|Academic Departments||Academic Resources||Services||Other|
|Education||Records and RegistrationWrite Place||HousingInformation TechnologyDuplicating||Athletics Bookstore Catalog Course Finder Directory Employee Portal Evangel's Public Site Student Handbook Student Portal|
With the freedom of access provided by Evangel University computing network comes the responsibility of good citizenship and good stewardship. As with any community, the electronic community of which you are now a member cannot function without some sense of order.
In general Evangel's lifestyle expectations apply to network citizenship. However, additional specificity for appropriate behavior is necessary. Please read the official guidelines for network usage discussed below. Your use of our network obligates you to know and adhere to these regulations. Each student must sign a Network-Use Policy statement at the time network access is provided. Ignorance of the policy is not an acceptable defense.
The Evangel University computer network is for the use of Evangel faculty, students, staff and volunteers, and is to be used for the academic, educational, promotional, communication, and research purposes of the institution and its members.
All use of the network must abide by the following guidelines:
Computer and network use at Evangel is guided by the same principles and subject to the same disciplinary sanctions as for other violations of Evangel University Community participants.
Evangel University's "Lifestyle Covenant" is found in the Evangel University Student Handbook.
Usage that is unacceptable because it conflicts with the stated purposes of the network includes, but is not limited to, these examples:
Advertising of commercial products, services and businesses that are not affiliated with or sanctioned by Evangel University is unacceptable.
It is not acceptable to use our printing facilities to produce output that is not related to the University's mission (i.e., it is not acceptable to print announcements or fliers for outside agencies, materials for one's own or a spouse's business, etc.).
Selling access to or via Evangel's network to others or collecting bids on behalf of non-University business via any of Evangel's network facilities is unacceptable.
Using Evangel's network to support personal business interests is unacceptable. The use of the network for student career placement searches is an example of an exception to this guideline.
Usage that is unacceptable because it may interfere with the work of other users includes, but is not limited to, these examples:
Usage that is likely to result in the loss or disruption of another person's work is unacceptable. Examples of such activities include tampering with network electronics or interfering with an active client computer or network server.
Messages which cause an ongoing interruption in the work of another person are strictly unacceptable (e.g., broadcast messages that are sent after the recipient has requested that they be stopped or are sent indiscriminately to large groups of users).
Usage that is unacceptable because it wastes computing and/or network resources includes, but is not limited to, these examples:
It is not acceptable to print multiple copies of output. Printing of large documents not directly related to course work and of large numbers of e-mail messages is also unacceptable.
Chain letters and broadcast messages to lists or individuals and other types of use including transfer of large files which might cause congestion of the network or otherwise interfere with the work of others are not acceptable.
Usage that is unacceptable because it is not consistent with this statement includes, but is not limited to, these examples:
It is not acceptable to alter, disable, or remove any software which resides on a machine in Evangel's public computing areas or accessible via the university network.
It is not acceptable to use another person's Evangel ID and/or name to gain access to public computing resources, including printing resources.
It is not acceptable to physically tamper with, tap, disable, or remove any equipment, wiring, or networking hardware from the public computing areas, classrooms, residence-hall rooms, or equipment areas.
It is not acceptable to possess or use any software or hardware designed to disrupt the security of the campus network and all devices attached to the network. Likewise, it is unacceptable to engage in any activities designed to spy on the network traffic of other users.
Evangel University has invested considerable resources to develop an extensive computing network and a number of work areas supporting computing for all students, faculty, and guests who have accounts on Evangel computing systems. Our computing community is quite large: potentially over 2000 users. It is also very diverse: beginning and experienced users often work side by side on tasks ranging from simple word processing to extensive user created systems.
The institutional investment in computing technology as well as the complexity of both the computing community and resource requirements clearly demands that all users approach computing responsibly and ethically. When an individual misuses our resources or acts in unethical ways, we all suffer. When we do our computing in a cooperative manner, we all benefit directly.
Evangel University is a community of Christian scholars seeking to serve the Lord through study and service. Our computing resource is not an end in itself; it is a means to enable us to develop into effective servants of our Lord. Therefore, in order to be good stewards of this resource, we agree to the following:
Webster defines theft as the act of taking the property of another without right or permission, often done secretly. We usually have no problem applying this definition to money or possessions. However, unauthorized copying of copyrighted software is also taking property without right or permission. Securing passwords of unsuspecting users is likewise stealing. At Evangel we agree to:
We are proud of Evangel's long tradition of integrity and honesty. We commit ourselves to making our computing environment the best it can be for the entire community. It is important that we make a strong effort to pass this legacy on to those users who will follow.
It is not acceptable to read or electronically bring to campus pornographic material of any type. Remember, just because you can find it on the net is not justification to read it.
Usage that is unacceptable because it conflicts with state or federal law includes, but is not limited to, these examples:
Messages that harass an individual or group are strictly unacceptable. Evangel University has explicit policies set forth in the Student Handbook regarding harassment. This form of inappropriate behavior is not acceptable on Evangel's network, and all incidents will be dealt with according to established procedures.
Users of the University network may not share over the network software not provided by the University for which they do not have the license to share. A single-copy software license is not a license to share software. Most software used in the academic arena is copyrighted. It is your responsibility to make sure that you have the proper license to use the specific software. A good rule of thumb is never use commercial software for which you did not get authorization to purchase through Information Technologies. This insures that you are operating within the law and also protects your computer from possible viral infection.
An attempt to discover or obtain user accounts and passwords via coercion, hacking or any other method, is prohibited. It is also against our policy for any unauthorized parties to utilize the network super-user accounts.
Penalties for some of these offences can be as much as 1 year in jail and a $1000 fine. These are just some of the penalties that can be associated with legal violations.
E-mail is to be the principal means of communication between faculty, staff, administration and students. Types of communication may include assignments, registration materials, announcements, etc. It is the responsibility of the student to check his/her Evangel University E-mail account daily, and the student will be held accountable for any and all official communication of administrative policies, faculty instructions and campus information sent via the Evangel University E-mail system. Mass E-mail distributions should be utilized only for critical information.
All network and acceptable use guidelines apply to the use of electronic mail. Because of the relatively impersonal nature of the interaction, opportunities exist for misuse. Therefore, acceptable use of both systems requires the accurate and unambiguous identification of the source of all sent messages.
Space for storing data/Web Pages on Evangel's networked computer systems is a limited resource. You should not save unnecessary files and should delete files that are no longer needed. It is the responsibility of the individual to manage their allocated space to meet the class needs in addition to their personal desires. When Information Technologies has evidence that you have stored information with inappropriate content (such as pornography, demeaning statements or graphics, etc.), those files are subject to review without notice by Information Technologies staff.
You may not tamper with any network cabling or routing devices beyond the wall plate in your room. Information Technologies representatives will service any problems with these devices or cabling.
Written accounts of violations of these policies will be referred directly to Student Development where the offender will be subject to the regular disciplinary policies of Evangel University.
Computer crime is a violation of state and federal law and is punishable by fines and imprisonment. The State of Missouri specifically prohibits computer damage (with intent to injure or defraud) and computer theft (unauthorized access or possession).
Note: Repeat offenses will result in an escalation of normal disciplinary action.
The Board of Administration and the Educational Technology Committee have approved this policy.