Husson provides members of its community with access to a wide range of information resources. This digital environment includes the use of computers, computer networks (e.g. the Internet and Husson Intranet) and digital communication (e.g. email, telephone, voice mail and faxes). These services are essential for research, instruction, and administration. While Husson values freedom of expression and an open exchange of ideas and information, the University acknowledges that there is a balance between freedom of expression and respect for the rights of fellow members of the Husson community. Essentially, Husson's Digital Environment Policy requires all users to maintain reasonable standards of professional and personal respect and courtesy. Members of the Husson community are provided with broad access to the Husson Digital environment. The digital environment, by its very nature, allows users to engage each other almost instantaneously and potentially with near anonymity, and these characteristics demand responsible use by all of Husson's users. Despite the unique attributes of the digital environment, all Husson policies that apply elsewhere in the Husson community apply in the use of the digital environment. Specifically, all Husson harassment and discrimination policies, the Family Educational Rights and Privacy Act of 1974, and the Husson Community Standards of Conduct, (as defined in the employee, faculty and undergraduate student handbooks), are applicable to all forms of contact with the digital environment. The purpose of the Husson Digital Environment Policy is to address those aspects of information resources that are specific to computer use, electronic communication, and computer networks. The Digital Environment Policy applies equally to users who access the system on and off campus.
2. Eligibility to use Computer Facilities
2.1 Account Creation Accounts will be issued to the following groups: • Contracted Faculty (On/Off Campus): Issued upon acceptance of a contract, for the duration of the contract. • Adjunct Faculty (On/Off Campus): Issued with contract. Valid for academic term in which the contract is issued. • Students (On/Of Campus): Students admitted to a degree program will - upon requesting a Husson network account using our Account Request Form University. • Workgroups: Accounts will be created for special project and work groups if the creation of an account is required, or if such an account will facilitate the management or productivity of such a group. • Administrators & Staff: Issued upon hiring. Valid for the duration of employment. • Alumni: all Husson Alumni are eligible to receive (or to continue to use after graduation) a Husson network account, valid indefinitely, or until this account remains idle for over 90 days.
2.2 Termination of Access and Accounts All Husson accounts (including digital file storage privileges), with the exception of faculty and current student accounts, will expire and access will end 60 days after the termination of a person's qualifying Husson affiliation. During this 60 day grace period, users may arrange to forward their electronic mail using standard mail forwarding conventions. Faculty accounts will expire and access will end 60 days after the end of the term or contract period. If an individual has a contract or registration in place for the coming term period the account will be extended to 60 days after the latest term. Current students who are registered for the upcoming semester are permitted to use Husson computer facilities during the summer; their network and email accounts will remain valid between semesters, and files left stored on Husson property will also remain whole and intact between semesters. Any network account which is not accessed for 90 days may be terminated at the discretion of the Information Resources Office.
3. Digital Environment Policy
3.1 Digital Environment Defined The Husson digital environment encompasses all use of computers and computer networks accessed through Husson and all forms of access to the Husson digital environment which involves Husson material. "Material" includes such items as computers, computer hardware, software, and the campus wide computer network, communication devices and lines, the Husson voicemail system, fax machines, etc. "Uses" include all forms of communication, computation, storage and retrieval of information, printing, etc., conducted with Husson material. The digital environment extends to all materials and uses, whether accessed on or off campus.
3.2 Responsible Use Users are responsible for their use of the digital environment, including computer hardware, accounts and user id's. Users must take all reasonable precautions, including password maintenance and file protection measures, to prevent use of accounts by unauthorized persons or use of accounts in an unauthorized manner. The primary purpose of the Husson digital environment is to provide authorized users with resources which facilitate their academic, instructional, research and administrative roles at Husson. Personal use of the Husson digital environment is permissible, provided such use is limited to incidental use which does not interfere with the reasonable and legitimate use of the digital environment by other members of the Husson community.
Additionally, University technology resources may not be used for personal private gain, or for political campaigning and similar activities that are inconsistent with the university's tax-exempt status. Non-University events, groups or activities may only be promoted digitally through sanctioned University channels and media, a list of which is available through the Human Resources Office and Office for Public affairs.
3.3 Priorities Since Husson is primarily an academic institution, academics and University business will always take precedence over other uses of the digital environment. Husson and its authorized personnel reserve the right to set priorities on the use of the Husson digital environment. For example, academic work in a computer lab may be prioritized over non academic email or computer games.
3.4 Ethical Use All users are responsible for conducting themselves in the digital environment in an ethical manner. Users must respect all copyrighted, personal, or proprietary information belonging to others.
Additionally, users shall refrain from unethical activities, such as: 1. Improper Access: Gaining or attempting to gain improper access to the Husson digital environment, the files or accounts of another. 2. Destructive Behavior: Any action that might be harmful to the Husson Digital environment, the network, or the data stored on or transported by them or other computers connected to them. 3. Offensive Behaviors / Harassment: Any behavior that is harmful to members of the Husson community or the Husson’s property may be offensive behavior. 4. Improper Attribution: When creating and sending messages through the Husson digital environment, users shall not give the impression that they are representing, giving opinions, or otherwise making statements on behalf of Husson unless appropriately authorized to do so.
