Policy for Responsible Computing

In support of its mission of teaching, research and public service, De La Salle University provides access to computing and information resources for students, faculty and staff, within institutional priorities and financial capabilities.

Preamble

The Policy for Responsible Computing at De La Salle University contains the governing philosophy for regulating faculty, student and staff use of the University's computing resources. It spells out the general principles regarding appropriate use of equipment, software and networks. By adopting this policy, the Faculty recognizes that all members of the University are also bound by local and international laws relating to copyrights, security and other statutes regarding electronic media. The policy also recognizes the responsibility of faculty and system administrators to take a leadership role in implementing the policy and assuring that the University community honors the policy.

Policy

All members of the University community who use the University's computing and information resources must act responsibly. Every user is responsible for the integrity of these resources. All users of University-owned or University-leased computing systems must respect the rights of other computing users, respect the integrity of the physical facilities and controls and respect all pertinent license and contractual agreements. It is the policy of the University that all members of its community act in accordance with these responsibilities, relevant laws and contractual obligations and the highest standard of ethics.

Access to the University's computing facilities is a privilege granted to University students, faculty and staff. Access to University information resources may be granted by the owners of that information based on the owner's judgment of the following factors: relevant laws and contractual obligations, the requestor's need to know, the information's sensitivity and the risk of damage to or loss by the University.

The University reserves the right to limit, restrict or extend computing privileges and access to its information resources. Data owners -- whether departments, units, faculty, students or staff -- may allow individuals other than University faculty, staff and students access to information for which they are responsible, so long as such access does not violate any license or contractual agreement, University policy or any local and international law.

University computing facilities and accounts are to be used for the University-related activities for which they are assigned. University computing resources are not to be used for commercial purposes or non-University-related activities without written authorization from the University. In these cases, the University will require payment of appropriate fees. This policy applies equally to all University-owned or University-leased computers.

Users and system administrators must all guard against abuses that disrupt or threaten the viability of all systems, including those at the University and those on networks to which the University's systems are connected. Access to information resources without proper authorization from the data owner, unauthorized use of University computing facilities and intentional corruption or misuse of information resources are direct violations of the University's standards for conduct as outlined in the handbooks for administrators, faculty, staff, and students. They may also be considered civil or criminal offenses.

Implementation

Appropriate University administrators should adopt guidelines for the implementation of this policy within each unit and regularly revise these guidelines as circumstances warrant. The Information Technology for Campus Networking (ITCN) Committee shall, from time to time, issue recommended guidelines to assist departments and units with this effort.

Enforcement

Alleged violations of this policy shall be processed according to the judicial processes practiced in the University. The De La Salle University treats access and use violations of computing facilities, equipment, software, information resources, networks or privileges seriously and may also prosecute abuse under local and international laws.