Computer & Network Usage

Computer & Network Usage Policies

Users of computing resources at the University of Dallas have access to valuable university facilities, to sensitive data and to external networks. Consequently, it is important for all users to act in a responsible, ethical and legal manner. In general, appropriate use means respecting the rights of other computer users, the integrity of the physical facilities and all pertinent license and contractual agreements.

These guidelines apply to all users of UD computing resources. Users include, but are not limited to, staff, faculty, visiting faculty, students and external individuals and/or organizations. UD computing resources are those resources that are owned or managed by UD and include, but are not limited to, central computing facilities and servers, laboratories, campus networking, local area networks, electronic mail, access to the Internet and departmental workstations.

Guidelines for Appropriate Use

The following list, while not exhaustive, provides some specific guidelines for responsible and ethical actions: 

  1. Authorization - Individual students, faculty and staff members of the University of Dallas may be issued a user account to access one or more computing resources. The proper use of a user account is the responsibility of the individual under whose name it has been assigned. Use only the computers, computer accounts and computer files for which you have authorization. Do not use another individual’s ID or account, or attempt to capture or guess other users’ passwords. Users are individually responsible for all use of resources assigned to them.
  2. Access - Do not attempt to access-restricted portions of the operating system or other software. Accessing University computers without proper authorization is a violation of UD rules of conduct.  
  3. Use - Use UD’s computing facilities and services for university-related work. Resources may not be utilized for commercial use, product advertisement or any other form of revenue-generating activities unrelated to UD. Users may not participate in computing activities that place an undue burden on UD computer or network resources.
  4. Value - Treat computing resources and electronic information as the valuable university resources that they are. Set an appropriate password and change it regularly. Do not destroy or damage any computing equipment, networks or software.
  5. Viruses - Do not willfully introduce computer viruses or other malware into the UD computing environment or into other computing environments via UD’s network. 
  6. Privacy - Respect the privacy and personal rights of others. Do not access or copy another user’s electronic mail, data, programs or other files without permission. Do not use a computer logged in as anyone other than yourself.
  7. Civility - Use appropriate standards of civility when using computing systems to communicate with other individuals. When sending personal messages to other users, always identify you as the sender. Using UD’s computing resources to harass other individuals is explicitly prohibited.
  8. Copyright - Abide by all applicable copyright laws and licenses. Both university policies and the law expressly forbid the copying and/or sharing of software or data that has not been placed in the public domain or distributed as “freeware” or “shareware.”  Several students each month are found sharing copyrighted files such as mp3 files, movies, TV shows and software such as games and office suites from our network. Appropriate action may be taken by UD.
  9. Peer-to-Peer File Sharing – Unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may result in criminal and civil penalties as well as disciplinary action under the Code of Conduct.  Annually students will receive notice from the University informing student that unauthorized distribution of copyrighted material, including peer-to-peer file sharing may subject them to civil and criminal liabilities, summarizing the penalties for violation of Federal copyright laws and describing the University’s policies including disciplinary action that may be taken against student who engage in unauthorized distribution of copyrighted materials using the University’s information technology systems.
  10. Laws - Abide by all local, state, and federal laws. 

Recourse

The appropriate computing department may revoke user privileges of anyone who has abused the computing resources, has gained unauthorized access to computing resources or has otherwise violated these policies. If further actions are deemed appropriate, officials of the University of Dallas and of local, state and federal agencies may be notified. 

Student Network Classifications

  1. In an effort to maintain a high level of network availability and usability, the Information Technology Department has broken down the student network usage into three categories. It is our intention to make the network bandwidth available for these types of activities in the following order of importance.
  2. Educational Usage - shall be viewed as any activity directly related to students studies at the University. This includes the ability to search the Internet and browse web pages via the standard HTTP protocol. In addition to this, the HTTPS protocol used for viewing secure web pages will also be available.
  3. Communications Usage - shall be viewed as any activity directly related to students communication with others either on the UD network or on an outside network using computers, tablets, phones, and other devices that connect to our wired or wireless infrastructure.
  4. Entertainment Usage - shall be viewed as any activity that does not fall under the first two categories.  IT understands the need for an outlet from the stresses of college life and we know that for many students online gaming and other entertainment is that outlet. With that in mind, IT allows online games that do not have any adverse effects on the networks integrity or bandwidth and that do not interfere or cause reduced performance for those students utilizing the network for educational and communications purposes.