Technology Systems Usage Policy

La Sierra University (the University) encourages the use and application of information technologies by students, faculty, and staff to support the mission of this institution.Computers and computer networks are powerful enabling technologies for accessing and distributing the information and knowledge developed at the University and elsewhere. As such, they are strategic technologies for the current and future needs of the University. The rights of academic freedom and freedom of expression apply to the use of University computer resources. So too, however, do the responsibilities and limitations associated with those rights. The University supports a campus computing environment open to the free expression of ideas, including unpopular points of view. However, the use of resources and activities is subject to the requirements of legal and ethical behavior and University rules and policies. Thus, legitimate use of a computer, computer system or computer network does not extend to whatever is technically possible. Rather, users of the University information resources must respect software copyrights and licenses, respect the integrity of access, and respect the rights of other Computer users. Users are solely responsible for ascertaining what authorizations are necessary and for obtaining the appropriate authorizations before using the University computing resources. This policy covers appropriate use of computers, computer networks, and information contained therein.

No one has a "right" to use the University's information technology including student access computer labs. Use of the University's information technology is a privilege, not a right. All users of University's information technology resources must agree to use the facilities legally, ethically, and in keeping with their intended use.

   
9. Software is installed on University IT systems in order to support resource usage accounting, security, network management, hardware and software inventory, computer back-up systems and software updating functions, and to provide better support to personnel. Authorized personnel may access others' files or systems when necessary for the maintenance of IT systems or when acting to protect performance, integrity, and security of IT resources. When possible, advanced notification of access will be given except for cases covered by numbered paragraph 3 above. When performing maintenance, reasonable effort will be made to safeguard the privacy of a user's files. However, if violations of university policy or applicable law are discovered, they will be reported to the appropriate Vice President or their designated representative.
   
10. No one may attempt to degrade the performance of an IT system or to deprive authorized personnel of reasonable access to such system.
   
12. Software and other materials that are protected by copyright, patent, trade secret, or another form of legal protection ("Protected Materials") may not be copied, altered, transmitted, or stored using University-owned or operated IT systems, except as permitted by law or by the contract, license agreement, or express written consent of the owner of the Protected Materials. The use of software on a local area network or on multiple computers must be in accordance with the software license agreement.
    Disclaimer

From time to time this Information Technology Usage Policy and related policies may be revised. The latest official copy of this policy is available from the Information Technology Services and the Human Resources Services Office. Copies will also be posted on various University servers, such as the La Sierra Web Server. Other standards and guidelines (for electronic mail, web pages, newsgroups, copyright, directory information, etc.) can be found on the La Sierra web server at http://www.La Sierra.edu/IT/policies

Version: 20060627

   
4. Fraudulent, harassing, offensive or obscene messages or materials are not to be sent, printed, requested, displayed, or stored on the University-owned or operated technology systems. University technology system resources should not be used in a manner that would embarrass or bring discredit to the University in the view of its constituencies. Information which invades an individual's privacy or is disparaging of an individual or business must not be published without the express consent of the person or business entity.
   
7. A computer, network resource, computer account, web home page account, electronic mail account or voice mail account assigned to an individual must not be used by others without the consent from the provider of the resource. The individual is responsible for the proper use of the resource, including proper password protection.
    Intellectual Property

La Sierra University insists on respect for the intellectual property rights of others and expects users of the computing resources to abide by applicable intellectual property laws, including but not exclusive to; text, graphics, art, photographs, music, software, movies and games; respect the property rights and associated restrictions of others and to refrain from actions or access which would violate the terms of such licensing and nondisclosure agreements;

   
13. The University may send official University correspondence to a student, faculty, or staff member via e-mail using the e-mail address assigned by the University. Each University student, faculty, and staff member is personally responsible for checking his or her e-mail on a regular and recurring basis for receipt of official University correspondence.
    Confidentiality of Data

Individuals shall not access, copy or disseminate confidential information except to the extent necessary to fulfill their assigned responsibilities, and then only to the extent that the individual is authorized. Improper access to or unauthorized disclosure of confidential information could be a violation of federal law and may ultimately result in loss of federal financial assistance to the La Sierra University.

Individuals will take appropriate action to insure the protection, confidentiality, and security of the University's information. This obligation to maintain confidentiality and security of information continues beyond the termination of the individual's relationship with the University. Persons who exceed their authority in using confidential information or who gain access to such information through unauthorized means are in violation of this University policy. Such conduct may be in violation of the law and could be subject to fines and/or imprisonment.

