Optometry Student Handbook 2024-2025

Nova Southeastern University Student Handbook 31 alumni, and guests of the university. Information technology resources include, but are not limited to, Internet/intranet/extranet-related systems, computing devices and related equipment, software, operating systems, storage media, network accounts providing electronic mail, Internet browsing, FTP data, local area networks, and listservs for which the university is responsible, as well as networks throughout the world to which the university provides computer access. NSU’s information technology resources are intended to be used for its programs of instruction and research and to conduct the legitimate business of the university. All users must have proper authorization for the use of the university’s information technology resources. Users are responsible for seeing that these computing resources are used in an effective, ethical, and legal manner. Users must apply standards of normal academic and professional ethics and considerate conduct to their use of the university’s information technology resources. Users must be aware of the legal and moral responsibility for ethical conduct in the use of information technology resources. Users have a responsibility not to abuse the network and resources, and to respect the privacy, copyrights, and intellectual property rights of others. In addition to the policy contained herein, usage must be in accordance with applicable university policies (see related policies listed at the end of this section) and applicable state and federal laws. Among the more important laws are the Florida Computer Crimes Act, the Federal Computer Abuse Amendment Act 1994, the Federal Electronic Communications Privacy Act, and the U.S. Copyright Act. Copies of these laws and the NSU copyright policy may be examined in the Office of Academic Affairs. Unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the student to civil and criminal liabilities. Policy violations generally fall into five categories that involve the use of information technology resources, including 1. f or purposes other than the university’s programs of instruction and research and the legitimate business of the university 2. to harass, threaten, discriminate, stalk, intimidate, or otherwise cause harm or attempt to cause harm to specific individuals or classes of individuals 3. to impede, interfere with, impair, or otherwise cause harm to the activities of others 4. t o download, post, or install to university computers, or transport across university networks, material that is illegal, proprietary, in violation of license agreements, in violation of copyrights, in violation of university contracts, or otherwise damaging to the institution 5. to recklessly, willfully, negligently, or maliciously interfere with or damage NSU computer or network resources or computer data, files, or other information Examples (not a comprehensive list) of policy violations related to the above five categories include • using information technology resources to invade the privacy of another user/individual • sending an individual or group repeated and unwanted (harassing) email or using email to threaten someone • accessing, or attempting to access, another individual’s data or information without proper authorization (e.g., using another’s computing account and password to look at personal information)