Skip to main content

Acceptable Use Policy

  • BYU–Hawaii's Computing/Network Policies and Guidelines

    Several Brigham Young University–Hawaii policies, Internet guidelines, and state and federal laws govern acceptable use of your network account. You must agree to abide by them to obtain and maintain an account. This document is provided to help you understand the obligations associated with the use of your account.

    AUTHORIZED USERS:

    BYU–Hawaii owns, operates, and maintains a private campus computing network that is not for public use. Network access is restricted to authorized faculty, staff, and students.

    APPROPRIATE USE:

    BYU–Hawaii imposes certain responsibilities and obligations upon users of the campus network.

    USERS MUST:

    • Use their accounts in an ethical manner and in accordance with the guidelines found in the BYU–Hawaii Honor Code.
    • Protect individual accounts and passwords from unauthorized use. (Individual accounts and passwords may not be shared with anyone else.)
    • Access only data and files to which the patron has been given explicitly authorized access.
    • Use copyrighted material in accordance with copyright law and abide by the provisions of any applicable license agreements.
    • Abide by Internet usage guidelines (RFC 1281), which are available through University Computing Services. Respect the intellectual property of others.

    USERS MUST NOT:

    • Use another person’s files, system, software, or data without permission.
    • Use computer programs to decode passwords or access control information.
    • Attempt to circumvent or subvert system security measures.
    • Knowingly engage in any activity that causes harm to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files.
    • Use BYU–Hawaii systems for political purposes (e.g., using electronic mail to circumvent advertising for political candidates).
    • Make or use illegal copies of copyrighted software, or store or transmit such copies on University systems.
    • Use electronic mail or message services to harass, intimidate, or otherwise annoy another person (e.g. broadcasting unsolicited messages or sending unwanted mail after being asked to stop).
    • Waste computing resources (e.g. excessive printing, or intentionally placing a program in an endless loop, etc.).
    • Use the network in a manner not authorized by BYU–Hawaii to gain commercial or personal profit or advantage (e.g. selling lists of names, addresses, telephone numbers or other information generated from University files).

    Engage in any other activity that does not comply with the “Honor Code” or with the principles of the Church of Jesus Christ of Latter-day Saints, (e.g. use the network to view, store, or transfer, pornography, etc.).

    ENFORCEMENT:

    BYU–Hawaii considers any violation of the Appropriate Use Policy to be a serious offense. BYU–Hawaii reserves the right to copy and/or examine any files or information that resides on the network or on BYU–Hawaii property that is related to inappropriate use. Violators are subject to disciplinary actions as prescribed by University Policy and may also be prosecuted under applicable local, state, or federal civil or criminal law. If there is a significant and immediate threat posed at either the security of other BYU–Hawaii computers and networks, or the continued operation of BYU–Hawaii networks and computers, and the problem cannot be resolved expeditiously through collaboration between the user and BYU–Hawaii administrators, the BYU–Hawaii administrator will notify the Director of Server and Systems to remove the computer from the network until the problem is solved. If there is an absent/unidentified user, using the assignments database, to identify a system owner or Local Support Provider (LSP), the Director of Server and Systems will move unilaterally to protect the network by disconnecting the threatening system. In cases where there is a persistent disagreement between user and BYU–Hawaii administrators, notification will be sent in writing: 1) the reason for the disconnection, 2) what steps must be taken for the network connection to be restored, 3) how to arrange for the system to be reconnected, and 4) the process of appealing a decision to disconnect. When the owner of the system has taken the steps necessary to correct the problem, the Director of Server and Systems will restore the BYU–Hawaii network account as soon as possible.

    AUP displayed on computer devices:

    This system is owned and operated by Brigham Young University–Hawaii (BYUH) and is for the use of authorized users only. There is no general expectation of privacy associated with the use of the system except as required by law. BYUH reserves the right to monitor system use and content and all users expressly consent to such monitoring. Any improper or unlawful use, including PORNOGRAPHIC ACCESS, detected during monitoring may be disclosed to BYUH and law enforcement officials and appropriate action is taken. Sharing of passwords or accounts is strictly prohibited. Users are responsible for all activities related to their account. Violation may result in serious consequences up to and including expulsion or dismissal from this campus and employment. Your election to continue is evidence that you have read and agree to this notice and BYUH's Acceptable Use Policy(AUP).

  • BYU–Hawaii's Lab Policies and Guidelines

    As a user of the Brigham Young University-Hawaii Campus Computer Lab, you have certain rights and responsibilities. This list is subject to revision at any time it is your responsibility to abide by the most current list.

    YOUR RIGHTS AS A USER OF THESE LABS:

    • A clean and comfortable environment in which to study.
    • Access to functional equipment.
    • Friendly and knowledgeable service.

    YOUR RESPONSIBILITIES AS A USER OF THESE LABS:

    • Adhere to the BYUH Honor Code and Dress and Grooming Standards
    • Honor the Rights and Privacy of other users.
    • Use only those accounts which are assigned to you, and protect your account(s) from the use by others.
    • When the lab is full, non-academic users will be asked to yield their computer to waiting academic users.
    • Immediately comply with requests from lab assistants.

    THE FOLLOWING ARE NOT ALLOWED IN THESE LABS:

    • Abuse or harassment of other persons and lab employees.
    • Abuse or unauthorized usage of lab equipment.
    • Food, beverages, gum, or possession of open food containers in the Lab.
    • Possessing, printing, or showing on the screen offensive materials, including pornographic and ALL other forms of offensive materials.
    • Software Piracy (the illegal copying of software).
    • Using and/or installing personal software on lab computers.
    • Wasting lab resources: including printing more than once, using lab resources for personal profit, or using lab resources for other than academic work during peak-hours.
    • Game playing, except during authorized club activities.

    POSSIBLE SANCTIONS FOR VIOLATORS INCLUDE:

    • Dismissal from the Academic Computing Lab.
    • Suspension of Lab and/or Network privileges.
    • Referral to the BYUH Standards Office.
  • BYU–Hawaii's Printing Policies and Guidelines

    Lab TypeDescription
    Location
    Open Lab
    A lab that is available to all students whenever the lab is open
    JFS175, ACR133, MCK199, EDU, PIR, REF, Housing (Hale Labs, TVA Lab)
    Semi-Open Lab
    A lab that is open to all students during specified lab hours
    MCK177, MCK156
    Closed Lab
    A lab that is restricted to specific student's use only
    MCK122, MCK162, P1, P2, P3
    Special Use Lab
    A small cluster of computers for student use
    LIR

    Service TypeOpen Lab
    Semi-Open Lab
    Closed Lab
    Special Use Lab

    Managed Printing

    *Unless requested and specified hardware, paper, and toner are provided

    Yes
    Yes
    Yes
    No*

    Standard Software: OS, MSOffice

    *If requested

    Yes
    Yes
    Yes*
    Yes

    Non-standard software

    *If licenses are provided

    Yes*
    Yes*
    Yes*
    Yes*

    Inventory-Life Cycle

    *Purchase, Surplus, etc

    Yes
    Yes
    Yes
    Yes
    Lab Assistants
    Yes
    Yes
    No
    No