Bryant University. The Character of Success

Technology Resources Acceptable Use Policy

Information Services, including systems software and data plays an increasingly important role in education, research, and administration at Bryant University. This policy is designed to define the appropriate and responsible use of the campus computing and networking facilities. It is the intent of this policy to allow the greatest access of campus computing resources consistent with generally accepted principles of ethics that govern the Bryant University academic community. Bryant University seeks to provide access to its Information Services to staff, faculty, and students within institutional priorities and financial capabilities.

Access to Bryant University-owned computer facilities, equipment, hardware, software, printing facilities and services, and Information Services staff-provided user support is a privilege, not a right. This privilege is extended to all faculty, staff, and students. Accepting access to this technology carries an expectation of responsible and acceptable use. This policy applies to any one at Bryant University who utilizes any University information resource.

All members of the Bryant University community who use the University computing, information, and communication resources must act responsibly. Every user is responsible for the integrity of these resources under their control. All users of University-owned or University-leased Information Services systems must respect the rights of other users, respect the integrity of the physical facilities and controls, and comply with all licenses and contractual agreements.

Bryant University reserves the rights to extend, limit, restrict, or deny privileges and access to its information resources. University facilities and accounts are to be used for the activities or purposes for which they are assigned. University computing resources are not to be used for commercial purposes without written authorization from the University.


Users recognize that systems and networks are imperfect and waive any responsibility for lost work or time that may arise from their use. The staff of Bryant University Information Services cannot compensate users for degradation or loss of personal data, software, or hardware as a result of their use of University-owned systems or networks, or as a result of assistance they may seek from Information Services staff. University-owned electronic devices are intended for business use. Information Services is not responsible for the backup, transfer, migration or recovery of personal data (pictures, images, videos, sound files, etc.) stored on University-owned electronic devices.

Copyright Law

The Copyright Law of the United States (Title 17 U.S. Code) governs the making of copies of copyrighted material. UNAUTHORIZED COPYING IS PROHIBITED! The person using this equipment is liable for any infringement and can be prosecuted or held liable for monetary damages.

Criminal Statutes

Electronics Communications Privacy Act (18 USC sec. 2510) prohibits unauthorized access to computer systems affecting interstate commerce; the exceptions to this rule permit access by employees of a communications service in certain circumstances, or where consent has been given. Under the Computer Fraud and Abuse Act of 1986 (18 USC sec. 1030), it is a crime to access computers used by the federal government or by financial institutions without authorization. Under Rhode Island law, stealing electronically processed or stored data may constitute the crime of larceny.

The following types of information or software cannot be placed on University-owned or University-leased computer system:

  1. The use of unauthorized (pirated) copies of software, destructive software, pornographic material, or libelous material on Bryant University computers and unauthorized duplication of software is prohibited.
  2. Files, user names, and computer output are to be considered personal property. Users should not examine or use someone else's user name without explicit permission from the owner. Attempts to circumvent the protective mechanisms in the computer system or network will be considered violations of the right to privacy.
  3. There will be no harassment towards others by sending annoying, threatening, libelous, racially, sexually, or religiously offensive material.
  4. Materials that infringe upon the rights of another person.
  5. That which is abusive, profane, or sexually offensive.
  6. Users shall not deliberately attempt to degrade system performance or capability. Loopholes in the system or knowledge of special passwords will not be used to damage the system, take resources from another user, or violate privacy. The introduction of any disruptive program is a most serious offense, and any violation will be vigorously pursued.
  7. Users shall not misuse the scanner or other document production equipment. In particular, it is a violation of state law to falsify or alter grade transcript reports.
  8. University rules concerning dishonesty and plagiarism apply to use of the computer.
  9. Users are not permitted to print multiple copies of copyrighted documents.


Bryant's computing resources (systems and networks) are used for a variety of purposes, from the academic to the administrative. In the University setting, a natural tension arises between protecting the privacy of information and the sharing of information and ideas. Moreover, because the computing systems and networks are shared resources, their misuse can affect other users, thus creating additional tension between the desire for individual privacy and the need for overall security and resource availability. Also given the current limitations for ensuring complete security of data, the University cannot guarantee absolute privacy of the information stored on computers and in particular on network accessible computers.

Information stored on a computer system or sent electronically over a network is the property of the individual who created it. All users of the campus network shall have anti-virus protection software active and updated in order to protect themselves and other network users. Examination, collection, or dissemination of information without authorization of the owner is a violation of the owner's right to control his or her own property. System administrators, however, may gain access to user data when it is necessary to maintain or prevent damage to the systems or to ensure compliance with other University rules.

You are expected to obey all applicable local, state, or federal laws regarding computer and network use, as well as network guidelines for computing and network facilities use external to Bryant University. You are expected to exercise responsible ethical behavior when using the University's computing and network facilities. This includes but is not limited to the following:

  1. You must use only those computer accounts that have been authorized for your use by the University. The unauthorized use of another person's account, as well as the providing of false or misleading information for the purpose of obtaining access to computing or network facilities, is prohibited and may be regarded as a criminal act and treated accordingly by the University.
  2. You are responsible for all usage on your accounts. You must take all reasonable precautions in safeguarding your Network ID, password, and file protection measures. User ID's and passwords should never be written down or shared with others. Change your password every 90 days. Use a minimum of 8 characters. Incorporate upper case, lower case, numbers and special symbols when creating a password.
  3. You must use your account only for the purposes for which they were authorized.
  4. You must not use the system or network irresponsibly or needlessly affect the work of others on the Bryant University network or on the Internet.
  5. You may not engage in any action that may be harmful to University computers, the network, or the data stored or transported by them, or other computers connected to them. This includes but is not limited to propagating viruses, removing or modifying system files, copying password files, attempting to decipher or record other users' passwords, or wasting resources such as disk space, CPU time, paper, or disrupting services.
  6. Because you are utilizing a service that connects you to the Internet through Bryant University, you must adhere to the rules and regulations of the University, which can be found in the Student Handbook and mentioned in this policy. These rules and regulations apply to areas on the Internet including but not limited to: chat rooms, news groups, and other Web addresses you may have.

