INFORMATION FOR
William Paterson University wants to provide for as open a computing environment as possible within the constraints of budget and usage that promote the goals and objectives of the University. This policy applies to anyone who uses the University’s computers and networks, and articulates the standards of behavior that are expected of everyone.
The Information Technology Services unit is responsible to administer this policy, and to make referrals to appropriate administrative offices for disciplinary action. Any exception to the policy must be approved in writing by the Information Technology Services unit.
The University reserves the right to regulate any activity that occurs on the campus network or on any other computer based system owned by the University. This includes, but is not limited to, the following implications:
1. Anyone who uses the campus computing environment must have appropriate status (e.g. staff, faculty and current students) and must be properly authorized when required.
2. Anyone not adhering to University policy should expect any or all of the following disciplinary actions:
3. Material (software, hardware or data) that is found to be in violation of this policy can be banned, confiscated, or otherwise eliminated from the University computing environment.
4. The University will be as proactive as possible to ensure compliance with this policy, including surveillance commensurate with appropriate maintenance of the right to privacy.
Users must not engage in activity outside the limits of access that have been authorized for them. This includes but is not limited to:
1. Performing an act that negatively impacts the operation of computers, peripherals or networks, or that impedes the ability of someone else to do his/her work. Examples include but are not limited to:
2. Attempting to circumvent protection schemes for access to data or systems, or otherwise uncover security loopholes.
3. Gaining or granting unauthorized access to computers, devices, software or data. This includes, but is not limited to:
4. Using the University's facilities to broadcast unauthorized personal messages to large segments of the user community. Examples include but are not limited to:
Users must abide by all applicable laws or government regulations, and operate within the limits articulated by the University for ethical and moral behavior. Examples include but are not limited to:
Users must abide by all other applicable University policies. Examples include but are not limited to:
Privacy
Information and Collection
Information Use
Enforcement
Definitions
EXCEPTIONS
Exceptions to this policy will be handled in accordance with the ITS Security Policy.
REVIEW
This policy will be maintained in accordance with the ITS Security Policy.
EMERGENCIES
In emergency cases, actions may be taken by the Incident Response Team in accordance with the procedures in the ITS Incident Response Handbook. These actions may include rendering systems inaccessible.
APPENDIX
Created:
Author:
Version: 1.0