Computer and Network Usage Policy
Users of computing resources at the University of Dallas (UD) have access to valuable
university facilities, to sensitive data and to external networks. Consequently, it
is important for all users to behave in a responsible, ethical and legal manner. In
general, appropriate use means respecting the rights of other computer users, the
integrity of the physical facilities and all pertinent license and contractual agreements.
These guidelines apply to all users of UD computing resources. Users include, but
are not limited to, staff, faculty, visiting faculty, students, and external individuals
and/or organizations. UD computing resources are those resources that are owned or
managed by UD and include, but are not limited to, central computing facilities and
servers, laboratories, campus networking, local-area networks, electronic mail, access
to the Internet, and departmental workstations.
Guidelines for appropriate use
The following list, while not exhaustive, provides some specific guidelines for responsible
and ethical behavior:
- Authorization: Individual students, faculty and staff members of the University of Dallas may be
issued a user account to access one or more computing resources. The proper use of
a user account is the responsibility of the individual under whose name it has been
assigned. Use only the computers, computer accounts and computer files for which you
have authorization. Do not use another individual's ID or account, or attempt to capture
or guess other users' passwords. Users are individually responsible for all use of
resources assigned to them.
- Access: Do not attempt to access restricted portions of the operating system, or other software
unless explicitly authorized by the appropriate university personnel. Breaking into
computers is explicitly a violation of UD rules of conduct, no matter how weak the
protection is on those computers.
- Use: Use UD's computing facilities and services for university related work. Resources
may not be utilized for commercial use, product advertisement, or any other form of
revenue generating activities unrelated to UD. Users may not participate in computing
activities that place an undue burden on UD computer or network resources.
- Value: Treat computing resources and electronic information as the valuable university resources
that they are. Set an appropriate password and change it regularly. Do not destroy
or damage any computing equipment, networks or software.
- Viruses: Do not willfully introduce computer viruses into the UD computing environment or
into other computing environments via UD's network.
- Privacy: Respect the privacy and personal rights of others. Do not access or copy another
user's electronic mail, data, programs, or other files without permission.
- Civility: Use appropriate standards of civility when using computing systems to communicate
with other individuals. When sending personal messages to other users, always identify
yourself as the sender. Using UD's computing resources to harass other individuals
is explicitly prohibited.
- Copyright: Abide by all applicable copyright laws and licenses. Both university policies and
the law expressly forbid the copying of software that has not been placed in the public
domain or distributed as "freeware" or "shareware."
- Laws: Abide by all state and federal laws.
The appropriate computing department may revoke user privileges of anyone who has
abused the computing resources, has gained unauthorized access to computing resources,
or has otherwise disobeyed these policies. If further actions are deemed appropriate,
officials of the University of Dallas and of state and federal agencies may be notified.