Information Services, including systems software and data plays an increasingly
important role in education, research, and administration at Bryant University.
This policy is designed to define the appropriate and responsible use of the campus
computing and networking facilities. It is the intent of this policy to allow the
greatest access of campus computing resources consistent with generally accepted
principles of ethics that govern the Bryant University academic community. Bryant
University seeks to provide access to its Information Services to staff, faculty,
and students within institutional priorities and financial capabilities.
Access to Bryant University-owned computer facilities, equipment, hardware, software,
printing facilities and services, and Information Services staff-provided user support
is a privilege, not a right. This privilege is extended to all faculty, staff, and
students. Accepting access to this technology carries an expectation of responsible
and acceptable use. This policy applies to any one at Bryant University who utilizes
any University information resource.
All members of the Bryant University community who use the University computing,
information, and communication resources must act responsibly. Every user is responsible
for the integrity of these resources under their control. All users of University-owned
or University-leased Information Services systems must respect the rights of other users,
respect the integrity of the physical facilities and controls, and comply with all licenses
and contractual agreements.
Bryant University reserves the rights to extend, limit, restrict, or deny privileges
and access to its information resources. University facilities and accounts are to be
used for the activities or purposes for which they are assigned. University computing
resources are not to be used for commercial purposes without written authorization from the University.
Users recognize that systems and networks are imperfect and waive any responsibility
for lost work or time that may arise from their use. The staff of Bryant University
Information Services cannot compensate users for degradation or loss of personal data,
software, or hardware as a result of their use of University-owned systems or networks,
or as a result of assistance they may seek from Information Services staff.
University-owned electronic devices are intended for business use.
Information Services is not responsible for the backup, transfer, migration or
recovery of personal data (pictures, images, videos, sound files, etc.) stored on
University-owned electronic devices.
The Copyright Law of the United States (Title 17 U.S. Code) governs the making of copies
of copyrighted material. UNAUTHORIZED COPYING IS PROHIBITED! The person using this equipment
is liable for any infringement and can be prosecuted or held liable for monetary damages.
Electronics Communications Privacy Act (18 USC sec. 2510) prohibits unauthorized access to
computer systems affecting interstate commerce; the exceptions to this rule permit access by
employees of a communications service in certain circumstances, or where consent has been given.
Under the Computer Fraud and Abuse Act of 1986 (18 USC sec. 1030), it is a crime to access
computers used by the federal government or by financial institutions without authorization.
Under Rhode Island law, stealing electronically processed or stored data may constitute the crime of larceny.
The following types of information or software cannot be placed on University-owned or
University-leased computer system:
- The use of unauthorized (pirated) copies of software, destructive software, pornographic material,
or libelous material on Bryant University computers and unauthorized duplication of software is prohibited.
- Files, user names, and computer output are to be considered personal property.
Users should not examine or use someone else's user name without explicit permission
from the owner. Attempts to circumvent the protective mechanisms in the computer system
or network will be considered violations of the right to privacy.
- There will be no harassment towards others by sending annoying, threatening, libelous,
racially, sexually, or religiously offensive material.
- Materials that infringe upon the rights of another person.
- That which is abusive, profane, or sexually offensive.
- Users shall not deliberately attempt to degrade system performance or capability.
Loopholes in the system or knowledge of special passwords will not be used to damage
the system, take resources from another user, or violate privacy. The introduction of
any disruptive program is a most serious offense, and any violation will be vigorously pursued.
- Users shall not misuse the scanner or other document production equipment. In
particular, it is a violation of state law to falsify or alter grade transcript reports.
- University rules concerning dishonesty and plagiarism apply to use of the computer.
- Users are not permitted to print multiple copies of copyrighted documents.
Bryant's computing resources (systems and networks) are used for a variety of purposes,
from the academic to the administrative. In the University setting, a natural tension
arises between protecting the privacy of information and the sharing of information and
ideas. Moreover, because the computing systems and networks are shared resources, their
misuse can affect other users, thus creating additional tension between the desire for
individual privacy and the need for overall security and resource availability. Also
given the current limitations for ensuring complete security of data, the University
cannot guarantee absolute privacy of the information stored on computers and in particular
on network accessible computers.
Information stored on a computer system or sent electronically over a network is the
property of the individual who created it. All users of the campus network shall have
anti-virus protection software active and updated in order to protect themselves and
other network users. Examination, collection, or dissemination of information without
authorization of the owner is a violation of the owner's right to control his or her own
property. System administrators, however, may gain access to user data when it is necessary
to maintain or prevent damage to the systems or to ensure compliance with other University rules.
You are expected to obey all applicable local, state, or federal laws regarding computer
and network use, as well as network guidelines for computing and network facilities use
external to Bryant University. You are expected to exercise responsible ethical behavior
when using the University's computing and network facilities. This includes but is not limited to the following:
- You must use only those computer accounts that have been authorized for your use by the University.
The unauthorized use of another person's account, as well as the providing of false or misleading
information for the purpose of obtaining access to computing or network facilities, is prohibited
and may be regarded as a criminal act and treated accordingly by the University.
- You are responsible for all usage on your accounts. You must take all reasonable precautions in
safeguarding your Network ID, password, and file protection measures. User ID's and passwords should
never be written down or shared with others. Change your password every 90 days. Use a minimum of 8 characters.
Incorporate upper case, lower case, numbers and special symbols when creating a password.
- You must use your account only for the purposes for which they were authorized.
- You must not use the system or network irresponsibly or needlessly affect the work of
others on the Bryant University network or on the Internet.
