2017-2018 Student Handbook

Page 17 of 107 Updated 1.25.17 1. Access Codes/Passwords Access is based on a per user system, meaning that passwords and access are meant for each individual only. Allowing others to use access may result in the loss of access privileges. 2. Posting Information/Messages on the Internet A student’s access may be revoked if he/she: a. Posts any pornographic messages, images, etc. (It is a federal offense.) b. Downloads or views any pornographic images, message, etc. c. Posts or sends threatening, harassing, sexually explicit, or intentionally embarrassing messages. d. Uses email for business purposes, i.e., for-profit ventures. e. Initiates or participates in spam, chain letters, or pyramid schemes. 3. Ownership of Email The university owns any messages sent or received through access provided by HSU. While mail sent via the U. S. Postal Service is considered private and confidential, the same is not currently true of email. According to federal law, if a student posts email messages on a service provided by someone else, they can and do hold the right to monitor, inspect, alter, or otherwise control such messages. Students should understand that it is not the intent of HSU to snoop into email messages, censor, or resort to other repressive measures. Remember that HSU could be ultimately held responsible for the messages its students may send or receive. 4. Hacking or Interference with Other Computer Systems Automatic and immediate suspension of access will occur if it is determined that a student (or anyone using his/her access) has attempted or succeeded in changing other programs, has gained unauthorized access to other data or databases, has changed any information in any database or format for which he/she is not authorized. (Students should keep any written authorizations for his/her protection). 5. Viruses Automatic and immediate suspension of access will occur if it is determined that a student (or anyone using his/her access) has attempted or succeeded in creating, participating, or intentionally promulgating any virus or other destructive or interfering programs, files or commands. It is the responsibility of students to protect their personal computers from viruses. If the university detects that a virus is spreading from individual students’ IP addresses, it has the right to cut off access. 6. Illegal Activity Use of access for any illegal activity, including violations of the Digital Millennium Copyright Act, may result in loss of access and in criminal prosecution. 7. Copying Files/Programs Students should not copy other authors’ work, files, or programs without written consent unless public copying rights are indicated. Students must maintain written consent for their protection. Burden of proof of permission to copy rests with the person copying. 8. Types of Unacceptable Uses and Messages a. Messages that delay or interfere with other’s work, education, or way of life b. Messages or efforts designed to market or sell products, services, etc. (no advertising) c. Purchases made over the internet for which HSU could be held responsible d. Messages which intentionally create high levels of network activity e. Inflammatory or harassing messages f. Spam g. Downloading large files that require more than a few minutes of online time h. Messages directed to excessively long listservs that consume a high level of online time