,除非它们已经提供,并以书面形式 permission, to other authorized individuals. Wilkes University reserves the right to access all information stored on Wilkes University systems. File owners will be notified of file access and/or maintenance in advance if such notice is practical. 在进行维护时,我们会尽力保护用户的隐私 files. However, if policy violations are discovered, they will be reported immediately to the appropriate supervisor.

System Usage
Technology resources are for University related and sanctioned activities. Fraudulent, 除调查外,不得发送骚扰或淫秽信息和/或材料 purposes.

System Performance
任何人都不应该故意贬低大学系统的表现 or to deprive authorized personnel of resources or access to any University system.

Unauthorized Access
Security loopholes or knowledge of access credentials should not be used to damage systems, obtain extra resources, take resources from another user, gain access to systems, or use systems for which proper authorization has not been given. Discovery 未经授权访问的能力应立即报告给信息部 Technology Services.

Copyright
受版权保护的软件不得复制、进入或使用大学 系统,但法律或与版权所有人签订的合同允许的除外. This means that such software may only be copied in order to make back-up copies, if permitted by the copyright owner. The number of copies and distribution of copies may not be done in such a way that the number of simultaneous users in a department exceeds the number of original licenses purchased by that department. License codes provided to individuals or departments should be kept confidential. Users will be 负责确保他们不违反软件许可证的条款 installed on their systems.

Additionally, the downloading of electronic information (e.g. text, music, video) 受版权保护的东西是被禁止超出联邦“合理使用”限制的 the permission of the holder of the copyright. Again, users must comply with all applicable 大学政策和地方、州和联邦有关版权的法律法规 protection of electronic resources.

Violations
An individual's access and computing privileges may be suspended immediately upon the discovery of a possible violation of these policies. Such suspected violations among employees will be confidentially reported to the appropriate supervisors. Suspected violations among students will be reported to the Dean of Students.

违反这些政策的行为将以违反这些政策的同样方式处理 other University policies and may result in disciplinary review. In such a review, 包括丧失计算机能力在内的所有纪律制裁都是可行的 privileges, dismissal from the university, and legal action. Violations of some of the above policies may constitute a criminal offense.

Privacy
The University respects the privacy of its users and does not routinely inspect or monitor user files. In the course of their duties, system administrators may see your electronic files. Subject to the requirements for authorization, notification, and 本政策规定的其他条件,大学可检查、监察、披露、 or deny access to user data:

  1. when required by and consistent with law;
  2. when there is substantiated reason (reliable evidence indicating that violation of law or of policies probably has occurred) to believe that violations of law or of University policies have taken place;
  3. 在迫不得已的情况下,不采取行动可能导致重大后果 bodily harm, significant property loss or damage, loss of significant evidence of one or more violations of law or of University policy, or significant liability to the University or to member of the University community; or
  4. 在依赖时间的关键操作情况下,不采取行动可能 seriously hamper the ability of the University to function administratively or to meet its teaching obligations.

Whether or not it is created or stored on University systems, data may constitute a University record subject to disclosure under the Pennsylvania Open Records Laws (阳光法和知情权法),或其他法律,或诉讼的结果. 然而,大学不会自动遵从所有披露要求。 但会根据法案和其他法律的具体规定来评估所有这些请求 concerning disclosure and privacy, or other applicable law.

这些记录的销毁受大学记录保存政策的约束.

Additional Guidelines
资讯科技委员会可根据需要,为特定电脑制订更详细的指引 systems and networks. These guidelines may cover such issues as allowable disk space, responsibility for account approval, and other items related to administering the system.

IV. Responsibilities

Users are responsible for maintaining the following:

  1. An environment conducive to learning. A user who harasses or makes defamatory remarks shall bear full responsibility for his or her actions. Further, by using these systems, 用户同意,传播此类言论的个人应承担全部责任 for their actions. Users agree that Wilkes University's role in managing these systems 仅仅是作为信息的载体,那他们就永远不会考虑通过传播吗 these systems as an endorsement of said transmission by Wilkes University.

    Users agree not to misrepresent themselves or mask their identities.

    Users should assume that anything they access might be copyrighted. Absence of a © notice does not mean that the material is not copyrighted. This means that before a user downloads a document, image, or any other media they should ensure that its 使用应符合“合理使用”的限制,或应获得作者的许可.

    许多大学系统提供访问外部网络,包括公共和私人网络, 提供电子邮件、信息服务、讨论板、会议、 etc. 用户被告知,他们可能会遇到可能被认为是冒犯的材料 or objectionable in nature or content. Users are further advised that Wilkes University does not assume responsibility for the contents of any of these outside networks.

    The user agrees to comply with the Acceptable Use guidelines for whichever outside networks or systems they may access through Wilkes University systems.

    此外,用户同意在非wilkes系统和网络上遵循适当的礼仪. 有关礼仪的信息可通过系统管理员和通过 specific individual networks.

    The user agrees never to knowingly attempt to transmit, or cause to be transmitted, any message in which the origination is deliberately misleading (except for those outside services which may conceal identities as part of the service). The user agrees that, in the unlikely event that someone does transmit, or cause to be transmitted, a message that is inconsistent with an environment conducive to learning or with a 误导的起源,执行传播的人将完全负责 for the message, not Wilkes University, which is acting solely as the information carrier.

  2. An environment free of illegal or malicious acts. The user agrees never to use a University technology resource to perform an illegal or malicious act. Any attempt to increase a user’s authorized level of access or deprive other authorized users of resources 或访问任何大学系统将被视为恶意,并可能被处理 as an illegal act.

  3. A secure environment. Any user who finds a possible security lapse on any system is obliged to report it to the system administrators including Information Technology Services.

    不得利用对密码或计算机安全系统漏洞的了解 to damage computing resources, obtain extra resources, take resources from another 用户,获得未经授权的访问资源或以其他方式使用计算资源 for which proper authorization has not been given.
Effective: 05/14/2008 |  Updated: 3/14/2014