   
2. IT systems are to be used only for the purpose for which they are assigned. Incidental personal use of these systems are permitted, but must not interfere with the University's mission or official or educational use of such technology systems and are not to be used for commercial purposes or non-university related activities.
   
11. No unauthorized person may alter a University IT system. The use of loopholes or specific tools to circumvent IT systems or network security; the knowledge of special passwords; or the covert acquisition of passwords to damage IT systems, obtain extra resources, take resources from another user, or gain access or control of any system for which proper authorization has not been granted is expressly prohibited.
   
1. The information technologies (IT) are owned by the University and are to be used for university related activities only. All access to central technology systems, including the issuing of accounts, must be approved through the Information Technology Department. All access to school and departmental information systems must be approved by authorized personnel within the respective departments.
   
6. All forms of mass mailings, whether related to the University or not, are prohibited without the prior approval from the Public Relations or Student Life departments.
   
8. IT system accounts that expire, along with the files in the expired accounts, may be deleted. Accounts expire in accordance with the terms of the account. E-mail and voice mail messages that are older than the limit set by the system administrator will be deleted.
    Software Copyrights

Most computer software and documentation are protected by copyright law. It is illegal to copy or distribute software or its documentation without permission. Lack of copy-protection does not constitute permission to copy. If you have an authorized, or legal, copy of software, a single archival copy of the software may be made for backup purposes. However, use of that copy is only authorized if the original software is destroyed or fails to work. If the original software is transferred to another individual, the backup copy must also be transferred or destroyed.

Persons who choose to copy or use unauthorized copies of software should realize their conduct is in violation of this University policy. Such conduct may be in violation of the law and could be subject to fines and/or imprisonment.

Suitable records should be kept to prove the computer software is an authorized and legal copy. This would include the original disks containing the software, the license agreement, proof of purchase (e.g. copy of purchase order or receipt), or the original manual with the serial number of the product.

    Sanction

An individual's IT systems usage privileges may be suspended immediately upon the discovery of a possible violation of this or other University policy. IT may also disable accounts to protect the integrity of the IT infrastructure or data stored within. The Director of IT may authorize the disabling of an account for up to one business day. Such suspensions will be confidentially reported to the appropriate department, head/ chair, dean, IT staff and divisional Vice President. An account may be disabled for longer than one business day by following the same approval process outlined in paragraph number three above.

The IT administrative staff and/or supervising department chair will judge a violation of this policy as either major or minor. A first minor offense will normally be dealt with by the IT administrative staff or supervising department head/chair. Appeals relating to minor offenses may be made to the appropriate Vice President or his/her designated representative. Additional offenses will be regarded as major offenses. Major offenses will be dealt with by the appropriate Vice President or his/her designated representative.

Violations of these policies by a faculty or staff member will be dealt with in the same manner as violations of other University policies and may result in a disciplinary review. A violation of this policy by a student may be referred to the Office of Student Life for discipline. In such a review, the full range of disciplinary sanctions is available, including the loss of IT systems usage privileges, dismissal from the University and legal action. In some cases, violation of this policy may constitute a criminal offense under State or Federal law.

    Contact

Information Technology Office (x2900), Human Resource Services Office (x2088), Student Life (x2100)

Technology Use

La Sierra University information technology (including application systems, computer accounts, printers, networks, network devices, software, electronic mail, Web home pages, video systems, telephones, and telephone long distance and voice mail accounts) are provided for the use of the University students, faculty and staff, as approved, in support of the programs of the University. All students, faculty and staff are responsible for seeing that these technology systems are used in an effective, efficient, ethical and lawful manner. The use of technology systems is a privilege, not a right, which may be revoked at any time for misuse.

As a condition of using the University's computers, every user acknowledges that he or she has read, understands and agrees to be bound by the terms hereof.

   
5. Chain letters are not permitted.
   
3. Electronic mail, voice mail, and files on a University owned or University operated IT system are presumed to be owned by the university. Therefore the University has the right to inquire on various information with the proper approval as required by law. Their contents may be accessed only by authorized personnel for compelling business or security reasons. All requests for electronic records should be submitted to the Director of IT. The request must be accompanied by the approval of the President or the appropriate divisional Vice President or their designee.
 
a. for faculty members, the Provost;
b. for staff members, the staff's respective Vice President;
c. for students, the Vice President for Student Life;
d. as required by law.