|Policy No.:||5-9||This policy applies to:|
|Policy Name:||Computer and Internet Usage||Non-exempt staff|
|Effective Date:||08/01/04||Exempt staff|
As a part of its mission of providing a rigorous education grounded in values, Loyola University New Orleans acquires, develops, and maintains computers, computer systems, and networks. These computing resources are intended for university-related purposes, including direct and indirect support of the university’s instruction, research, and service missions; of university administrative functions; of student and campus life activities; and of the free exchange of ideas among members of the university community and between the university community and the wider local, national, and world communities. The Loyola community, thus, is encouraged to make innovative and creative use of information technologies in support of education and research.
The rights of academic freedom and freedom of expression apply to the use of university computing resources. So, too, however, do the responsibilities and limitations associated with those rights. The use of university computing resources, like the use of any other university-provided resource and like any other university-related activity, is subject to the normal requirements of legal and ethical behavior within the university community. Thus, legitimate use of a computer, computer system, or network does not extend to whatever is technically possible. Although some limitations are built into computer operating systems and networks, those limitations are not the sole restrictions on what is permissible. Users must abide by all applicable restrictions, whether or not they are built into the operating system or network, and whether or not they can be circumvented by technical means.
The university cannot protect individuals against the existence or receipt of material that may be offensive to them. As such, those who make use of electronic communications are warned that they may come across or be recipients of material they find offensive. Those who use e-mail or make information about themselves available on the Internet should be forewarned that the university cannot protect them from invasions of privacy and other possible dangers that could result from the individual’s distribution of personal information.
This policy applies to all users of university computing resources, whether affiliated with the university or not, and to all users of those resources, whether on campus or from remote locations. Additional policies may apply to specific computers, computer systems, or networks provided or operated by specific units of the university. Consult the operators or managers of the specific computer, computer system, or network in which you are interested for further information.
All users of university computing resources must:
Comply with all federal, Louisiana and other applicable law; all generally applicable university rules and policies; and all applicable contracts and licenses. Examples of such laws, rules, policies, contracts, and licenses include the laws of libel, privacy, copyright, trademark, obscenity, and child pornography; the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, which prohibit "hacking", "cracking", and similar activities; the university’s code of student conduct; the university’s sexual harassment policy; and all applicable software licenses. Users who engage in electronic communications with persons in other states or on other systems or networks should be aware that they may also be subject to the laws of those other states and countries and the rules and policies of those other systems and networks. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses.
Users who violate this policy may be denied access to university computing resources and may be subject to other penalties and disciplinary action, both within and outside of the university. Violations will be handled through the university disciplinary procedures applicable to the relevant user. However, the university may temporarily suspend or block access to an account, prior to the initiation or completion of such procedures, when it reasonably appears necessary to do so in order to protect the integrity or security of university or other computing resources or to protect the university from liability. The university may also refer suspected violations of applicable law to appropriate law enforcement agencies.
The university employs various measures to protect the security of its computing resources and of their users’ accounts. Users should be aware, however, that the university cannot guarantee such security. Users should therefore engage in "safe computing" practices by establishing appropriate access restrictions for their accounts, guarding their passwords, and changing them regularly.
Users should also be aware that their uses of university computing resources are not completely private. While the university does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the university’s computing resources require the backup of data and communications, the logging of activity, the monitoring of general usage patterns, and other such activities that are necessary for the rendition of service. The university may also specifically monitor the activity and accounts of individual users of university computing resources, including the contents of individual e-mail accounts, login sessions and communications, only when (a) the user has voluntarily made them accessible to the public, as by posting to Usenet or a web page; (b) it reasonably appears necessary to do so to protect the university from liability; (c) there is reasonable cause to believe that the user has violated, or is violating, this policy; or (d) it is otherwise required by law. Any such individual monitoring must be authorized in advance by the Provost or the Executive Director for Information Technology.