Search:
 
 
 

 

 
Purpose The purpose of this policy is to describe what is considered proper and improper use of Saint Vincent Seminary’s technology infrastructure.
Summary The seminary has implemented a computer and communications network to support its mission.  While it is acceptable to use these facilities for other non-mission purposes, it is not acceptable to use it for purposes which negatively impact the mission or are unlawful.
Details

In support of its mission, Saint Vincent Seminary, within the parameters of institutional priorities and financial capabilities, intends to provide access for students, faculty and staff members to local, national and international sources of information.  It is also the intent of the Seminary to maintain a campus environment that facilitates access to knowledge and the sharing of information with colleagues at Saint Vincent and at other locations without fear that their work will be violated by misrepresentation, tampering, destruction and/or theft.

The policy for Responsible Use of Information Resources contains the governing philosophy for regulating faculty, student and staff use of the seminary’s information resoures including, but not limited to, library, audio visual, academic and administrative computing, and telephone system resources. It also explicates the general principles regarding the appropriate use of these resources. In adopting this policy, the Seminary recognizes that all members of the Seminary community are also bound by local, state and federal laws governing the use of these resources.

Commuters are responsible for providing a current mailing address and telephone number to the Seminary. This information should be submitted to the Academic Dean.

For Library policies and a full explanation of Library services please consult the Saint Vincent Seminary web site or portal.

Respect for intellectual labor and creativity

 Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media. It encompasses respect for the right to privacy and the right to determine the form, manner and terms of publication and distribution. Access to the information resource infrastructure both within the Seminary and beyond the campus, sharing of information and security of the intellectual products of the community all require that every user accept responsibility for protecting the rights of the community and its members and abiding by the principle of respect for intellectual/academic work.

Access is a privilege

Access to the Seminary’s information resources and facilities is a privilege granted to Saint Vincent faculty members, staff members and students. The Seminary reserves the right to limit or extend privileges and access to these resources.  Any member of the Seminary community who, without authorization, accesses, uses, destroys, alters, dismantles, or disfigures Seminary information technologies, properties or facilities, including those owned by third parties, thereby threatens the environment of increased access and sharing of information. He/she also threatens the security within which members of the community may operate and, in the view of the Seminary, has engaged in unethical and unacceptable conduct.

Saint Vincent Seminary’s information resources including the campus network and access paths it provides to off-campus resources such as the Internet are private facilities of the Seminary.  These facilities are made available to users as the Seminary sees fit in accordance with its mission.  The Seminary strives to operate the network reliably, efficiently, securely, legally, and in accordance with Seminary policies.  To accomplish this, the Seminary may exercise its right to log access to and use of all resources on the network as well as the traffic that flows through the network.  Management software on the network can log dates and times users log in and log out of the network.  It can also identify resources used on or accessed from the network, messages and files stored on and passed through the network, servers and other sites accessed from the network, and applications executed by users of the network.  In addition to logging user activity, management software can determine the identity and log the behavior of machines attached to the network.

Although information can be monitored and logged by the network, the Seminary does not routinely monitor individual user’s activities or the content of their work while using campus resources.  However, if circumstances indicate a user or a user’s computer is causing problems with operation of the network or other information resources, or is violating laws or Seminary policies, the Seminary will take all appropriate steps to identify the cause of the problems.  This may include using information logged by the system or collected about users and their computers.  If policies are violated, offending users will be dealt with according to established procedures.  If there are indications of local, state or federal law violations, Seminary personnel will cooperate with appropriate officials to identify and prosecute offenders.  This will include providing information about machines and user activities that might be involved in the violations.

Mission of the Seminary has priority

 If demand for specific information exceeds the capacity of available information resources; use of the resources for instructional or administrative activities directly related to the mission of the Seminary shall have priority over individual use of resources.  Also, any information network traffic exiting the Seminary is subject to the acceptable use policies of the network through which it flows as well as to other Seminary policies pertaining to the use of information resources.

In the final analysis, the health and well being of the Seminary’s information resources are the responsibility of all users who must guard against abuses that disrupt and/or threaten the long term viability of the systems and resources at Saint Vincent and beyond the campus.  The Seminary requires that members of its community act in accordance with these responsibilities, its policies pertaining to the use of such resources, relevant laws and contractual obligations and the highest standard of ethics.