3.5 Legal Use Some Internet sites may contain material, which is illegal under state or federal law, e.g., laws or sexual harassment statutes governing hostile environment. Users must take care to act within the confines of the law, as well as all Husson policies.Users should also be aware that Husson prohibits the use of its facilities to commit criminal activities. Husson will cooperate with appropriate authorities to enforce this rule. Moreover, although an activity may arguably be legal, Husson's Digital Environment Policy may be more rigorous than the legal standard.
3.6 General Use The primary purpose of Husson network accounts is to facilitate each user's specific business at the University, (i.e. student, faculty or staff). Husson’s Digital Environment must be used in accordance with the responsible use provision contained in this policy.
Examples of misuse include, but are not limited to, the following activities: ♦ Using a computer account that you are not authorized to use. ♦ Obtaining a password for a computer account without the consent of the account owner. ♦ Using the campus network to gain unauthorized access to any computer systems. ♦ Knowingly performing an act, which will interfere with the normal operation of computers, terminals, peripherals, or networks. ♦ Knowingly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes but is not limited to programs known as computer viruses, Trojan horses, and worms. ♦ Attempting to circumvent data protection schemes or uncover security loopholes. ♦ Violating terms of applicable software licensing agreements or copyright laws. ♦ Deliberately wasting computing resources, including printer paper and toner. ♦ Using email to harass others. ♦ Masking the identity of an account or machine. ♦ Posting on electronic bulletin boards materials that violate existing laws or the University's codes of conduct. ♦ Initiating or propagating electronic chain letters; unauthorized mass mailing including multiple mailings to newsgroups, mailing lists, or individuals, or using e mail or personal web page advertising to solicit or proselytize others for commercial ventures, religious or political causes, or for personal gain. ♦ Sending harassing or pornographic messages either locally or over the Internet ♦ Installing any software onto a Husson University common space computer, including any lab or hallway kiosk machine ♦ Using University computing resources such as servers to store harassing or pornographic materials. ♦ Tampering with, abusing, or otherwise damaging computer hardware or software. This includes software or network tampering (hacking), such as attempting to crack or guess passwords, sending anonymous mail, or "bombing" a mailbox with multiple copies of a message. ♦ Running or installing any program that overloads the computer system or network. ♦ Overloading University owned data storage computers or devices with personal and/or non academic items. ♦ Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner. ♦ Searching for, accessing or copying directories, programs, files, or data belonging to others without specific authorization to do so. Programs and data residing in centralized University systems are not considered public domain and should not be used, in part or in whole, for any purpose other than that which is officially authorized.
4. Privacy and Email Both the nature of email and the character of the Husson environment make email less private than users may anticipate. The privacy of email messages may be compromised by the fact they must routinely pass through numerous computers and are sometimes seen by system administrators in the course of maintaining these systems, redirecting lost mail, or by assistants routinely screening colleagues' mail.
5. Email & Voicemail Monitoring and Disclosure Husson does not routinely monitor or inspect email or voicemail. Nonetheless,email is subject to a number of laws, policies, and practices that apply to the disclosure and protection of Husson records. Examples include, but are not limited to the Federal Family Educational Rights and Privacy Act; Husson personnel policies; disclosure pursuant to litigation; and other provisions of the Husson Digital Environment Policy. Husson may access email accounts or voicemail boxes to satisfy a legal obligation or to insure proper operation of these systems. Husson reserves the right to take appropriate investigatory and/or disciplinary action. See the Enforcement section of this policy. A user's programs and data are to be treated by other users as private property (subject, however, to Husson's rights and obligations under law and as set forth in this Digital Environment Policy). Users must not browse, access, copy, or change private files without authorization, or change public files without authorization. Unauthorized access to restricted databases is not permitted.
6. Storage and Privacy of Files Husson employs reasonable means to maintain the privacy of those files that are stored on Husson computer systems, including but not exclusive to email and voicemail. Husson reserves the right to access user's data, files, and programs for appropriate management purposes, such as making backup copies and to ensure system integrity. When we copy files to the backup media using a program run by our operations staff, every file will be backed up irrespective of any file protection mechanisms that have been set. When you delete a file, you cannot be assured that every copy of the file will be deleted. A number of copies may be retained on backup media for up to a year. Because Husson's ability to maintain the privacy of your files is limited, you should be wary of using these systems (or any shared access computer system) for the storage of highly sensitive information or information that you do not want anyone else to access. Users of these facilities are cautioned that absolute privacy cannot be assured.
7. Misconduct Additionally, Husson reserves the right to inspect any files stored on Husson computers and to record any communications that pass through these computers. Any file or storable piece of digital information contained on any Husson-owned computer or digital device is considered Husson property, though not necessarily the intellectual property of the University. Husson may report evidence of misconduct to the appropriate authorities. See the Enforcement section of this policy. Husson's digital environment includes access to the Internet, an international computer network. The actions of members of the Husson community on the Internet reflect back not only on the individual user, but upon Husson as well. Therefore, all use of the Internet, which involves the Husson digital environment, must be responsible, ethical and legal.
