XII. COMPUTER USAGE POLICIES Word of Life Bible Institute provides students with access to network and computing resources as an integral part of the educational environment. Students using these resources should do so responsibly in ways that are consistent with the school’s mission and objectives. Word of Life Bible Institute reserves the right to mandate and enforce appropriate regulations to that end. Enforcement of these regulations may involve the monitoring of stored files and electronic transmissions such as email and website accesses. Use of Word of Life’s network and computer equipment constitutes agreement with these regulations and monitoring activities. A. Definitions For the sake of objectivity, the following definitions and descriptions will be considered the standard by which acceptable computer use will be judged: 1. Word of Life Computer Network: This is a network of computers tied together for several purposes including emailing, sharing information, fulfilling academic coursework requirements, Internet access, etc. This network can be accessed by faculty, staff, and students when authorization is granted. 2. Word of Life Intranet: The intranet is a resource that gives much information about the Bible Institute, including daily scheduling, meal menus, class notes, etc. It is a valuable tool for keeping up to date on the happenings around the Bible Institute. 3. Privacy: Each student’s account is as confidential as the student mandates through his or her usage practices. Since Word of Life owns the network equipment, Word of Life reserves the right to examine any and all information accessed by the student. This includes emails, anything saved on any hard drive, internet sites visited, etc. 4. Firewall and Content Filtering: Word of Life uses a filtering and firewall system to prohibit access to content that does not fit the biblical standard of being “true, honest, just, pure, lovely, and of good report” (Philippians
4:8). All activity is logged and monitored by the Student Life Department. 5. Objectionable content: This includes but is not limited to the following:
a. Pornography. So-called “adult content” depicting or describing sexual acts, erotic material, nudity, etc. b. Violence. Graphic depiction of violent acts including murder, rape, torture, and/or serious injury. c. Drug use. Material encouraging the use of recreational drugs including tobacco and alcohol advertising. d. Gambling. Online gambling and gaming services. e. Offensive language and tasteless subjects. Crude, vulgar language or gestures. Such material includes tasteless humor (e.g., excretory functions), graphic medical photos outside of a medical context, and some forms of body mutilation such as cutting or branding. f. Crime. Encouragement of tools for, or advice on, carrying out criminal acts. This includes lock-picking, bomb-making, and hacking information. B. General Policy 1. Students are responsible for the use of their own network account. They must take reasonable precautions to safeguard their passwords and are not allowed to share access with other students. 2. Transferring copyrighted materials to or from any system or via the Bible Institute network without the express consent of the owner is a violation of Federal and State laws. Examples of illegal copying include: a. Making a personal copy of software licensed to the school.
b. Copying files created by another person without obtaining that person’s permission. c. Installing software on a computer without first obtaining a license for that software.
4. Browsing, exploring, or making unauthorized attempts to view data, files, or directories belonging to the Bible Institute or to other users is forbidden. It is also unacceptable to corrupt files, introduce deviant software (worms, viruses, etc.), or interfere with someone else’s legitimate computer use. Possession of a program designed to gain unauthorized access will be deemed to constitute an attempt at breaking computer security. 5. Your computer should not be set up as a server that will in any way interfere with the normal operation of our network. This includes dhcp servers, dns servers, etc.
S T U D E N T L I F E
40
Made with FlippingBook - Online Brochure Maker