Possession of a program designed to gain unauthorized access will be deemed to constitute an attempt at breaking computer security and may be subject to disciplinary action and criminal charges. 5. Copywritten material: Transferring copyrighted materials to or from any system or via the computer network without the express consent of the owner is a violation of Federal and State laws. Examples of illegal copying include: a. Making a personal copy of software licensed to the school. b. Copying files created by another person without obtaining that person’s permission. c. Installing software on a computer without first obtaining a license for that software. 6. Network Protocols: Certain network protocols may be deemed by the IT department to be a risk to the security and operation of the network or user experience may be restricted. a. If your device is found to be interfering with the Word of Life Wi-Fi network, Word of Life IT will block it from the network and/or confiscate the device until the problem is mitigated. b. If your computer is found to be plugged into our secure data network we will confiscate it until the problem is mitigated. 7. Internet/Network connections: Your computer should not be set up as a server that will in any way interfere with the normal operation of our network. This includes DHCP servers, DNS servers, wireless access points, routers, VPN gateways, etc. 8. Active protection: In order to be responsive to changes computer system, vulnerabilities, and active threats, the IT department reserves the right to block access to any technology resource, remove software, or confiscate equipment without notice. 9. Policy change: The IT department reserves the right to update or change this policy at any time without notice. Effort will be made to notify students of changes. C. Word of Life Computer Equipment Policy Students are expected to treat Word of Life equipment with appropriate care. 1. The Word of Life network, wireless, computer equipment, printer, copier, security, and mobile devices installed on campus is essential to providing you with service. These devices must not be moved, touched, or tampered with in any way without direction from the Word of Life IT Department. If there are problems, or something is not working, please submit help desk request to helpdesk@wol.org 2. Word of Life owned device repairs, modifications, or recabling must be done by Word of Life IT staff. Students are not allowed to open Word of Life device cases nor to add or remove components, change configurations, and wiring without permission. c. The use of “Torrent” style file sharing tools are not permitted on our network. d. Other network protocols or network ports may be restricted without notice. 3. Adding any equipment to the network any type without permission from the Word of Life IT Department is prohibited. This includes but is not limited to personal computers, mobile devices, switches, routers, wireless access points, VPN gateways, IoT devices (cameras, voice activated AI devices, controllers), gaming consoles, etc. All such attachments must align with Word of Life IT and Cybersecurity Policies. Unauthorized devices may be confiscated, and access may be terminated without notice. 4. All Word of Life owned computer monitors used by students must face the public and must be in clear view of supervisors.
- 27 -
Revised August 2024
Made with FlippingBook - Online Brochure Maker