Computer & Network Usage Policies
Users of computing resources at the University of Dallas have access to valuable university
facilities, to sensitive data and to external networks. Consequently, it is important
for all users to act in a responsible, ethical and legal manner. In general, appropriate
use means respecting the rights of other computer users, the integrity of the physical
facilities and all pertinent license and contractual agreements.
These guidelines apply to all users of UD computing resources. Users include, but
are not limited to, staff, faculty, visiting faculty, students and external individuals
and/or organizations. UD computing resources are those resources that are owned or
managed by UD and include, but are not limited to, central computing facilities and
servers, laboratories, campus networking, local area networks, electronic mail, access
to the Internet and departmental workstations.
Guidelines for Appropriate Use
The following list, while not exhaustive, provides some specific guidelines for responsible
and ethical actions:
- Authorization - Individual students, faculty and staff members of the University of Dallas may be
issued a user account to access one or more computing resources. The proper use of
a user account is the responsibility of the individual under whose name it has been
assigned. Use only the computers, computer accounts and computer files for which you
have authorization. Do not use another individual’s ID or account, or attempt to capture
or guess other users’ passwords. Users are individually responsible for all use of
resources assigned to them.
- Access - Do not attempt to access-restricted portions of the operating system or other software.
Accessing University computers without proper authorization is a violation of UD rules
- Use - Use UD’s computing facilities and services for university-related work. Resources
may not be utilized for commercial use, product advertisement or any other form of
revenue-generating activities unrelated to UD. Users may not participate in computing
activities that place an undue burden on UD computer or network resources.
- Value - Treat computing resources and electronic information as the valuable university resources
that they are. Set an appropriate password and change it regularly. Do not destroy
or damage any computing equipment, networks or software.
- Viruses - Do not willfully introduce computer viruses or other malware into the UD computing
environment or into other computing environments via UD’s network.
- Privacy - Respect the privacy and personal rights of others. Do not access or copy another
user’s electronic mail, data, programs or other files without permission. Do not use
a computer logged in as anyone other than yourself.
- Civility - Use appropriate standards of civility when using computing systems to communicate
with other individuals. When sending personal messages to other users, always identify
you as the sender. Using UD’s computing resources to harass other individuals is explicitly
- Copyright - Abide by all applicable copyright laws and licenses. Both university policies and
the law expressly forbid the copying and/or sharing of software or data that has not
been placed in the public domain or distributed as “freeware” or “shareware.” Several
students each month are found sharing copyrighted files such as mp3 files, movies,
TV shows and software such as games and office suites from our network. Appropriate
action may be taken by UD.
- Peer-to-Peer File Sharing – Unauthorized distribution of copyrighted material, including unauthorized peer-to-peer
file sharing, may result in criminal and civil penalties as well as disciplinary action
under the Code of Conduct. Annually students will receive notice from the University
informing student that unauthorized distribution of copyrighted material, including
peer-to-peer file sharing may subject them to civil and criminal liabilities, summarizing
the penalties for violation of Federal copyright laws and describing the University’s
policies including disciplinary action that may be taken against student who engage
in unauthorized distribution of copyrighted materials using the University’s information
- Laws - Abide by all local, state, and federal laws.
The appropriate computing department may revoke user privileges of anyone who has
abused the computing resources, has gained unauthorized access to computing resources
or has otherwise violated these policies. If further actions are deemed appropriate,
officials of the University of Dallas and of local, state and federal agencies may
Student Network Classifications
- In an effort to maintain a high level of network availability and usability, the Information
Technology Department has broken down the student network usage into three categories.
It is our intention to make the network bandwidth available for these types of activities
in the following order of importance.
- Educational Usage - shall be viewed as any activity directly related to students studies
at the University. This includes the ability to search the Internet and browse web
pages via the standard HTTP protocol. In addition to this, the HTTPS protocol used
for viewing secure web pages will also be available.
- Communications Usage - shall be viewed as any activity directly related to students
communication with others either on the UD network or on an outside network using
computers, tablets, phones, and other devices that connect to our wired or wireless
- Entertainment Usage - shall be viewed as any activity that does not fall under the
first two categories. IT understands the need for an outlet from the stresses of
college life and we know that for many students online gaming and other entertainment
is that outlet. With that in mind, IT allows online games that do not have any adverse
effects on the networks integrity or bandwidth and that do not interfere or cause
reduced performance for those students utilizing the network for educational and communications