Davis Student Handbook 2021-22

7. Firewall and Content Filtering: Word of Life uses a filtering and firewall system to prohibit access to content that does not fit the biblical standard of being “true, honest, just, pure, lovely, and of good report” (Philippians

4:8). All activity is logged and monitored by the Student Life Department. 8. Objectionable content: This includes but is not limited to the following:

a. Pornography. So-called “adult content” depicting or describing sexual acts, erotic material, nudity, etc. b. Violence. Graphic depiction of violent acts including murder, rape, torture, and/or serious injury. c. Drug use. Material encouraging the use of recreational drugs including tobacco and alcohol advertising. d. Gambling. Online gambling and gaming services. e. Offensive language and tasteless subjects. Crude, vulgar language or gestures. Such material includes tasteless humor (e.g., excretory functions), graphic medical photos outside of a medical context, and some forms of body mutilation such as cutting or branding. f. Crime. Encouragement of tools for, or advice on, carrying out criminal acts. This includes lock-picking, bomb-making, and hacking information. B. Acceptable Use All users of Word of Life computer resources are subject to Word of Life IT and Cybersecurity policy. Below is the summary of the most commonly applicable policies. 1. User Accounts: Students are responsible for the use of their own user account. They must take reasonable precautions to safeguard their passwords and are not allowed to share access with other students. If account compromise is suspected, student should contact the Word of Life IT department for assistance: helpdesk@wol.org . 2. Network Access: The use of the Word of Life computer network and apps are provided as a service. Access is granted as a privilege and by IT Department permission only. Misuse, abuse, or active threats of computer resources may result in termination of access without notice. 3. Objectionable Behavior: Access to objectionable content, bullying, threatening or other use of computer resources that go against our code of conduct may result in termination of access to computer resources. 4. Unauthorized Access, Hacking,Unethical Use: Browsing, exploring, or making unauthorized attempts to view data, files, or directories belonging to the Bible Institute or to other users is forbidden. It is also unacceptable to corrupt files, introduce deviant software (worms, viruses, etc.), or interfere with someone else’s legitimate computer use. Possession of a program designed to gain unauthorized access will be deemed to constitute an attempt at breaking computer security and may be subject to disciplinary action and criminal charges. 5. Copywritten Material: Transferring copyrighted materials to or from any system or via the computer network without the express consent of the owner is a violation of Federal and State laws. Examples of illegal copying include: a. Making a personal copy of software licensed to the school. b. Copying files created by another person without obtaining that person’s permission. c. Installing software on a computer without first obtaining a license for that software. 4. Network Protocols: Certain network protocols may be deemed by the IT department to be a risk to the security and operation of the network or user experience may be restricted. a. “Bursty” network protocols such as NetBEUI or AppleTalk are not permitted and are restricted on the network. These are unnecessary for operation on the Word of Life network and simply degrade performance for all other users.

b. The use of “Torrent” style file sharing tools are not permitted on our network. c. Other network protocols or network ports may be restricted without notice.

5. Internet/Network Connections: Your computer should not be set up as a server that will in any way interfere with the normal operation of our network. This includes DHCP servers, DNS servers, wireless access points, routers, VPN gateways, etc. 6. Active Protection: In order to be responsive to changes computer system, vulnerabilities, and active threats, the IT department reserves the right to block access to any technology resource, remove software, or confiscate equipment without notice.

S E R V I C E S A V A I L A B L E

40

Made with FlippingBook - Online Brochure Maker