General Technology Use Guidelines
This policy includes the following guidelines, and requires that each member of the campus community abide by the following:
- Respect the rights of others to freedom from harassment or intimidation: Causing the work or university experience of others to be disrupted by sending abusive or unwanted material is a violation of University policies and may violate the law; therefore, it is unacceptable.
- Respect copyright and other intellectual property rights: The copying of files, passwords or information that is owned by someone else without appropriate permission will be considered a violation of University policies, a violation of the law, and may constitute fraud, plagiarism or theft. All software licensed by the University must be used only in accordance with applicable license agreements.
- Identify yourself clearly and accurately in electronic communication: The use of false or unauthorized identifications or affiliations appears to dissociate you from responsibility for your actions and is considered inappropriate.
- Abide by security restrictions on all systems and information: The security measures and mechanisms have been established to protect individuals and information. Any attempt to disrupt or otherwise circumvent these security provisions, or to assist others to do so, is a serious violation of University policies.
- Use resources efficiently: All computing equipment, network resources and user accounts are owned by UJ and are to be used exclusively for University-related activities. This includes legitimate instructional, research, administrative and other approved activities. UJ reserves the right to access personal storage on the University’s system if an unlawful act, or a violation of University policies, is suspected.
- Recognize limitations to privacy in electronic communications: When utilizing electronic communications, it is important to remember that, although you specify an audience for your communications, the nature of electronic communication allows for a much wider viewing audience. The security of electronic information on shared systems and networks is approximately that of paper documents in an unsealed envelope - generally respected, but able to be breached by someone determined to do so.