<<

Student Network Access Acceptable Use Policy

To use Voorhees College wireless and/or wired network access, you must agree to and comply with the following terms and conditions: 1. Voorhees College expects you to avoid any use that would pose legal or ethical problems. Any use that violates local, state and federal law, Voorhees College policy, or that puts the greater campus network at risk is strictly prohibited. As an example, Internet- based music can be BOTH high quality AND legally available to you at low or no cost. Yet too many copyright infringement cases end in bankruptcy and jail-time for individuals who fail to respect ownership rights. The Recording Industry Association (RIA) has recently taken legal action against those who simply download this music; it is no longer those who host shared music files who risk prosecution. These matters can easily be handled with integrity and responsibility. It is both reasonable and right for Voorhees College to have expectations that you do so. 2. Specifically, you must avoid peer-to-peer (P2P) and systems such as Ares, BearShare, , WinMX, , , , iMesh, Warez, Lime Wire, Bit Torrent, Gator and spyware/malware downloads that open your system to attack and use it to attack others. These programs illegally copyrighted materials. Some will try to convince you to ignore such cautions, promising great bargains or free music, etc. Web sites can be so extreme/obscene that they lure people into obvious snares (popup and system warnings quickly plaster the screen). Common sense reflects well upon individuals who simply stop and turn away. Our Help Desk and the Voorhees College web site is a excellent resource for up-to-date information on applications and websites to avoid. 3. You must provide a record of your unique hardware address (a.k.a. the computer’s MAC address) that we use to associate with your specific jack and network IP number. Only your computer is allowed to use your assigned jack. Connecting any other device is strictly prohibited. Should this occur, our system logs will identify the address and jack. If your system is repaired or replaced (spare, temporary, new, etc.), you agree to contact us with the related information within 24 hours so that we can keep our records up-to-date. You must also insure this temporary or new system meets all terms and conditions outlined in this agreement. 4. You take personal responsibility for this jack and your computer as you do other personal property – within reason and where practical – like so many things you already manage. Among roommates and neighbors, you might loan a cell phone, but not to anyone. This means your computer must be setup with a login password and protect this password from use by others. It is the key to your personal resources, finances and reputation just like any other PIN codes, credit cards, etc. 5. You must maintain a current version of an approved Anti-Virus utility. The term ‘current’ means the version date is WITHIN ONE YEAR of the present date. However, you must keep virus signatures completely up-to-date - WITHIN 30 DAYS. There are several excellent low-cost or no cost anti-virus utilities. Please consult our campus web site. 6. You must maintain a CURRENT version of firewall, spyware/malware and popup utilities. These are free with the latest updates (Service Pack 2). By running Windows update routinely (weekly) you automatically keep these current. If you choose to use another type of firewall and popup blocker, it is YOUR responsibility to keep these up-to-date (see definition of ‘current’ above). 7. You must set Automatic Updates to load security patches and bug fixes down from the Microsoft web site as soon as they become available. These updates are CRITICAL for Student Network Access Acceptable Use Policy preserving the stability and security of computers and your personal and financial integrity. The threat is constantly changing and Identity Theft is on the rise. Your diligence matters!

8. We will continue to preserve individual rights to privacy. Specific web pages, email screens, mouse clicks, etc. remain a private matter for the individual except where legal matters and due process require us to maintain appropriate and lawful records. In the unlikely event of a prohibited or unauthorized use, you agree to be forthright about what you know – who borrowed when, what was going on, etc. 9. We will provide support and assistance relating to these details – within practical and reasonable limits – largely serving a role as facilitator and consultant. We will NOT do the work for you, nor take responsibility for your personal property. We can recommend additional resources - individuals and organizations - who can work these details on a low- cost, no cost basis. 10. Voorhees College reserves the right to amend or change – in part or whole – these terms and conditions as security and organizational needs dictate. You further indemnify (hold blameless) Voorhees College should your voluntary use of the high speed Internet expose you to risks typical for any Internet service provider

(Sign both here and below.)

By signing below, I ______agree to and will comply with the (Print Name) terms and conditions stated above. Signed ______. Witnessed by ______Date______

Cut Here *************************** For IT Department Use Only ******************************** Cut Here

By signing below, I ______agree to and will comply with the (Print Name) terms and conditions stated above. Signed ______. Witnessed by ______Date______------Building______Room ______Jack Number______Window______Door______PC Make/Model______

MAC Address______IP Address______Student Network Access Acceptable Use Policy AntiVirus ______Firewall______Popup Blocker______Spyware, Malware______