Network and Computing Usage Agreement

Purpose

Hawai‘i Pacific University provides a variety of computer and network resources to support university business and operations, along with the University-related communication, research, and curriculum-related needs of its students, faculty, and staff.  Access to these resources is a privilege subject to HPU policies and procedures as well as state and federal laws governing computer network and Internet access. By using these resources, each network user accepts the responsibility to become informed about, and to comply with, all applicable laws and all university policies and procedures relating to the use of these resources.  In using these shared resources for the HPU community, academic freedom, the right of free expression, is balanced by the rights of others to freedom from intimidation, harassment, privacy, protection of intellectual property, and security of information.

This agreement applies to: in-class technology, electronic resources, computing devices, handheld devices, cellular phones, and services, both wired and wireless.

Personal equipment connected to the university network is also subject to this agreement. These guidelines apply to any user of IT resources provided by HPU and is in addition to those existing university policies and procedures applicable to students, faculty and staff.

University Rights

The university reserves the right to:

  • Add, delete or modify categories of users.
  • Restrict or limit access to its system information services and its resources.
  • Monitor and examine all files and messages stored on its systems.
  • Monitor internal use of its system information services and its resources.
  • In the case of a virus outbreak on a HPU computer, the computer will be re-imaged and all data will be destroyed.
  • mend this policy as it sees fit.

Acknowledgments

  • In the event of a hardware or software failure, HPU Information Technology Services (ITS) is NOT responsible for backing up, or recovering data stored on the computing device. University data should be stored on ITS approved shared drives or network/cloud storage.
  • The prohibited usage, responsibilities, and acknowledgements also apply to contracted third party services, such as Office 365 or Google Docs., and I agree to abide by this agreement when using those services provided by the university.
  • HPU data is the property of the university and upon request any HPU data that is placed in a cloud service or other external repository must be returned to the university.
  • Users of Hawai‘i Pacific University network accounts are also subject to any and all local, state or federal laws governing computers, electronic communication and information.
  • Notwithstanding HPU’s right to retrieve and read any electronic files and messages, such files and messages must be treated as confidential by other students, staff and faculty members, and accessed only by the intended recipient.

Prohibited Usage - includes, but is not limited to:

  • Unauthorized use of the passwords and encryption keys of others to gain access to the other person’s electronic files and/or email messages.
  • Using a code, accessing a file, or retrieving any stored information, unless authorized to do so.
  • Password sharing.
  • Retrieving or reading any electronic files and/or email messages that are not sent to them.
  • Attempting unauthorized access to data or attempt to breach security measures on any electronic communications system of the university or of third parties.
  • Transmitting messages or maintaining sites that are abusive, threatening, obscene or harassing.  Examples of forbidden transmissions and sites include sexually-explicit messages, cartoons or jokes; unwelcome propositions or love letters; ethnic or racial slurs; or any other messages or postings that can be construed to be harassment or disparagement of others based on their sex, gender identification, race, sexual orientation, age, national origin, religious or political beliefs, or other classifications protected under federal or state law.
  • Transmittal, posting or display of slanderous or defamatory messages, text, graphics or images.
  • Obscenity; child pornography; threats; theft; and violation of intellectual property or defamation laws.
  • Unauthorized peer-to-peer file sharing, illegal downloading or unauthorized distribution of copyrighted materials.
  • Intercepting electronic communications without authorization.
  • Gambling in violation of applicable law.
  • Exporting of technologies subject to export control regulations (International Traffic in Arms Regulations’ (ITAR), Commerce Control List (CCL) by the Export Administration Regulations (EAR), Office of Foreign Assets Control (OFAC) or to “denied persons” ) including software, and technical data without an export license if such license is required.
  • Disclosing, altering, or deleting any proprietary or confidential university information without proper authorization.
  • Use a university-provided account for non-university commercial purposes.
  • Maliciously attempt to degrade the performance of the university's computer system or change or damage the computer system or hardware. This includes the use of programs such as worms, Trojan horses or viruses.
  • The willful use of electronic communication systems to send or receive information, documents, messages or files that violate laws, regulations, or breaches the behavioral standards, academic conduct, or harassment policies of the university.
  • The use of electronic communications to intimidate others or to interfere with the ability of others to conduct HPU business, including academic pursuits.
  • Accessing or attempting to access restricted information held on the university systems.
  • Opening files from any unsolicited or unknown sources; includes email attachments and portable storage devices (USB Drives).
  • Knowingly post personal identifiable information (such as home address, telephone numbers, contact details, or other personal information) about anyone, without the express permission of the university.

Violations of the agreement: Substantiated violations of this agreement will result in the withdrawal of the privilege of an Internet account assigned to the user.  Appropriate disciplinary or legal action will be taken by the university, in accordance with applicable university policies and applicable law.   

Details

Article ID: 38758
Created
Wed 9/6/17 4:06 PM
Modified
Thu 12/14/17 1:45 PM