Regarding the Use of Technology and Information Resources
The policies and guidelines outlined in this document apply to the entire University of Richmond community: students, faculty, staff, and sponsored guests. These policies and guidelines are subject to change as technology and state and federal laws develop and change. Suggestions or comments on these policies are welcomed and should be sent to the Vice President for Information Services at email@example.com.
- Responsible Use of University Information and Computing Resources
- Information Security and Privacy
- E-mail and Other Electronic Communications
- Observing the Digital Millennium Copyright Act, and Protecting Intellectual Property and Copyright
- Problem Resolution and Policy Violation
- Reporting Abusive Incidents, Harassment or Irresponsible Behavior Related to Technology
1. Responsible Use of University Information and Computing Resources
All members of the University of Richmond community who use the University's computing and network facilities must use them in an ethical, responsible and legal manner. This means that individuals are personally responsible for their use of these resources and must be familiar with and follow all Information Services policies. An attempt to engage in a prohibited activity is considered a violation whether the attempt is successful or not.
The University's network and computer infrastructure is a critical but finite resource. Community members rely on high availability and good performance in order to accomplish their work. Systems using excessive amounts of bandwidth, causing network disruption or are deemed to be a security and/or privacy risk may be taken off the network or be otherwise limited without warning. Information Services may employ automated systems that partition or restrict network bandwidth, protocols, or access either internally or at the Internet gateway. The University does not monitor or generally restrict the content of material transported across the University's networks or stored on University-owned computers. The University reserves the right to remove or limit access to material posted on University-owned or administered systems or networks when University policies, contractual obligations, or state or federal laws are violated. The University provides computers, software, and network equipment for use by the University community. The University retains ownership and reserves the right to add, remove, upgrade and replace hardware and software on those systems as deemed necessary by Information Services.Members of the University of Richmond community must:
- Use resources supplied for purposes which are consistent with the business and mission of the University of Richmond.
- Use the University's computing facilities and information resources, including hardware, software and computer accounts, responsibly and appropriately.
- Respect the rights and property of others.
- Comply with all applicable federal, state, and local laws and University policy.
- Comply with all contractual and license agreements.
- Accept personal responsibility for the proper use of individual accounts and all activity associated with them.
- Safeguard equipment entrusted to them.
- Share accounts, passwords, or other computer or network authentication. Information Services may grant authorization for group or organization accounts when there is a need. See "Computing Accounts at the University of Richmond."
- Use any means to view or intercept data or network traffic not intended for their viewing or use.
- View, copy, disclose, or modify any files or data that do not belong to them, or to which they do not have specific permission.
- Use computing or network resources to harass, threaten, or otherwise cause harm to others.
- Use the University's computing resources for commercial purposes not related to the University's academic, research, and scholarly pursuits.
- Use any IT systems in a way which suggests University endorsement of any political party, candidate, or ballot initiative. This includes e-mailing political messages to any list service maintained by the University which is not explicitly purposed for the posting of political messages.
- Interfere with the proper functioning of the University of Richmond wired or wireless network. In particular users may not perform service denial attacks and users may not install their own network equipment on campus. See "Wireless Access Policy."
- Use University of Richmond IT systems to distribute, produce, publish and/or sell obscene or illegal content.
2. Information Security and Privacy
The University takes information security and privacy very seriously for all of its members and all of its systems.
The University is the owner of all administrative data; individual units or departments have stewardship responsibilities for portions of that data. Information maintained on University systems is a vital asset that will be available only to those who have a legitimate need for it in order to conduct University business. The University does not allow the use of administrative data for anything but the conduct of University business. Employees accessing data must observe requirements for confidentiality and privacy, must comply with protection and control procedures, and must accurately present the data in any use.Members of the University of Richmond community must:
- Read and agree to abide by the University's Data Security Policy.
- Be personally responsible for the security and usage of any system connected to the University of Richmond network, not owned by the University of Richmond. Find information on connecting your computer.
- Choose passwords that meet University standards and keep their passwords secure. See "Password Policy." Do not use the password that you choose for your University of Richmond accounts with other off-campus services such as Ning, Google, or MySpace as the privacy of your password may not be protected outside the University's network.
- Report unauthorized use of your accounts to your supervisor or the Information Services Security Administrator. If you discover a possible security issue related to University systems report the problem immediately to firstname.lastname@example.org.
- Use only those computers and computer accounts for which you have authorization. If you need additional privileges or access contact the Help Desk or appropriate system administrator with your request.
- Comply with requests from Information Services. Information Services' staff will conduct periodic security checks on systems and networks. Individuals may be asked to change their password, upgrade software, apply a patch or perform some other action to improve system security. Non-compliance may result in termination of access.
- When displaying or publishing photos on Web pages or other public forums you have a responsibility not to compromise the privacy of individuals who are identifiable in those photos. As a rule, photo releases are not required for candid photos taken in public areas. However, a page owner or publisher should immediately remove any photo if the subject of the photo objects to its use and requests its removal.
