Nova Southeastern University Student Handbook 145 Student organizations may appeal any disciplinary sanction imposed upon them. Procedures for an appeal can be found in Section D. University Disciplinary Procedures in this handbook. A.15 University Computer and Telecommunications Use Policy The following five sections detail NSU’s policy related to the use of computing and information technology resources, email, and the Internet. The information is available at nova.edu/portal/oiit/policies. Acceptable Use of Information Technology Resources and All Other Policies NSU’s Acceptable Use Policy provides guidelines for the appropriate and inappropriate use of the computing and information technology resources of NSU and can be found at nova.edu/portal /oiit/policies/forms/information-security-acceptable-use-policy.pdf. This policy applies to all users of the university’s information technology resources, including students, faculty and staff members, alumni, and guests of the university. Information technology resources include, but are not limited to, Internet/intranet/extranet-related systems, computing devices and related equipment, software, operating systems, storage media, network accounts providing electronic mail, Internet browsing, FTP data, local area networks, and listservs for which the university is responsible, as well as networks throughout the world to which the university provides computer access. NSU’s information technology resources are intended to be used for its programs of instruction and research and to conduct the legitimate business of the university. All users must have proper authorization for the use of the university’s information technology resources. Users are responsible for seeing that these computing resources are used in an effective, ethical, and legal manner. Users must apply standards of normal academic and professional ethics and considerate conduct to their use of the university’s information technology resources. Users must be aware of the legal and moral responsibility for ethical conduct in the use of information technology resources. Users have a responsibility not to abuse the network and resources, and to respect the privacy, copyrights, and intellectual property rights of others. In addition to the policy contained herein, usage must be in accordance with applicable university policies (see related policies listed at the end of this section) and applicable state and federal laws. Among the more important laws are the Florida Computer Crimes Act, the Federal Computer Abuse Amendment Act 1994, the Federal Electronic Communications Privacy Act, and the U.S. Copyright Act. Copies of these laws and the NSU copyright policy may be examined in the Office of Academic Affairs. Unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the student to civil and criminal liabilities. Policy violations generally fall into five categories that involve the use of information technology resources, including 1. f or purposes other than the university’s programs of instruction and research and the legitimate business of the university 2. to harass, threaten, discriminate, stalk, intimidate, or otherwise cause harm or attempt to cause harm to specific individuals or classes of individuals 3. to impede, interfere with, impair, or otherwise cause harm to the activities of others 4. t o download, post, or install to university computers, or transport across university networks, material that is illegal, proprietary, in violation of license agreements, in violation of copyrights, in violation of university contracts, or otherwise damaging to the institution
RkJQdWJsaXNoZXIy NDE4MDg=