Evangel University Evangel University
Communitya resource site for Evangel’s community

Information Technology

Network Use Policy

With the freedom of access provided by Evangel University computing network comes the responsibility of good citizenship and good stewardship. As with any community, the electronic community of which you are now a member cannot function without some sense of order.

In general Evangel's lifestyle expectations apply to network citizenship. However, additional specificity for appropriate behavior is necessary. Please read the official guidelines for network usage discussed below. Your use of our network obligates you to know and adhere to these regulations. Each student must sign a Network-Use Policy statement at the time network access is provided. Ignorance of the policy is not an acceptable defense.

The Evangel University computer network is for the use of Evangel faculty, students, staff and volunteers, and is to be used for the academic, educational, promotional, communication, and research purposes of the institution and its members.

All use of the network must abide by the following guidelines:

Computer and network use at Evangel is guided by the same principles and subject to the same disciplinary sanctions as for other violations of Evangel University Community participants.

Is consistent with Evangel's Character and Lifestyle Covenant

Evangel University's "Lifestyle Covenant" is found in the Evangel University Student Handbook.

Is consistent with the purposes of the network

Usage that is unacceptable because it conflicts with the stated purposes of the network includes, but is not limited to, these examples:

Advertising of commercial products, services and businesses that are not affiliated with or sanctioned by Evangel University is unacceptable.

It is not acceptable to use our printing facilities to produce output that is not related to the University's mission (i.e., it is not acceptable to print announcements or fliers for outside agencies, materials for one's own or a spouse's business, etc.).

Selling access to or via Evangel's network to others or collecting bids on behalf of non-University business via any of Evangel's network facilities is unacceptable.

Using Evangel's network to support personal business interests is unacceptable. The use of the network for student career placement searches is an example of an exception to this guideline.

Respects other users of the network

Usage that is unacceptable because it may interfere with the work of other users includes, but is not limited to, these examples:

Usage that is likely to result in the loss or disruption of another person's work is unacceptable. Examples of such activities include tampering with network electronics or interfering with an active client computer or network server.

Messages which cause an ongoing interruption in the work of another person are strictly unacceptable (e.g., broadcast messages that are sent after the recipient has requested that they be stopped or are sent indiscriminately to large groups of users).

Avoids wasting campus computing resources

Usage that is unacceptable because it wastes computing and/or network resources includes, but is not limited to, these examples:

It is not acceptable to print multiple copies of output. Printing of large documents not directly related to course work and of large numbers of e-mail messages is also unacceptable.

Chain letters and broadcast messages to lists or individuals and other types of use including transfer of large files which might cause congestion of the network or otherwise interfere with the work of others are not acceptable.

Is consistent with the Ethics of Computing at Evangel University

Usage that is unacceptable because it is not consistent with this statement includes, but is not limited to, these examples:

It is not acceptable to alter, disable, or remove any software which resides on a machine in Evangel's public computing areas or accessible via the university network.

It is not acceptable to use another person's Evangel ID and/or name to gain access to public computing resources, including printing resources.

It is not acceptable to physically tamper with, tap, disable, or remove any equipment, wiring, or networking hardware from the public computing areas, classrooms, residence-hall rooms, or equipment areas.

It is not acceptable to possess or use any software or hardware designed to disrupt the security of the campus network and all devices attached to the network. Likewise, it is unacceptable to engage in any activities designed to spy on the network traffic of other users.

Ethics of Computing at Evangel University

A. Computing Resources at Evangel University

Evangel University has invested considerable resources to develop an extensive computing network and a number of work areas supporting computing for all students, faculty, and guests who have accounts on Evangel computing systems. Our computing community is quite large: potentially over 2000 users. It is also very diverse: beginning and experienced users often work side by side on tasks ranging from simple word processing to extensive user created systems.

The institutional investment in computing technology as well as the complexity of both the computing community and resource requirements clearly demands that all users approach computing responsibly and ethically. When an individual misuses our resources or acts in unethical ways, we all suffer. When we do our computing in a cooperative manner, we all benefit directly.

B. Ethical Use of Resources Based on Stewardship

Evangel University is a community of Christian scholars seeking to serve the Lord through study and service. Our computing resource is not an end in itself; it is a means to enable us to develop into effective servants of our Lord. Therefore, in order to be good stewards of this resource, we agree to the following:

  • Restrict recreational computing. Courteous levels of noise in lab areas are to be maintained. Computer-generated sounds and computer games causing competitive student interaction are inappropriate. Recreational computing must not impact resources for instructional or research computing to the point of unacceptable performance and cost.
  • Seek to minimize paper use. Multiple copies should be made on copy machines rather than computer printers; a year's worth of E-mail messages should not be printed.
  • Seek to minimize disk usage. Those who store files on Evangel's systems should practice good housekeeping by regularly removing E-mail messages and other files that are no longer needed.
  • Refrain from looking at and transferring to campus inappropriate material such as pornographic photographs.
  • Utilize the printers and computers fairly. Log out when leaving a public computing area; leaving computers in proper set-up mode; reprinting only those pages that have been edited rather than entire documents; and refraining from transferring large documents or multimedia materials during prime hours when the systems are heavily used.
  • Refrain from modifying, removing, or adding to Evangel computer hardware or software configurations without authorization from Information Services.

