HomeSt. Matthew's University
arrow_back

Appendix B Specific Examples of Responsible and Irresponsible Uses



Appropriate Uses

Authorized Use

  • A student browses web sites not directly related to their role at the University.
  • A very ill student gives their password to another student to check e-mail on their behalf.
  • A staff member away from campus delegates another staff member to read and respond to e-mail and calendar items in their absence. They provide their login ID and password to the same staff member to permit others to access files in their absence.
  • A St. Matthew's University staff member uses the St. Matthew's University network to "telecommute" from home.
  • Students in a class use a single ID and password to access shared course materials and to complete class assignments. The professor uses the same ID and password to review completed assignments and post new materials.
  • At the request of the user, an IT technician logs into the userÂ’s account to repair a problem, but carefully avoids accessing any files not directly related to the problem being diagnosed.

Network/System Integrity

  • A student sets up a web site on their computer in the residence halls and grants permission to other users to download via St. Matthew's University's network some audio/video clips that he created.
  • A student makes an intra-campus file transfer to a designated computer in order to share a file that one or more students are using in a class.
  • A student creates user accounts on their own computer to allow access to shared files for a group project via the St. Matthew's University network.
  • A student resident runs a web server on their own computer that provides pictures of a recent trip to a neighboring island.
  • A student uses the St. Matthew's University network to play online games provided other network users are not adversely impacted.
  • A network administrator conducts a port scan of the computers attached to that network.

Commercial Use

  • A faculty member uses their St. Matthew's University e-mail account to communicate with a publisher about a textbook they are developing for a course they teach.
  • Posting a notice about items for sale to a newsgroup intended for that purpose or to an off-campus commercial web site, such as e-bay.
  • Using St. Matthew's University e-mail to communicate with potential employers.
  • A student club uses its St. Matthew's University web page to announce an upcoming, approved event for which students will be charged a fee.

Electronic Communications

  • A student uses their St. Matthew's University e-mail account to send e-mail to friends and family.
  • Incidental personal use by faculty and staff is reasonable provided it does not interfere with assigned work or negatively impact other users.
  • A faculty member e-mails an assignment to all the students in a course.
  • A student, faculty or staff member deletes "spam" e-mail originating from a system other than St. Matthew's University or responds to the sender and asks to be removed.
  • A faculty member creates a web page and includes a link to someone else's web page.
  • Using St. Matthew's University e-mail to apply for an institutional grant.

Copyright

  • A staff member is beta-testing software that can fix a problem on another staff member's machine. They contact the manufacturer and get permission to install the upgrade on the other person's machine which has a legally obtained copy of the current product installed.
  • A student uses the same commands another person used to create a table on the web.
  • A student posts photographs they took on their web page.
  • A faculty member incorporates copyrighted materials in their course materials after first obtaining permission of the publishers of the materials.
  • A faculty member distributes copies of a brief excerpt from a larger work in class and then retrieves the copies after class is over.

Data Security

  • A faculty member retrieves online information about a student in their class. A counselor reviews a student's record in order to counsel them regarding school related issues.
  • A counselor reviews a student's record in order to counsel them regarding school related issues.
  • A staff member uses IT resources to generate a report about all the students in a given semester and their current status for a faculty member to review.
  • With the permission of the user, an IT technician helps to locate and interpret the headers in a harassing e-mail message to determine where the message came from.
  • In response to a search warrant or court order, IT technicians secure specified electronic files, including e-mail, stored on University computers to the extent required by the law.

Harassment

  • A student working on a computer in a lab creates or downloads one or more images that may disturb or offend others. They remove the images before leaving the facility or relocate to another workstation that is less visible to other users to work on this project.

Political Advocacy

  • Posting an opinion about a candidate or issue to a newsgroup intended for that purpose.
  • A student running for an SGA office uses a web page to discuss their platform and to collect e-mail addresses of potential supporters. The student uses the addresses to disseminate an e-mail message encouraging them to get students to vote in the election.

Trademarks and Patents

  • Displaying the St. Matthew's University logo on an "official" St. Matthew's University web page.

