Beruflich Dokumente
Kultur Dokumente
1.0 Overview
Arcadia University’s intention for publishing an Acceptable Use Policy is not to impose
restrictions that are contrary to Arcadia University established culture of openness, trust
and integrity. Arcadia University is committed to protecting its employees, students and
the University from illegal or damaging actions by individuals, either knowingly or
unknowingly.
Effective security is a team effort involving the participation and support of every
Arcadia employee, student, and affiliate who deals with information and/or information
systems. It is the responsibility of every computer user to know these guidelines, and to
conduct their activities accordingly.
2.0 Purpose
The purpose of this policy is to outline the acceptable use of computer equipment at
Arcadia University. These rules are in place to protect the employee, student, and
Arcadia University. Inappropriate use exposes Arcadia University to risks including virus
attacks, compromise of network systems and services, and legal issues.
3.0 Scope
4.0 Policy
• Keep passwords secure and do not share accounts. You’re responsible for the
security of your passwords and must be changed every 5 months.
• Executing any form of network monitoring which will intercept data not
intended for the employee's host, unless this activity is a part of the
employee's normal job/duty.
• Solicitation of email for any other email address, other than that of the poster's
account, with the intent to harass or to collect replies.
• Accessing inappropriate web sites, data, pictures, jokes, files, and games
• Child pornography
Child pornography is defined by law as the visual depiction of a person under
the age of 18 engaged in sexually explicit conduct. This means that any image
of a child engaged in sexually explicit conduct is illegal contraband. Notably,
the legal definition of sexually explicit conduct does not require that an image
depict a child engaging in sexual activity. A picture of a naked child may
constitute illegal child pornography if it is sufficiently sexually suggestive. In
addition, for purposes of the child pornography statutes, federal law considers
a person under the age of 18 to be a child. It is irrelevant that the age of
consent for sexual activity in a given state might be lower than 18. A visual
depiction for purposes of the federal child pornography laws includes a
photograph or videotape, including undeveloped film or videotape, as well as
data stored electronically which can be converted into a visual image. For
example, images of children engaged in sexually explicit conduct stored on a
computer disk are considered visual depictions.
Please see the US Department of Justice Child Exploitation and Obscenity
website for more information.
• Copyright infringement
Copyright infringement (or copyright violation) is the unauthorized use of
material that is protected by intellectual property rights law particularly the
copyright in a manner that violates one of the original copyright owner's
exclusive rights, such as the right to reproduce or perform the copyrighted
work, or to make derivative works that built upon to it.
Sound recording and piracy another form of copyright infringement is the
unauthorized duplication and distribution of sound recordings. See Copyright
infringement law for more information.
• Software piracy
Software piracy is the illegal reproduction and distribution of software
applications whether for business or personal use.
5.0 Enforcement
Any employee found to have violated this policy may be subject to disciplinary action
such as removal of user’s account and network privileges, or termination of employment.
Intranet: private computer network that uses Internet protocols to securely share part of
an organization's information or operations with its employees
Extranet: part of a company's intranet that is extended to users outside the company
Worms: computer program. It uses a network to send copies of itself to other systems
with the intent to harm the network.
Email bombs: sending huge volumes of e-mail to an address in an attempt to overflow the
mailbox or overwhelm the server.
Any questions regarding this policy should be directed to the VP for Information
Technology & CIO.