f. Crime. Encouragement of tools for, or advice on, carrying out criminal acts. This includes lock-picking, bomb-making, and hacking information.
B. Acceptable Use All users of Word of Life computer resources are subject to Word of Life IT and Cybersecurity policy. Below is the summary of the most commonly applicable policies. 1. User Accounts: Students are responsible for the use of their own user account. They must take reasonable precautions to safeguard their passwords and are not allowed to share access with other students. If account compromise is suspected, student should contact the Word of Life IT department for assistance: helpdesk@wol.org . 2. Network Access: The use of the Word of Life computer network and apps are provided as a service. Access is granted as a privilege and by IT Department permission only. Misuse, abuse, or active threats of computer resources may result in termination of access without notice. 3. Objectionable Behavior: Access to objectionable content, bullying, threatening or other use of computer resources that go against our code of conduct may result in termination of access to computer resources. 4. Unauthorized Access, Hacking,Unethical Use: Browsing, exploring, or making unauthorized attempts to view data, files, or directories belonging to the Bible Institute or to other users is forbidden. It is also unacceptable to corrupt files, introduce deviant software (worms, viruses, etc.), or interfere with someone else’s legitimate computer use. Possession of a program designed to gain unauthorized access will be deemed to constitute an attempt at breaking computer security and may be subject to disciplinary action and criminal charges. 5. Copywritten Material: Transferring copyrighted materials to or from any system or via the computer network without the express consent of the owner is a violation of Federal and State laws. Examples of illegal copying include: a. Making a personal copy of software licensed to the school. b. Copying files created by another person without obtaining that person’s permission. c. Installing software on a computer without first obtaining a license for that software. 6. Network Protocols: Certain network protocols may be deemed by the IT department to be a risk to the security and operation of the network or user experience may be restricted. a. “Bursty” network protocols such as NetBEUI or AppleTalk are not permitted and are restricted on the network. These are unnecessary for operation on the Word of Life network and simply degrade performance for all other users.
b. The use of “Torrent” style file sharing tools are not permitted on our network. c. Other network protocols or network ports may be restricted without notice.
7. Internet/Network Connections: Your computer should not be set up as a server that will in any way interfere with the normal operation of our network. This includes DHCP servers, DNS servers, wireless access points, routers, VPN gateways, etc. 8. Active Protection: In order to be responsive to changes computer system, vulnerabilities, and active threats, the IT department reserves the right to block access to any technology resource, remove software, or confiscate equipment without notice. 9. Policy Change: The IT department reserves the right to update or change this policy at any time without notice. Effort will be made to notify students of changes.
C. Word of Life Computer Equipment Policy Students are expected to treat Word of Life equipment with appropriate care.
1. The Word of Life network, wireless, computer equipment, printer, copier, security, and mobile devices installed on campus is essential to providing you with service. These devices must not be moved, touched, or tampered with in any way without direction from the Word of Life IT Department. If there are problems, or something is not working, please submit help desk request to helpdesk@wol.org 2. Word of Life owned device repairs, modifications, or recabling must be done by Word of Life IT staff. Students are not allowed to open Word of Life device cases nor to add or remove components, change
SERVICES AVAILABLE
41
Made with FlippingBook - Online Brochure Maker