Hodges Student Handbook

Responsibilities Access to technology resources owned or operated by Hodges University imposes certain responsibilities and obligations and is granted subject to these University policies and local, state, and federal laws. Appropriate use should always be legal, ethical, reflect academic honesty, reflect University standards and show restraint in the consumption of shared resources. It should demonstrate respect for intellectual property; ownership of data; system security mechanisms and individual rights to privacy and freedom from intimidation, harassment and unwarranted annoyance. Appropriate use of University resources includes instruction; independent study; authorized research; independent research; communications; and official work of the offices, units, recognized student and campus organizations, and agencies of the University. Copyright Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against members of the academic community. Violation If there is reason to believe that an e-mail account is being used in a violation of law or University policy, or if an account is used in a way that threatens to disrupt service to other users, the Office of Information Technology may restrict, suspend or disable that account’s access to email services, until the University is assured that the illegal or disruptive use of the account will cease. Penalties for violation range may result in disciplinary action up to and including dismissal from the University. Depending on the circumstances, the University may also pursue legal action.

Privacy University officials reserve the right to access and examine the files and/or actual network activity of any user to investigate violations or suspected violations of security and/or policies. For this reason, users must regard themselves as having no expectation of privacy with regard to their file, electronic activities, data or communications. Risk and Liability There is no guarantee that e-mail is authentic. It is therefore prudent to be skeptical of the “From:” addresses that appear in messages. Mail from off-campus sites can be very easily “spoofed”, i.e. the message is sent in such a way that it appears to be from a different sender than it truly is. Anyone who has doubts about the identity of the sender of any message should communicate with the purported sender by some other means to confirm the source and content of the message. It is the user’s responsibility to employ appropriate risk mitigation techniques and to be aware of current threats such as phishing, spam, viruses, etc. Any suspicious emails should be sent/reported to huav@hodges.edu or by submitting an IT Help Desk ticket for further investigation and resolution of activity. Hodges University assumes no liability for any damages that are incurred while using University email services.

47 

Hodges University Student Handbook

Made with FlippingBook Ebook Creator