Inappropriate behaviors

 In accordance with the Seminary Policy for the Responsible Use of Information Resources, the inappropriate behaviors by students or student organizations listed below are subject to Seminary disciplinary action. Moreover, the Seminary reserves the right to restrict a student’s access to information resources, pending the outcome of Seminary judicial action, if, in the opinion of the Chief Information Officer, the student’s continuing access to such resources endangers the resources, is a threat to other individuals or may result in additional violations of the Code of Conduct.  In addition to Seminary disciplinary action, students may be subject to prosecution by legal authorities if they violate local, state or federal laws governing the use of information resources.  Finally, the Seminary reserves the right to take disciplinary action against students who allow the use of their Seminary information resource accounts by others when such use entails violations of the Code of Conduct.

  • Unauthorized use or attempted use of a Seminary information resource account; 
  • Disguising, or attempting to disguise, the identity of an information resource account or information resource in use; 
  • Allowing other persons to use your information resource account, or the accounts of others, in the absence of the owner of the account; 
  • Use of Seminary telecommunications network to gain or attempt to gain unauthorized access to local or remote information resources.  No machine configured to operate as a network server shall be connected to the campus network by any method (data jacks, hubs, wireless or other connections) without written approval from the Chief Information Officer. 
  • Acts performed knowingly or deliberately which are intended to, or have the effect of, impacting adversely the operation of information resources and/or denying service to other users of the resources.  This includes, but is not limited to, the unauthorized use of student accounts for the purpose of sending e-mail mass mailings or chain letters, or executing programs that impede the operation of the network; 
  • Modification of computer files, disks, programs, or other information resources belonging to the Seminary or other  persons without the owner’s permission; 
  • Use or installation of a program which is intended to damage an information resource file, system or network; 
  • Circumvention, or attempts to circumvent, information resource protection measures;
  • Violation of licensing agreements for information resources;
  • Reading, copying, deleting or altering in any way information resource communications, files, or software belonging to others without their permission, unless authorized by the Chief Information Officer;
  • Use of any Seminary information resource for purposes other than personal communications or educational/ administrative work directly related to the mission of the Seminary, unless approved by the Chief Information Officer. 
  • Use of information resources for commercial enterprises and/or financial gain, unless approved by the Chief Information Officer.
Network Protection We Will be Scanning Student Computers. In an effort to ensure compliance with the network rules that have been set forth, we will be running random network scans.  The scans can be either active or passive in nature.  During an active scan, we will attempt to determine if you are operating a firewall technology that effectively protects your computer.
The other type of scan will be running on a continual basis is termed a “passive” scan and involves monitoring the traffic on the network for indications of viruses and/or unacceptable activity.  If traffic from your computer is symptomatic of computer viruses, your computer will be quarantined until the situation is resolved.  If the monitored traffic from your computer indicates that you are sharing copyrighted materials, such as music or videos, your computer will be quarantined until you stop this behavior.
Will these scans hurt my computer? At no time will our scans alter anything on your computer.  It is possible you might notice your computer running a little slower as its firewall software deals with our probes.  However, it is unlikely the impact will be significant if even noticeable.
You must not infect other computers. Typically, when a computer becomes infected, it will subsequently try to infect other computers.  This is a common characteristic of viruses known as worms.  Not only do we require you to have a firewall and strongly recommend the use of anti-virus software, but we also insist that your computer not exhibit any of the behaviors associated with being infected.  Simply put, your computer may not try to infect other computers.
How do I avoid this situation? The seminary requires you to operate firewall software.  We also insist upon the use of anti-virus software.  In addition, you should use caution with any files you receive from others via email, floppies, CDs, etc.  If you take these three measures and keep your system current, then you’re pretty much doing what needs done.  However, we find users often disable anti-virus software because it slows down computer games.  The same may be true for firewall software.  We simply don’t know the characteristics of all of the offerings.
How will we know if your computer is trying to infect others? We will be monitoring network traffic in the residence halls for signs of infected computers or other unacceptable behavior.  If we detect activity that is inappropriate, your computer will be quarantined from normal network access.  
What are the consequences if I don’t comply? Your network privilege will be terminated temporarily or permanently as determined by Information Services in conjunction with your formation advisor.

 



E-mail Us