- Disguise or attempt to disguise their identity or the identity of their account or the machine that they are using. Users may not attempt to impersonate another person or computing system account. The use of aliases or nicknames associated with your account in systems where those are commonly used is not considered a disguise and is not prohibited.
- Attempt to gain unauthorized access to any account or system.
- Create or use any program or electronic form that collects account names, passwords or personally identifiable information about individuals without the direct knowledge, approval and assistance of Information Services.
- Copy, report or distribute any personally identifiable, sensitive or confidential data or files to which you as a user of University resources are not authorized or gain inadvertent access. Users must report any occurrences to the data owner or to the Information Security Administrator.
The foregoing is not an all-inclusive list; the University reserves the right to determine what uses of its equipment and facilities fall within the bounds of the business and mission of the University. Report abuses of information or computing resources to the appropriate Information Services administrator or to email@example.com.
3. E-mail and Other Electronic Communications
E-mail, text messaging, instant messaging, and other applications are used by most members of the University community. However, all users should understand the limitations of privacy and confidentially related to them. They should not be used for confidential communication or the transmission of sensitive data. See the University's Data Security Policy for additional information.
E-mail messages are written records that could be subject to review with just cause. E-mail records and information in electronic form on central computers can be subpoenaed. Messages that the user has deleted may still exist on system's backup media for weeks or months.
Certain types of e-mail and uses of e-mail or other forms of electronic communications are prohibited; these include chain letters, obscene messages, harassing messages, and unsolicited political messages. E-mail that violates any University policy or is otherwise used for an illegal purpose is prohibited.
All e-mail sent through the University's systems and network must accurately show from whom the e-mail originated.
The University may employ automated systems to reduce the amount of unwanted "junk" mail. It is known that this may on occasion reject a valid e-mail.
SpiderBytes should be used for messages to a large number of recipients. SpiderBytes is a messaging forum for University of Richmond students, faculty and staff to exchange important information regarding University business and campus-wide events. Do not e-mail large lists through Outlook.
4. Observing the Digital Millennium Copyright Act, and Protecting Intellectual Property and Copyright
Copyright is a form of protection of intellectual property provided by the laws of the United States to the authors of original works. Copyright is an issue of particular seriousness because technology now allows the easy copying and transmission of some protected works.
It is the responsibility of all students, faculty, and staff at the University of Richmond to understand and comply with the University's policy regarding the Digital Millennium Copyright Act. See "Digital Millennium Copyright Act Policy."
The University's designated agent for notices under the Digital Millennium Copyright Act is Lucretia McCulley, the Head of Scholarly Communications and Access Services, Boatwright Memorial Library. For more information on copyright and intellectual property please refer to the Library's resource page: http://library.richmond.edu/services/copyright/Overview.html. Federal copyright laws also protect the software available for use on computers at the University of Richmond. The software provided through the University for use by faculty, staff, and students may be used only on computing equipment as specified in the various software licenses.
Faculty, staff, or students must not copy or reproduce any licensed software or intellectual property found on University computing equipment, except as expressly permitted by the software license, author, or granting authority. Faculty, staff, and students may not use unauthorized copies of licensed software on University-owned computers.
5. Problem Resolution and Policy Violations
In cases where a member of the University community has allegedly committed a policy violation, broken a law, or is causing harm to the information infrastructure; Information Services may immediately revoke access privileges pending the outcome of a full review of the problem. Whenever possible the individual will be notified by phone, electronic, campus or U.S. mail of the alleged violation. A representative of the Information Services staff will contact the person to propose a meeting to discuss the alleged violation.
Depending on the nature of the alleged offense, Information Services may contact the appropriate senior university administrator (Director of Human Resources, Dean, Vice President, Campus Police) or law enforcement agency alerting them of the alleged violation and conferring on the appropriate next steps. If the problem or issue in question overlaps with another disciplinary or law enforcement process, Information Services will coordinate with the appropriate office or agency. Penalties for illegal activity or serious violations may be as severe as suspension or dismissal from the University or criminal prosecution.
6. Reporting Abusive Incidents, Harassment or Irresponsible Behavior Related to Technology
If you are a victim of abusive incidents related to technology or you become aware of abusive use of University technology resources, report the violation to the Dean of your college, your supervisor, the Campus Police or Information Services at firstname.lastname@example.org. Sending a message to email@example.com will alert a senior member of the Information Services staff to your situation. Keep copies of e-mail messages, a record of the time and date(s) of the occurrence, and all other information related to the incident for investigative purposes.
|1.0||June 29, 1999||Initial policy created.|
|2.0||August 5, 2008||Chris Faigle|
|2.1||May 18, 2010||Melody Kimball||Revision History added.|
|2.2||August 15, 2010||Melody Kimball||DMCA designated agent updated.|
|2.3||July 31, 2013||Melody Kimball||Link to Library's copyright resource page updated|
|2.4||March 13, 2014||Kathy Monday||Integration with new Data Security Policy|
|2.5||October 2, 2015||Melody Wilson||DMCA designated agent updated.|