8.1 Copyright, Defined "Copyright is the ownership and control of intellectual property in original works of authorship. A copyright owner has five specific rights: to reproduce (copy) the work, to prepare derivative works based on the copyrighted work, distributing copies of the work to the public, publicly performing the work, and publicly displaying the work." ("Licensing of Instructional/Informational Technology," Adrian Arima, Gary Cary Ware & Freidenrich, March 1, 1996) Works published after March 1, 1989 may maintain a valid copyright even if they are not specifically labeled with a copyright symbol or other notification.
8.2 Copyright Infringement Any action which violates the rights of a copyright owner may constitute copyright infringement. The digital environment includes a number of media, which are subject to copyright laws, including the Internet, email, and computer software.
8.3 The Internet Copyright infringement via the Internet may occur in a variety of ways, including making unauthorized copies of any copyrighted material and publishing another's copyrighted materials over computer networks.
8.4 Email Like the Internet, email may be used to publish, manipulate, or otherwise attribute original works of authorship. Such action may constitute copyright infringement.
8.5 Software Copyright Infringement Software Copyright Infringement includes receiving and/or using unauthorized copies of software, making unauthorized copies of software for oneself or others, or attempting to modify the computer systems in any unauthorized manner.
a. Software License Agreements. Husson has purchased licenses that permit members of its community to access and use many software packages and files that are protected and regulated by copyright law. Software license agreements are contracts in which the seller agrees to provide the program, provided that the buyer agrees to abide by the rules of the license. Most of the software used at Husson is licensed to Husson through independent software companies. b. Ethical and Legal Use of Software. Copyrighted software must only be used in accordance with the license and purchase agreement between Husson and independent vendors. Users do not have the right to make copies of licensed software, modify, and/or distribute such copies to anyone. Only authorized copying of files or programs or program utilization is ethical and legal.
8.6 Fair Use Doctrine To determine whether particular uses of a copyrighted work are permissible, the courts often refer to the fair use doctrine, described in U.S.C. Title 17, section 107.
The fair use doctrine considers:
1. The purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;
2. The nature of the copyrighted work;
3. The amount and substantiality of the portion used in relation to the copyrighted work as a whole; and
4. The effect of the use upon the potential market for or value of the copyrighted work. Husson's policy is to adhere strictly to the letter and spirit of copyright laws and regulations. Copyright infringement may be subject to disciplinary and/or legal action. For additional discussion, see the Enforcement section of this policy.
The use of Husson's digital environment is a privilege. While student tuition makes possible many of the services available to students, staff and faculty, there are no fees paid by students to directly establish or maintain any information resources. Any user who violates the Husson digital environment or related Husson policies may have his or her access privileges terminated. Additionally, such misconduct may subject the violator to disciplinary action under standard Husson disciplinary rules, personnel processes and, in some cases, criminal prosecution.
9.1 Copyright Any use of the Husson digital environment that violates applicable copyright laws is subject to appropriate disciplinary action as well as those civil remedies and criminal penalties provided by federal law.
9.2 Applicability of Other Policies Husson's sexual harassment policy and other policies regarding appropriate conduct are applicable to all uses of the Digital environment. This includes communications sent off campus via Husson access to email and the Internet. 9.3 Investigation Alleged violations of the Digital Environment Policy are subject to investigation. In the event of an investigation, Husson reserves the right to access private information, including the contents of files and mailboxes while making every effort to keep such investigations confidential. Husson may access email accounts to satisfy a legal obligation. Any administrator who believes such actions are necessary must first obtain the approval of an appropriate administrative authority.
9.4 Reporting Violations The department appropriate to the nature of the complaint and/or violation will handle violations of the Digital Environment Policy. For example, violations of Husson harassment or discrimination policies should be directed to Human Resources, Office of Student Services, or the Student Affairs. Violations unique to the Digital Environment Policy should be directed to the Director of the Information Resources Office.
9.5 Liability/Warranty Husson is unable to warrant that its digital environment is virus free, or that all hardware and/or software used to access the Digital environment will be compatible with the Husson system. Use and/or access to Husson's digital environment does not entitle the user to seek indirect, consequential, special, punitive, peremptory, or like damages from Husson in connection with such use and access. 9.6 Revisions to the Digital Environment Policy This policy is subject to change without advance notice. All users are responsible for keeping abreast of any changes made to this policy. Any updates will be available in the Information Resources Office FirstClass conference.
If you wish to attempt any contact or engage in any behavior with Husson's digital environment and are uncertain as to whether such action violates Husson's Digital Environment Policy, you should consult the Information Resources Office at x7165 or email@example.com.
Husson thanks the many Colleges and Universities whose policies served as models for our Digital Environment Policy. In particular, we wish to thank Eastern Illinois University, the University of Michigan, Stanford University, & the University of Western Ontario.