University of New Haven Acceptable Computer and Network Usage Policy

This acceptable use policy governs the use of computers and networks on the University of New Haven campuses. As a user of these resources, you are responsible for reading and understanding this document. This document protects the consumers of computing resources, computing hardware and networks, and system administrators. This document is a license.  Use of any University of New Haven computing resource implies acceptance of the term of this license agreement.

The uses of the University of New Haven’s computer resources are provided for academic use.  Conduct which violates this policy includes, but is not limited to the activities in the following list:

Unauthorized use of a computer account.

Using the Campus Network to gain unauthorized access to any computer systems.

Connecting unauthorized peripherals to any University of New Haven computers.

Unauthorized attempts to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data.

Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks.

Knowingly or carelessly running or installing software programs on any computer system or network, or giving to another user a program intended to damage or to place excessive load on a computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan Horses, and worms.

Deliberately wasting/overloading computing resources, such as printing too many copies of a document.

Violating terms of applicable software licensing agreements or copyright laws.

Violating copyright laws and their fair use provisions through inappropriate reproduction or dissemination of copyrighted text, images, etc.

Using university resources for commercial activity such as creating products or services for sale.

Using electronic mail to harass or threaten others. This includes sending repeated, unwanted e-mail to another user.

Initiating or propagating electronic chain letters.

Inappropriate mass mailing. This includes multiple mailings to newsgroups, mailing lists, or individuals, e.g. “spamming,” “flooding,” or “bombing.”

Forging the identity of a user or machine in an electronic communication.

Transmitting or reproducing materials that are slanderous or defamatory in nature or that otherwise violate existing laws or university regulations.

Displaying obscene, lewd, sexually harassing images, hate speech or text that is not directly related to academic research or assignments in a public computer facility.

Attempting to monitor or tamper with another user’s electronic communications, or reading, copying, changing, or deleting another user’s files or software without the explicit agreement of the owner.

Offenders may be referred to their sponsoring advisor, department, employer, or other appropriate University office for further action. If the individual is a student, the matter may be referred to the Office of the Associate Dean for Judicial Action.  Any offense, which violates local, state, or federal laws, may result in the immediate loss of all University computing privileges and will be referred to appropriate University offices and/or law enforcement authorities.