Acceptable Use Policy

This policy provides guidelines for the appropriate and inappropriate use of the computing resources of Herzing University. It applies to all users of the University’s computing resources including students, faculty, staff, alumni, and guests of the University. Computing resources include all computers, related equipment, software, data, and local area networks for which the University is responsible as well as networks throughout the world to which the University provides computer access.

The computing resources of Herzing University are intended to be used for its programs of instruction and research and to conduct the legitimate business of the University. All users must have proper authorization for the use of the University’s computing resources. Users are responsible for seeing that these computing resources are used in an effective, ethical, and legal manner. Users must apply standards of normal academic and professional ethics and considerate conduct to their use of the University’s computing resources. Users must be aware of the legal and moral responsibility for ethical conduct in the use of computing resources. Users have a responsibility not to abuse the network and resources and to respect the privacy, copyrights, and intellectual property rights of others.

In addition to the policy contained herein, usage must be in accordance with applicable University procedures and applicable state and federal laws. Among the more important laws are the Federal Computer Abuse Amendment Act of 1994, the Federal Electronic Communications Privacy Act, and the U.S. Copyright Act.

Policy violations generally fall into four categories and involve the use of computing resources to:

  1. Harass, threaten, or otherwise cause harm to specific individuals or classes of individuals.
  2. Impede, interfere with, impair, or otherwise cause harm to the activities of others.
  3. Download, post, or install to University computers or transport across University networks material that is sexually explicit or offensive or material that is illegal, proprietary, in violation of license agreements, in violation of copyrights, in violation of University contracts, or otherwise damaging to the institution.
  4. Recklessly or maliciously interfere with or damage computer or network resources or computer data, files, or other information. Penalties for violating these guidelines can range from a reprimand in the student’s file to expulsion.

Examples (not a comprehensive list) of policy violations related to the above four categories include the following:

  1. Sending an individual or group repeated and unwanted (harassing) e-mail or using e-mail to threaten someone.
  2. Accessing, or attempting to access, another individual’s data or information without proper authorization (e.g., using another’s computing account and password to look at their personal information).
  3. Propagating electronic chain mail or sending forged or falsified e-mail.
  4. Obtaining, possessing, using, or attempting to use someone else’s password, regardless of how the password was obtained.
  5. Copying a graphical image from a website without permission.
  6. Posting a University site-licensed program to a public bulletin board.
  7. Using illegally obtained licensed data, software, or licensed data/software in violation of their licenses or purchase agreements.
  8. Releasing a virus, worm, or other program that damages or otherwise harms a system or network.
  9. Accessing, displaying, storing, or transmitting sexually explicit or offensive language or images.