Help
Home

ACLS Policies & Guidelines


Academic Computing Lab Services

Guidelines

As a user of the Brigham Young University-Hawaii Campus Computer Lab, you have certain rights and responsibilities. This list is subject to revision at any time it is your responsibility to abide by the most current list.

Your rights as a user of the ACLS:
    5.gif A clean and comfortable environment in which to study.
    5.gif Access to functional equipment.
    5.gif Friendly and knowledgeable service.

Your responsibilities as a user of the ACLS:
    5.gif Adhere to the BYU-H Honor and Dress Codes
    5.gif Honor the Rights and Privacy of other users.
    5.gif Use only those accounts which are assigned to you, and protect your account(s) from use by others.
    5.gif When the lab is full, non-academic users will be asked to yield their computer to waiting academic users.
    5.gif Immediately comply with requests from lab assistants.

The following are NOT allowed in the ACLS:
   
5.gif Abuse or harassment of other persons and lab employees.
   
5.gif Abuse or unauthorized usage of lab equipment.
   
5.gif Food, beverages, gum, or possession of open food containers in the Lab.
   
Possessing, printing, or showing on the screen offensive materials. Including pornographic and ALL other forms of offensive materials.
   
5.gif Software Piracy (the illegal copying of software).
   
5.gif Using and/or installing personal software on lab computers.
   
Wasting lab resources: including printing more than once, using lab resources for personal profit, or using lab resources for other than academic work during peak hours.
   
5.gif Game playing, except during authorized club activities.

Possible sanctions for violators include:
   
5.gif Dismissal from the Academic Computing Lab.
   
5.gif Suspension of Lab and/or Network privileges.
   
5.gif Referral to the BYU-H Standards Office.

Acceptable Use

Computing/Network Guidelines
Several BYU-Hawaii policies, Internet guidelines, and state and federal laws govern acceptable use of your network account. You must agree to abide by them to obtain and maintain an account. This document is provided to help you understand the obligations associated with the use of your account.

Authorized Users:
Brigham Young University-Hawaii owns, operates, and maintains a private campus computing network that is not for public use. Network access is restricted to authorized faculty, staff, and students.

Appropriate Use:
BYU-H imposes certain responsibilities and obligations upon users of the campus network.

Users MUST:
    5.gif Use their accounts in an ethical manner and in accordance with the guidelines found in the BYU-Hawaii Honor Code.
    5.gif Protect individual accounts and passwords from unauthorized use. (Individual accounts and passwords may not be shared with anyone else.)
    5.gif Access only data and files that are owned by the patron, or data and files to which the patron has been given explicit authorized access.
    5.gifUse copyrighted material in accordance with copyright law and abide by the provisions of any applicable license agreements.

Users must NOT:
    5.gif Use another person's files, system, software or data without permission.
    5.gif Use computer programs to decode passwords or access control information.
    5.gif Attempt to circumvent or subvert system security measures.
    5.gif Knowingly engage in any activity that causes harm to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files.
    5.gif Use BYU-H systems for political purposes (e.g., using electronic mail to circulate advertising for political candidates).
    5.gif Make or use illegal copies of copyrighted software, or store or transmit such copies on
    5.gif University systems.
    5.gif Use electronic mail or message services to harass, intimidate, or otherwise annoy another person (e.g. broadcasting unsolicited messages or sending unwanted mail after being asked to stop).
    5.gif Waste computing resources (e.g. excessive printing, or intentionally placing a program in an endless loop, etc.).
    5.gif Use the network in a manner not authorized by BYU-H to gain commercial or personal profit or advantage (e.g. selling lists of names, addresses, telephone numbers or other information generated from University files).
    5.gifEngage in any other activity that does not comply with the "Honor Code" or with the principles of The Church of Jesus Christ of Latter-day Saints, (e.g. use the network to view, store, or transfer pornography, etc.).

Enforcement
BYU-H considers any violation of Appropriate Use to be a serious offense. BYU-H reserves the right to copy and/or examine any files or information that resides on the network or on BYU-H property that is related to inappropriate use. Violators are subject to disciplinary actions as prescribed by University Policy and may also be prosecuted under applicable local, state, or federal civil or criminal law.