West Virginia University at Parkersburg’s computer and information network is a continually growing and changing resource that supports thousands of users and systems. These resources are vital for the fulfillment of the academic, research and business needs of the WVU at Parkersburg community. In order to ensure a reasonable and dependable level of service, it is essential that each individual faculty member, staff member, and student exercise responsible, ethical behavior when using these resources. Misuse by even a few individuals has the potential to disrupt college business, and, even worse, the legitimate academic and research work of faculty and students.
Appropriate Use of Resources
Conducting college business, instruction, study assignments, research, communications, and official work of campus organizations are appropriate uses of WVU at Parkersburg’s computer resources. Access to computer resources is a privilege. It requires individual computer users to act responsibly, conserve computer resources, and consider the rights and privacy of others. The resources are the property of West Virginia University at Parkersburg. All users are expected to utilize college resources in a responsible manner consistent with Board of Governors Policy E-57 and operational guidelines that the Chief Information Officer may issue from time to time.
Users should be aware that they may be subject to the laws of other states and countries when they engage in electronic communications with persons in such other states or countries or on other systems or networks. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses. Additionally, users of WVU at Parkersburg computer resources must comply with all federal, West Virginia, and other applicable law and other college policies. The following uses of college computer resources are prohibited:
a. Creating, modifying, executing or retransmitting any computer program or instructions intended to obscure the true identity of the sender of electronic mail or electronic messages, such as the forgery of electronic mail or the alteration of system or user data used to identify the sender of electronic e-mail; bypass, subvert, or otherwise render ineffective the security or access control measures on any network or computer system without the permission of the owner; or examine or collect data from the network (e.g., a "network sniffer" program).
b. Authorizing another person or organization to use college computer accounts or WVU at Parkersburg network resources. Users are responsible for all of their accounts. Users must take all reasonable precautions, including password maintenance and file protection measures, to prevent use of their accounts by unauthorized persons. Users must not share their passwords with anyone else or provide access to the WVU at Parkersburg network resources to unauthorized persons.
c. Communicating or using any password, personal identification number, credit card number or other personal or financial information without the permission of its owner.
a. Use of college resources to gain unauthorized access to resources of this or other institutions, organizations, or individuals.
b. Use of false or misleading information for the purpose of obtaining access to unauthorized resources.
c. Accessing, altering, copying, moving, or removing information, proprietary software or other files (including programs, libraries, data and electronic mail) from any network system or files of other users without prior authorization (e.g., use of a "network sniffer" program)
d. Making unauthorized copies of copyrighted materials. Users should assume all software, graphic images, music, and the like are copyrighted. Copying or downloading copyrighted materials without the authorization of the copyright owner is against the law, and may result in civil and criminal penalties, including fines and imprisonment.
a. Use of any resource irresponsibly or in a manner that adversely affects the work of others, such as:
· Hacking - attempting to obtain or use, passwords, IP addresses or other network codes that have not been assigned to you or authorized for use as college employees, attempting to obtain unauthorized access to computer accounts, software, files, or any other college computer resources.
· Malicious Activity - intentionally, recklessly or negligently damaging any system (e.g., by the introduction of any so-called "virus", "worm", or "trojan-horse" program); damaging or violating the privacy of information not belonging to the user; or misusing or allowing misuse of system resources.
b. Use of college resources for non-college related activities that unduly increase network load (e.g., chain mail, network games and spamming).
c. Any other activity not specifically cited above that may be illegal, harmful, destructive, damaging, or inappropriate use of college computer resources.
a. Using college resources for one's own commercial gain, or for other commercial purposes not officially approved by the college, including web ads.
b. Using college resources to operate or support a non-college related business.
c. Use of college resources in a manner inconsistent with the college’s contractual obligations to suppliers of those resources or with any published college policy.
5. Violation of city, state or federal laws, including but not limited to the following:
Access to information stored on the college’s computers and network equipment is controlled by assignment of accounts and passwords. These accounts and passwords are controlled by the Chief Information Officer and/or the Network Administrator. This security information is the property of WVU at Parkersburg.
All college employees have an obligation to report security breach information to the Office of the Chief Information Officer. Failure to do so may result in disciplinary action. Any attempt to access, copy or modify this security information or to obtain system privileges to which employees are not entitled or any action which interferes with the supervisory or accounting functions of the systems or that is likely to have such effects will result in appropriate disciplinary action.
college reserves the right to monitor computer and network use for operational
needs and to ensure compliance with applicable laws and college policies. WVU at
Chief Information Officer is authorized to disconnect a user's access if the
user appears to represent
s a serious threat to system or email
integrity. Violators are subject to disciplinary
action as dictated by college policy. Users should also be aware that offenders
may be subject to prosecution under laws including, but not limited to, the Privacy
Act of 1974, The Computer Fraud and Abuse Act of 1986, National Stolen Property
West Virginia Computer Crime and Abuse Act, and the Electronic
Communications Privacy Act. The
President as well as the Chief Information Officer, Director of Human
Resources, and/or the Vice President for Student Services will be notified of
Suspected violations of policy or related statute should be reported to the Chief Information Officer by e-mail or by calling 424-8296. In reporting a violation, complainants should cite the specific violation of Policy E-57 or these guidelines.
The Chief Information Officer is the policy administrator for computer resources at WVU Parkersburg and will ensure compliance with these guidelines. Additionally, deans, directors and department heads are responsible for compliance with college policy within their respective administrative areas.