- You may not engage in any action that may be harmful to University computers,
the network, or the data stored or transported by them, or other computers connected to
them. This includes but is not limited to propagating viruses, removing or modifying
system files, copying password files, attempting to decipher or record other users'
passwords, or wasting resources such as disk space, CPU time, paper, or disrupting services.
- Because you are utilizing a service that connects you to the Internet through Bryant
University, you must adhere to the rules and regulations of the University, which can be
found in the Student Handbook and mentioned in this policy. These rules and regulations
apply to areas on the Internet including but not limited to: chat rooms, news groups, and
other Web addresses you may have.
Failure to comply with the above guidelines, or the unauthorized or illegitimate use
of Bryant University's computing or network facilities or resources, shall constitute a
violation of University policy and will subject the violator to disciplinary or
legal action by the University.
The University provides wireless access for students, faculty, staff and guests. Wireless
access is available for mobile computing devices such as laptops, smart phones and PDAs. Prior
registration and end-point security validation through the University's Network Access Control
unit is necessary in order to access the network.
Network Operations owns and is responsible for the university network (wired and wireless) and
telecommunications infrastructure and shall manage developments and enhancements to this infrastructure.
Network Operations shall maintain the network address and name space for the university and provide a
central service for allocation of these resources. All hardware and software configured to extend or
re-transmit the University network and telecommunications infrastructure, including all wireless
technologies, must be approved by Network Operations prior to acquisition and deployment.
All systems, devices, and software capable of extending this infrastructure must adhere to
configuration standards developed and maintained by Network Operations.
In order to prevent problems caused by radio interference, to ensure the integrity of University
resources, and to ensure the widest availability of reliable wireless networking services, the
University shall remain the sole owner of all unlicensed spectrums of radio frequencies available
for use on campus or any related properties. Network Operations will provide support for
infrastructure mode installations only. Ad hoc wireless mode will not be supported.
The University does not support the use of personal wireless printers on the campus network.
Wireless printers do not support the end-point security validation method used by the campus network.
In addition, wireless printers use significant bandwidth and pose security risks that
could potentially degrade the experience for the entire wireless community.
Personal Web Pages
Any authorized user at Bryant University may have a personal home page on the Bryant
University World Wide Web Server. The contents of any user's home page can be of the
users own creation or choosing, provided that graphical images, multimedia information,
text, or the intent of the home page does not refute the mission of Bryant University.
Typically, users will display personal information, including interests, hobbies, links
to other web sites, and resume-type biographical information. Student organizations are
also welcome to submit home page information on the University website.
Any person wishing to publish Web documents on the Bryant University Web server must agree to the following:
- An individual must be responsible for the content, accuracy, and maintenance of all
information published on the Bryant Web server.
- No copyrighted material without the express written permission of the copyright
owner will be permitted on the server.
- In the event of a complaint, the page may be taken off-line without notice until the issue is resolved.
- Sales transactions of all kinds and storage of large quantities of sound and video files are not
permitted on the server.
Electronic Mail Services
Bryant University's electronic mail services are University facilities and are intended
for teaching, learning, research, and administration in support of Bryant University's mission.
E-mail is considered an official means for communication within Bryant University. E-mail
users are required to comply with state and federal law, University policies, and normal
standards of professional and personal courtesy and conduct. Access to University e-mail
services is a privilege that may be wholly or partially restricted by the University without
prior notice and without the consent of the e-mail user: a) when required by and consistent
with applicable law or policy; b) when there is a reasonable suspicion that violations of
policy or law have occurred or may occur; or c) when required to meet time-dependent,
critical operational needs. Such access restrictions are subject to the approval of the
appropriate University supervisory or management authority (e.g., department heads, systems managers, etc.).
All use of e-mail, including use for sensitive or confidential information, will be consistent
with the University policy. Confidentiality regarding student records is protected under the
Family Educational Rights and Privacy Act of 1974 (FERPA). All use of e-mail, including use
for sensitive or confidential information, will be consistent with FERPA.
On termination, resignation, or graduation, the individual's e-mail account will be disabled and
all information retained for a period of ninety days before deleted.
In the event of a compromised e-mail account, the account will be disabled and the password
credential changed. The appropriate user support service (Help Desk or Laptop Central) will be
notified of the situation and in turn will inform the account owner. Should the account be
exploited for spamming purposes, appropriate measures will be taken to mitigate the damage to
the bryant.edu domain name. Outbound mail leaving the Bryant domain from the account may be
restricted for up to 72-hours or until all offending e-mail is purged from the system.
Restrictions Using Electronic Mail Services:
- Persons given access to Bryant University's e-mail system are expected to be familiar
with and abide by the policies stated in the Bryant University Employee Handbook and the
policies in this document.
- Bryant University e-mail services may not be used for personal business or personal
gain except as permitted by other University policies.
- It is a violation of this policy to use e-mail to libel, threaten, or harass other individuals.
- Unsolicited email messages to multiple users are prohibited unless explicitly approved by the appropriate University authority.
- All messages must show the genuine sender information (i.e., from where and from whom the message originated).
Users are not allowed to impersonate other users or user groups, real or fabricated, by modifying email header
information in an effort to deceive the recipient(s); e.g., e-mail spoofing is specifically prohibited.
Offensive Material - Use of University owned or provided equipment for viewing, accessing, or
transmitting offensive material is strictly forbidden. This applies to any screen display or
printing of images, sounds, or messages that could reasonably be considered unlawful,
threatening, abusive, libelous, defamatory, obscene, pornographic, profane, or otherwise
objectionable. Any attempt, whether by student, employee, or guest of the University,
to access, view, or transmit such material using University-owned equipment or network
resources will result in disciplinary action and possible loss of network privileges.
Users of campus communications are subject to all applicable local, state, and federal
laws and regulations, and Bryant University policies and procedures.