C. Ethical Use of Resources Based on State and Federal Laws

Webster defines theft as the act of taking the property of another without right or permission, often done secretly. We usually have no problem applying this definition to money or possessions. However, unauthorized copying of copyrighted software is also taking property without right or permission. Securing passwords of unsuspecting users is likewise stealing. At Evangel we agree to:

  • Refrain from unauthorized copying or modification of programs (including commercial software) or data belonging to others e.g.,unauthorized Peer-to-Peer (P2P) file sharing, which is illegal and therefore prohibited at EU. (Note: EU will assist law enforcement in any authorized investigation of this illegal activity at EU.)
  • Notify the system manager if we discover a way to break system security. Users should be aware that while Information Technologies will make a reasonable effort to maintain the privacy of all user mail and files, Information Technologies cannot guarantee privacy. Furthermore, both by automated tools and by system administrators, user files are subject to review for security problems and unacceptable usage.
  • Refrain from changing interfaces or setups and mailing demeaning messages.
  • Refrain from attempts at unauthorized access to systems on the Evangel Campus or anywhere else in the world.

D. Our Community Expectations

We are proud of Evangel's long tradition of integrity and honesty. We commit ourselves to making our computing environment the best it can be for the entire community. It is important that we make a strong effort to pass this legacy on to those users who will follow.

It is not acceptable to read or electronically bring to campus pornographic material of any type. Remember, just because you can find it on the net is not justification to read it.

Is consistent with applicable state and federal law

Usage that is unacceptable because it conflicts with state or federal law includes, but is not limited to, these examples:

Messages that harass an individual or group are strictly unacceptable. Evangel University has explicit policies set forth in the Student Handbook regarding harassment. This form of inappropriate behavior is not acceptable on Evangel's network, and all incidents will be dealt with according to established procedures.

Users of the University network may not share over the network software not provided by the University for which they do not have the license to share. A single-copy software license is not a license to share software. Most software used in the academic arena is copyrighted. It is your responsibility to make sure that you have the proper license to use the specific software. A good rule of thumb is never use commercial software for which you did not get authorization to purchase through Information Technologies. This insures that you are operating within the law and also protects your computer from possible viral infection.

An attempt to discover or obtain user accounts and passwords via coercion, hacking or any other method, is prohibited. It is also against our policy for any unauthorized parties to utilize the network super-user accounts.

Penalties for some of these offences can be as much as 1 year in jail and a $1000 fine. These are just some of the penalties that can be associated with legal violations.

Is consistent with guidelines for electronic mail, disk storage, and network integrity

Electronic mail

E-mail is to be the principal means of communication between faculty, staff, administration and students. Types of communication may include assignments, registration materials, announcements, etc. It is the responsibility of the student to check his/her Evangel University E-mail account daily, and the student will be held accountable for any and all official communication of administrative policies, faculty instructions and campus information sent via the Evangel University E-mail system. Mass E-mail distributions should be utilized only for critical information.

All network and acceptable use guidelines apply to the use of electronic mail. Because of the relatively impersonal nature of the interaction, opportunities exist for misuse. Therefore, acceptable use of both systems requires the accurate and unambiguous identification of the source of all sent messages.

Disk storage space/Web Pages

Space for storing data/Web Pages on Evangel's networked computer systems is a limited resource. You should not save unnecessary files and should delete files that are no longer needed. It is the responsibility of the individual to manage their allocated space to meet the class needs in addition to their personal desires. When Information Technologies has evidence that you have stored information with inappropriate content (such as pornography, demeaning statements or graphics, etc.), those files are subject to review without notice by Information Technologies staff.

Network Integrity

You may not tamper with any network cabling or routing devices beyond the wall plate in your room. Information Technologies representatives will service any problems with these devices or cabling.

Results of Unethical Use of Evangel Computing Resources

Written accounts of violations of these policies will be referred directly to Student Development where the offender will be subject to the regular disciplinary policies of Evangel University.

Computer crime is a violation of state and federal law and is punishable by fines and imprisonment. The State of Missouri specifically prohibits computer damage (with intent to injure or defraud) and computer theft (unauthorized access or possession).

Note: Repeat offenses will result in an escalation of normal disciplinary action.

The Board of Administration and the Educational Technology Committee have approved this policy.