Skip to Main Content

Computer & Network Usage

Computer & Network Usage Policies

Users of computing resources at the University of Dallas have access to valuable university facilities, to sensitive data and to external networks. Consequently, it is important for all users to act in a responsible, ethical and legal manner. In general, appropriate use means respecting the rights of other computer users, the integrity of the physical facilities and all pertinent license and contractual agreements.

These guidelines apply to all users of UD computing resources. Users include, but are not limited to, staff, faculty, visiting faculty, students and external individuals and/or organizations. UD computing resources are those resources that are owned or managed by UD and include, but are not limited to, central computing facilities and servers, laboratories, campus networking, local area networks, electronic mail, access to the Internet and departmental workstations.

Guidelines for Appropriate Use

The following list, while not exhaustive, provides some specific guidelines for responsible and ethical actions: 

  1. Authorization - Individual students, faculty and staff members of the University of Dallas may be issued a user account to access one or more computing resources. The proper use of a user account is the responsibility of the individual under whose name it has been assigned. Use only the computers, computer accounts and computer files for which you have authorization. Do not use another individual’s ID or account, or attempt to capture or guess other users’ passwords. Users are individually responsible for all use of resources assigned to them.
  2. Access - Do not attempt to access-restricted portions of the operating system or other software. Accessing University computers without proper authorization is a violation of UD rules of conduct.  
  3. Use - Use UD’s computing facilities and services for university-related work. Resources may not be utilized for commercial use, product advertisement or any other form of revenue-generating activities unrelated to UD. Users may not participate in computing activities that place an undue burden on UD computer or network resources.
  4. Value - Treat computing resources and electronic information as the valuable university resources that they are. Set an appropriate password and change it regularly. Do not destroy or damage any computing equipment, networks or software.
  5. Viruses - Do not willfully introduce computer viruses or other malware into the UD computing environment or into other computing environments via UD’s network. 
  6. Privacy - Respect the privacy and personal rights of others. Do not access or copy another user’s electronic mail, data, programs or other files without permission. Do not use a computer logged in as anyone other than yourself.
  7. Civility - Use appropriate standards of civility when using computing systems to communicate with other individuals. When sending personal messages to other users, always identify you as the sender. Using UD’s computing resources to harass other individuals is explicitly prohibited.
  8. Copyright - Abide by all applicable copyright laws and licenses. Both university policies and the law expressly forbid the copying and/or sharing of software or data that has not been placed in the public domain or distributed as “freeware” or “shareware.”  Several students each month are found sharing copyrighted files such as mp3 files, movies, TV shows and software such as games and office suites from our network. Appropriate action may be taken by UD.
  9. Peer-to-Peer File Sharing – Unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may result in criminal and civil penalties as well as disciplinary action under the Code of Conduct.  Annually students will receive notice from the University informing student that unauthorized distribution of copyrighted material, including peer-to-peer file sharing may subject them to civil and criminal liabilities, summarizing the penalties for violation of Federal copyright laws and describing the University’s policies including disciplinary action that may be taken against student who engage in unauthorized distribution of copyrighted materials using the University’s information technology systems.
  10. Laws - Abide by all local, state, and federal laws. 

Recourse

The appropriate computing department may revoke user privileges of anyone who has abused the computing resources, has gained unauthorized access to computing resources or has otherwise violated these policies. If further actions are deemed appropriate, officials of the University of Dallas and of local, state and federal agencies may be notified. 

Student Network Classifications

  1. In an effort to maintain a high level of network availability and usability, the Information Technology Department has broken down the student network usage into three categories. It is our intention to make the network bandwidth available for these types of activities in the following order of importance.
  2. Educational Usage - shall be viewed as any activity directly related to students studies at the University. This includes the ability to search the Internet and browse web pages via the standard HTTP protocol. In addition to this, the HTTPS protocol used for viewing secure web pages will also be available.
  3. Communications Usage - shall be viewed as any activity directly related to students communication with others either on the UD network or on an outside network using computers, tablets, phones, and other devices that connect to our wired or wireless infrastructure.
  4. Entertainment Usage - shall be viewed as any activity that does not fall under the first two categories.  IT understands the need for an outlet from the stresses of college life and we know that for many students online gaming and other entertainment is that outlet. With that in mind, IT allows online games that do not have any adverse effects on the networks integrity or bandwidth and that do not interfere or cause reduced performance for those students utilizing the network for educational and communications purposes. 

 

News

Prestigious Physics Fellowship Supports Alumna's Research

In a mountain range in Italy, Sophia Andaloro, BS '19, investigates dark matter. One of the 2019 Cardinal Spellman recipients at UD, Andaloro received both the 2020 NSF Graduate Fellowship and the Department of Energy National Nuclear Security Administration Stewardship Science Graduate Fellowship (DOE NNSA SSGF) this past year, her first year in graduate school at Rice University. She is one of five graduate students who will join the NNSA program this fall.

+ Read More

How Do You Build the Perfect Sandcastle?

According to a team of University of Dallas juniors, there's an optimal water-to-sand ratio, roughly 6%, along with a borrowed methodology that's endured the test of time dating back to the relics of the Old Kingdom. The students' research, titled "The Best Sandcastles Are Egyptian: Pyramids Reign Supreme," was awarded a Meritorious designation in the International Mathematical Contest in Modeling (MCM) -- a first in university history.

+ Read More

Alumnus Named Among 2020 Most Influential Black Executives in Corporate America

Savoy, the leading African American business and lifestyle magazine, recently dubbed University of Dallas alumnus and Gupta College of Business Hall of Fame recipient Irvin Ashford Jr., MBA '00, among its 2020 list of elite Black executives. The listing garnered Ashford industry recognition along with the likes of Robert Smith, billionaire founder of Vista Equity Partners, out of more than 500 prospective candidates.

+ Read More