Inappropriate Uses

Authorized Use

  • A student gives their login ID and password to a relative or friend outside of St. Matthew's University so they can post materials to the student's web site.
  • A faculty member allows family members to use a St. Matthew's University account and Internet connection to browse the web and to send e-mail from the Library computers.
  • Without permission, a student accesses a faculty member's computer to view an insecure file containing test questions.

Commercial Use

  • Displaying commercial advertisements on a web page hosted on University resources.
  • Using a St. Matthew's University account to operate or conduct non-University related business activities, including financial management, advertising and promotion, correspondence, web sites, etc.
  • An administrative assistant supplements income by typing student projects using a University workstation and laser printer in the office.
  • A faculty member with an outside consulting business or working on a personal/individual contract or grant not approved by the University makes extensive use of University resources without compensating the University.
  • Using the St. Matthew's University network to "telecommute" to non-University employers.

Electronic Communications

  • A St. Matthew's University user forwards e-mail about a sick child and efforts to raise funds or send wishes or good luck to several other people on campus. The e-mail encourages recipients to pass the message along to as many people as possible.
  • A St. Matthew's University user broadcasts a message on a current topic of interest to several newsgroups or system aliases, none of which have to do with that particular topic. For example, a user posts a message about abortion issues to a newsgroup about English poetry.

Copyright

  • A department buys a single license copy of a software product and installs it on all the workstations in a student computer lab.
  • Extensive excerpts from a copyrighted work are distributed by e-mail or displayed on a web page without obtaining the permission of the author/publisher.
  • Photographs or images taken from another web page without the owner's permission are displayed on a web page residing on or accessed via University resources.
  • In violation of the manufacturer's license agreement, a faculty or staff member installs software purchased for departmental use on their home computer or allows students to borrow software to install on their home machines.
  • A student redistributes copies of software, music or other digital materials via the Internet. The student may have legally obtained these materials but does not have permission to redistribute them to others.
  • Using anonymous FTP, web sites, web servers, peer-to-peer applications or similar programs to provide access to illegally obtained or copyrighted materials used without proper permissions.

Data Security

  • A faculty member is curious about the activities of a student and attempts to gain access to that student's central email account or files.
  • A staff member discloses personal information to a relative of a student who has requested that their information not be disclosed.
  • A staff member uses University resources to look up the home address and telephone number of a faculty member and gives that information to a student.
  • A faculty member uses University resources to generate a mailing list of students in a specific class for the purpose of sending personal mail from home that is unrelated to University business.
  • An IT technician repairing a faculty workstation finds classified documents and discloses this information to an unauthorized person or persons outside the University.
  • A student assistant working on a staff or faculty computer discovers the final exam for class and passes it on to their roommate who is attending that class.
  • A technician is persuaded by law enforcement personnel to disclose information and/or turn over evidence regarding a potential violation without first obtaining a valid legal order.

Network/System Integrity

  • Using St. Matthew's University resources, including the network, to propagate a computer virus, Trojan Horse, worm, and/or denial of service attack.
  • A faculty member recklessly initiates a process on the network that causes response times to slow to a crawl.
  • Using any program that in anyway disrupts, harms, or infiltrates another computer, such as WinNuke, BackOrafice or a packet sniffer.
  • Making extensive use of chat rooms and interactive games on the web, causing network and/or system performance to degrade.
  • A dorm resident conducts a port scan of the residence hall network without permission of the network administrator.
  • Anyone conducts any port scan of an external network via the St. Matthew's University network without permission of the network administrators.

Political Advocacy

  • A faculty or staff member creates and uses an e-mail distribution list to solicit contributions, signatures, or other support on behalf of a particular candidate or ballot measure.

Harassment

  • Displaying an intimate, suggestive or disturbing image which a reasonable person would consider objectionable as the "wallpaper" or screen saver on a computer that is routinely visible to other students, staff and faculty.
  • Repeatedly sending threatening or harassing e-mail or voice mail to another individual.

Trademarks and Patents

  • Without obtaining permission in advance, a non-St. Matthew's University web site displays the St. Matthew's University logo, displays the St. Matthew's University home page design, or displays the University name in such a way as to imply University endorsement or affiliation.
  • Without permission of the manufacturer, a user beta testing a new commercial software product loads it on a server and posts a message announcing that the software is available to anyone at that location.

Return toResponsible Use Policy