2024-2025 University Student Handbook

Online and Social Media Conduct

Passwords

Passwords are utilized to grant access to online networks to authorized members only. It is the responsibility of each and every member to hold these passwords in confidence and not disclose them to any other member or third party. You will be held responsible and will be liable for any harm resulting if you disclose or allow disclosure of passwords. Attempting to bypass system security by the use of unauthorized passwords is a violation of UJ policy and will be dealt with accordingly.

Offensive Communication: Any use of vulgar, abusive or offensive language (as perceived by the recipient of the communication) is strictly prohibited.

Harassment: Using online systems, social media or other resources (i.e. text messaging) to target an individual or group with the intent of causing distress, embarrassment, injury, unwanted attention or other substantial discomfort is harassment and is prohibited. Personal attacks based on an individual’s race, national origin, ethnicity, handicap, religion, gender, veteran status, sexual orientation or any other such characteristics or affiliations are prohibited.

Offensive Graphic Files/Audio Files: The transmission (i.e., uploading, downloading, posting, linking to) of sexually explicit images or other content the University deems offensive is prohibited. Unsolicited transmission of these materials may constitute harassment, and as such, is prohibited. Furthermore, such material may be deemed illegal and transmitters of such material may be subject to local, state and/or federal legal action.

Social Media Networks: All UJ students are responsible for the content of their online social networks. The University, as a general rule, does not patrol online media for student conduct. Students should be apprised that although UJ administration has no policy to either patrol or monitor online social networks, violations of university policy (e.g. harassing language, drug violations, or alcohol violations) discovered on online social networks are nevertheless subject to investigation and penalty. The University reserves the right to handle incidents on online social networks expressly contrary to UJ student conduct policy at the discretion of the University administration on a case-by-case basis.

The use of “UJ” is strictly prohibited in any social media accounts, including but not limited to: all forms or use any symbol, logo or graphic used by or associated with UJ in an official capacity without prior consent of the Office of Marketing and Communications. In addition, the use of any item that is confusingly similar to any symbol, logo or graphic will require prior approval. The UJ Name policy can be found under the “Academic and Administrative Policies” section of this handbook.

Impersonation: Communicating information while utilizing a false identification or an identification that you are not authorized to use is prohibited.

Improper Advertising, Solicitation: Use of any on-line network to send unsolicited advertising, promotional material or other forms of solicitation to others is prohibited, except when permitted by law, not prohibited by University policies and in those areas that are designated for such a purpose, for example, a classified ad area. Use proper e-mail lists to avoid spamming.

Personal Websites and Blogs: Content of personal homepages is the responsibility of the account owner. Any content on personal homepages or blogs that violate school policy will be subject to immediate removal - this includes, but is not limited to, images, sounds or linking to any pages with content that violates UJ policy or general community property.

Disruption or Degradation: Any deliberate attempt to disrupt or degrade network services or performance, whether local or remote, is considered unacceptable. Any equipment connected to the university network must be “clean” systems – current with all software updates and have anti-virus protection. Extensive use of the network (i.e., intra/internet gaming, excessive downloading of MP3s or other programs not in accordance with the goals of the University) resulting in degradation of system resources is a violation of University policy. Connecting unauthorized equipment to the campus network, deliberately wasting/overloading computing resources (i.e., printing too many copies of a document) or the overuse of interactive network utilities will be considered violations of UJ’s acceptable use policy.