Failure to comply with the above guidelines, or the unauthorized or illegitimate use of Bryant University's computing or network facilities or resources, shall constitute a violation of University policy and will subject the violator to disciplinary or legal action by the University.


The University provides wireless access for students, faculty, staff and guests. Wireless access is available for mobile computing devices such as laptops, smart phones and PDAs. Prior registration and end-point security validation through the University's Network Access Control unit is necessary in order to access the network.

Network Operations owns and is responsible for the university network (wired and wireless) and telecommunications infrastructure and shall manage developments and enhancements to this infrastructure. Network Operations shall maintain the network address and name space for the university and provide a central service for allocation of these resources. All hardware and software configured to extend or re-transmit the University network and telecommunications infrastructure, including all wireless technologies, must be approved by Network Operations prior to acquisition and deployment. All systems, devices, and software capable of extending this infrastructure must adhere to configuration standards developed and maintained by Network Operations.

In order to prevent problems caused by radio interference, to ensure the integrity of University resources, and to ensure the widest availability of reliable wireless networking services, the University shall remain the sole owner of all unlicensed spectrums of radio frequencies available for use on campus or any related properties. Network Operations will provide support for infrastructure mode installations only. Ad hoc wireless mode will not be supported.

The University does not support the use of personal wireless printers on the campus network. Wireless printers do not support the end-point security validation method used by the campus network. In addition, wireless printers use significant bandwidth and pose security risks that could potentially degrade the experience for the entire wireless community.

Personal Web Pages

Any authorized user at Bryant University may have a personal home page on the Bryant University World Wide Web Server. The contents of any user's home page can be of the users own creation or choosing, provided that graphical images, multimedia information, text, or the intent of the home page does not refute the mission of Bryant University. Typically, users will display personal information, including interests, hobbies, links to other web sites, and resume-type biographical information. Student organizations are also welcome to submit home page information on the University website.

Any person wishing to publish Web documents on the Bryant University Web server must agree to the following:

  1. An individual must be responsible for the content, accuracy, and maintenance of all information published on the Bryant Web server.
  2. No copyrighted material without the express written permission of the copyright owner will be permitted on the server.
  3. In the event of a complaint, the page may be taken off-line without notice until the issue is resolved.
  4. Sales transactions of all kinds and storage of large quantities of sound and video files are not permitted on the server.

Electronic Mail Services

Bryant University's electronic mail services are University facilities and are intended for teaching, learning, research, and administration in support of Bryant University's mission.

E-mail is considered an official means for communication within Bryant University. E-mail users are required to comply with state and federal law, University policies, and normal standards of professional and personal courtesy and conduct. Access to University e-mail services is a privilege that may be wholly or partially restricted by the University without prior notice and without the consent of the e-mail user: a) when required by and consistent with applicable law or policy; b) when there is a reasonable suspicion that violations of policy or law have occurred or may occur; or c) when required to meet time-dependent, critical operational needs. Such access restrictions are subject to the approval of the appropriate University supervisory or management authority (e.g., department heads, systems managers, etc.).

All use of e-mail, including use for sensitive or confidential information, will be consistent with the University policy. Confidentiality regarding student records is protected under the Family Educational Rights and Privacy Act of 1974 (FERPA). All use of e-mail, including use for sensitive or confidential information, will be consistent with FERPA.

On termination, resignation, or graduation, the individual's e-mail account will be disabled and all information retained for a period of ninety days before deleted.

In the event of a compromised e-mail account, the account will be disabled and the password credential changed. The appropriate user support service (Help Desk or Laptop Central) will be notified of the situation and in turn will inform the account owner. Should the account be exploited for spamming purposes, appropriate measures will be taken to mitigate the damage to the domain name. Outbound mail leaving the Bryant domain from the account may be restricted for up to 72-hours or until all offending e-mail is purged from the system.

Restrictions Using Electronic Mail Services:

  1. Persons given access to Bryant University's e-mail system are expected to be familiar with and abide by the policies stated in the Bryant University Employee Handbook and the policies in this document.
  2. Bryant University e-mail services may not be used for personal business or personal gain except as permitted by other University policies.
  3. It is a violation of this policy to use e-mail to libel, threaten, or harass other individuals.
  4. Unsolicited email messages to multiple users are prohibited unless explicitly approved by the appropriate University authority.
  5. All messages must show the genuine sender information (i.e., from where and from whom the message originated). Users are not allowed to impersonate other users or user groups, real or fabricated, by modifying email header information in an effort to deceive the recipient(s); e.g., e-mail spoofing is specifically prohibited.

Offensive Material - Use of University owned or provided equipment for viewing, accessing, or transmitting offensive material is strictly forbidden. This applies to any screen display or printing of images, sounds, or messages that could reasonably be considered unlawful, threatening, abusive, libelous, defamatory, obscene, pornographic, profane, or otherwise objectionable. Any attempt, whether by student, employee, or guest of the University, to access, view, or transmit such material using University-owned equipment or network resources will result in disciplinary action and possible loss of network privileges.

Users of campus communications are subject to all applicable local, state, and federal laws and regulations, and Bryant University policies and procedures.

  Approved By: Information Services
  © 2006 Bryant University |  
  1150 Douglas Pike, Smithfield, RI 02917 | 401-232-6000  
  blank space