2021 - 2022 COM Student Handbook

Nova Southeastern University Student Handbook 29 Acceptable Use of Computing Resources and All Other Policies This policy provides guidelines for the appropriate and inappropriate use of the computing resources of Nova Southeastern University. It applies to all users of the university’s computing resources including students, faculty and staff members, alumni, and guests of the university. Computing resources include all computers, related equipment, software, data, local area networks, and listservs for which the university is responsible, as well as networks throughout the world to which the university provides computer access. The computing resources of Nova Southeastern University are intended to be used for its programs of instruction and research and to conduct the legitimate business of the university. All users must have proper authorization for the use of the university’s computing resources. Users are responsible for seeing that these computing resources are used in an effective, ethical, and legal manner. Users must apply standards of normal academic and professional ethics and considerate conduct to their use of the university’s computing resources. Users must be aware of the legal and moral responsibility for ethical conduct in the use of computing resources. Users have a responsibility not to abuse the network and resources, and to respect the privacy, copyrights, and intellectual property rights of others. In addition to the policy contained herein, usage must be in accordance with applicable university policies (see related policies listed at the end of this section) and applicable state and federal laws. Among the more important laws are the Florida Computer Crimes Act, the Federal Computer Abuse Amendment Act 1994, the Federal Electronic Communications Privacy Act, and the U.S. Copyright Act. Copies of these laws and the NSU copyright policy may be examined in the Office of Academic Affairs. Unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the student to civil and criminal liabilities. Policy violations generally fall into five categories that involve the use of computing resources: 1. for purposes other than the university’s programs of instruction and research and the legitimate business of the university 2. to harass, threaten, discriminate, stalk, intimidate, or otherwise cause harm or attempt to cause harm to specific individuals or classes of individuals 3. to impede, interfere with, impair, or otherwise cause harm to the activities of others 4. to download, post, or install to university computers, or transport across university networks, material that is illegal, proprietary, in violation of license agreements, in violation of copyrights, in violation of university contracts, or otherwise damaging to the institution 5. to recklessly, willfully, negligently, or maliciously interfere with or damage NSU computer or network resources or computer data, files, or other information Examples (not a comprehensive list) of policy violations related to the above five categories include: • using computer resources for personal reasons • using computer resources to invade the privacy of another • sending email on matters not concerning the legitimate business of the university

RkJQdWJsaXNoZXIy NDE4MDg=