Administration of Computer and Communications Systems at
This is a
communication facilities, including those dealing with voice, data, and
video. It relates to the use and administration of telecommunications
equipment (including computer networks involving the PBX and Internet)
as well as mainframe, midrange, minicomputer, workstation, and personal
computer systems. Thus, it covers all activities involving computing
and communication facilities of Averett University. Every user of these
systems is expected to know and follow this
This policy applies
or administering Averett University computer and/or communication
facilities, including but not limited to both wired and wireless
networks. Not covered are activities solely involving personal
property. Related university policies and guidelines that must be
respected by such individuals include the following:
University have been developed to encourage widespread access and
distribution of data and information. Computing systems facilitate
manipulation and sharing of data and information. Together, these
systems and facilities can be used in similar fashion to mail and
telephone services, and so are governed by principles of appropriate
use for those services.
University communication and computing resources are used to support
the educational, research, and public service missions of the
institution. Activities involving these resources must be in accord
with the university honor codes, Employee Handbook, student handbooks,
and relevant local, state, federal, and international laws and
regulations. Access to computer systems and networks owned or operated
by Averett University imposes certain responsibilities and obligations
and is granted subject to university policies, and local, state, and
federal laws. Acceptable use always is ethical, reflects academic
honesty, and shows restraint in the consumption of shared resources. It
demonstrates respect for intellectual property, ownership of data,
system security mechanisms, and individuals' rights to privacy and to
freedom from intimidation and harassment.
making acceptable use of resources you must:
- use resources
only for authorized purposes.
- protect your
userid and system from
You are responsible for all activities on your user id or that
from your system.
- access only
information that is your own, that
is publicly available, or to which you have been given authorized
- use only legal
versions of copyrighted software
in compliance with vendor license requirements.
- be considerate
in your use
resources. Refrain from monopolizing systems, overloading networks with
excessive data, degrading services, or wasting computer time, connect
time, disk space, printer paper, manuals, or other resources.
making acceptable use
resources you must NOT:
- use another
person's system, user id, password,
files, or data without permission.
- use computer
programs to decode passwords or
access control information.
- attempt to
circumvent or subvert system or
network security measures.
- engage in any
activity that might be
harmful to systems or to any information stored thereon, such as
creating or propagating viruses, disrupting services, or damaging files
or making unauthorized modifications to university data.
- use university
systems for commercial or
political purposes, such as using electronic mail to circulate
advertising for products or for political candidates.
- make, use, or
illegal copies of copyrighted
or software, store such copies on university systems, or transmit them
over university networks.
- use mail or
messaging services to harass or
intimidate another person, for example, by broadcasting unsolicited
messages, by repeatedly sending unwanted mail, or by using someone
else's name or userid.
- waste computing
resources or network resources,
example, by intentionally placing a program in an endless loop,
printing excessive amounts of paper, or by sending chain letters or
unsolicited mass mailings.
- use the
university's systems or networks for
gain; for example, by selling access to your user id or to university
systems or networks, or by performing work for profit with university
resources in a manner not authorized by the university.
- engage in any
activity that does not comply with the General Principles presented
university considers any
acceptable use principles or guidelines to be a serious offense and
reserves the right to copy and examine any files or information
resident on university systems allegedly related to unacceptable use,
and to protect its network from systems and events that threaten or
degrade operations. Violators are subject to disciplinary action as
prescribed in the Honor Codes, the University Policies for Student
Life, and employee handbooks. Offenders also may be prosecuted under
laws including (but not limited to) the Communications Act of 1934
(amended), the Family Educational Rights and Privacy Act of 1974, the
Computer Fraud and Abuse Act of 1986, The Computer Virus Eradication
Act of 1989, Interstate Transportation of Stolen Property, The Virginia
Computer Crimes Act, and the Electronic Communications Privacy Act.
Access to the text of these laws is available through the Averett
University Library Reference Department.
SUSPECTED SECURITY BREACHES
Anyone who has
reason to suspect a deliberate or
significant breach of established security policy or procedure should
promptly report it to the appropriate Dean, Director, or Department
Head, and to the University Security Office. If it is felt the breach
is serious and needs immediate attention, the Averett University
or local law enforcement should be contacted. The Information
Technology Department may be involved with suspected breaches and
can also be a resource for those involved in any investigation.
systems owned by
Averett University do so subject to applicable laws and University
policies. Averett University disclaims any responsibility and/or
warranties for information and materials residing on non-university
systems or available over publicly accessible networks. Such materials
do not necessarily reflect the attitudes, opinions, or values of the
Commonwealth of Virginia, Averett University, its faculty, staff, or