Several Brigham Young University–Hawaii policies, Internet guidelines, and state and federal laws govern acceptable use of your network account, the BYU–Hawaii network, and the BYU–Hawaii computers. This document is provided to help you understand the obligations associated with the use of your account. Refer to BYU–Hawaii's Acceptable Use Policy.
BYU–Hawaii owns, operates, and maintains a private campus computing network that is not for general public use. Network access is restricted to authorized faculty, staff, students, and associates.
BYU–Hawaii imposes certain responsibilities and obligations upon users of the campus network.
- Use their accounts in an ethical manner and in accordance with the guidelines found in the BYU–Hawaii Honor Code.
- Protect individual accounts and passwords from unauthorized use. (Individual accounts and passwords may not be shared with anyone else.)
- Access only data and files on systems to which the patron has been given explicit authorized access.
- Use copyrighted material in accordance with copyright law and abide by the provisions of any applicable license agreements.
- Respect the intellectual property of others.
Users must NOT:
- Use another person’s files, system, software, or data without permission.
- Use computer programs to decode passwords or access control information.
- Attempt to circumvent or subvert system security measures.
- Knowingly engage in any activity that causes harm to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files.
- Use BYU–Hawaii systems for political purposes (e.g., using electronic mail to circumvent advertising for political candidates).
- Make or use illegal copies of copyrighted software, or store or transmit such copies on University systems.
- Use electronic mail or message services to harass, intimidate, or otherwise annoy another person (e.g. broadcasting unsolicited messages or sending unwanted mail after being asked to stop).
- Waste computing resources (e.g. excessive printing, or intentionally placing a program in an endless loop, etc.).
- Use the network in a manner not authorized by BYU–Hawaii to gain commercial or personal profit or advantage (e.g. selling lists of names, addresses, telephone numbers or other information generated from University files).
- Engage in any other activity that does not comply with the “Honor Code” or with the principles of the Church of Jesus Christ of Latter-day Saints, (e.g. use the network to view, store, or transfer, pornography, etc.).
BYU–Hawaii considers any violation of the Appropriate Use Policy to be a serious offense. BYU–Hawaii reserves the right to monitor activity and to copy and/or examine any files or information that reside on the network or on BYU–Hawaii property that is related to inappropriate use. Violators are subject to disciplinary actions as prescribed by University Policy and may also be prosecuted under applicable local, state, or federal civil or criminal law. If there is a significant and immediate threat posed at either the security of other BYU–Hawaii computers and networks, or the continued operation of BYU–Hawaii networks and computers, and the problem cannot be resolved expeditiously through collaboration between the user and BYU–Hawaii administrators, a Networking Representative will remove the computer from the network until the problem is solved. When the owner of the system has taken the steps necessary to correct the problem, the network connection will be restored.
BYU–Hawaii Computer Logon Use Agreement
The following is the statement which appears on every BYU–Hawaii owned computer upon startup. The user is prompted to agree to in order to continue.
"This system is owned and operated by Brigham Young University–Hawaii Campus and is for the use of authorized users only. There is no general expectation of privacy associated with the use of the system except as required by law. BYU–Hawaii reserves the right to monitor system use and content and all users expressly consent to such monitoring. Any improper or unlawful use, including PORNOGRAPHIC ACCESS detected during monitoring may be disclosed to BYU–Hawaii and law enforcement officials and appropriate action taken. Sharing of passwords or accounts is strictly prohibited. Users are responsible for all activity related to their account. Violation may result in serious consequences up to and including expulsion or dismissal from this campus and employment. Your election to continue is an evidence that you have read and agree to this notice and BYU–Hawaii's Acceptable Use Policy(AUP)."
BYU–Hawaii IT Resources Acceptable Use Policy
|Policy #: ACED-007
|Date Approved by President's Council:03/19/2012
||Policy Owner:University Technology Officer
||Executive Sponsor:Academic Vice President
As an institution sponsored by The Church of Jesus Christ of Latter-day Saints, Brigham Young University Hawaii (BYU–Hawaii) is expected to maintain professional and ethical use of its information technology (IT) resources. This policy is designed to guide students, faculty and staff in the acceptable use of IT resources at BYU–Hawaii. SCOPE This policy applies to all users of BYU–Hawaii IT resources regardless of affiliation, and irrespective of whether those resources are accessed from on-campus or off-campus locations. Use of IT resources at BYU–Hawaii must comply with all applicable laws and University policies, including the Church Educational System Honor Code (see Honor Code). Each user is responsible for gaining the knowledge necessary to ensure their compliance with the aforementioned policies and laws.
- Abide by all applicable state and federal laws and University policies
- Copyrighted and licensed material must not be used without the proper preauthorization
- Access only those computers, accounts or resources you are authorized to use, and only at authorized locations
- Your ability to access a computer or account does not necessarily grant authorization
- Take personal security precautions
- Choose complex passwords and change them often
- Do not share your passwords with anyone
- Be cautious when giving out personally identifying information
- Use virus and spyware protection software
- Log off from computer and/or data access application when not in use
- Never leave a logged in, unlocked computer unattended
- Delete, without opening, e-mail messages originated from senders you are not familiar with.
- Never reply and/or respond to phishing scams
- Report any suspicious activity
- Respect the rights of other users, especially their right to privacy
- Abide by all state and federal laws and University policies regarding intellectual property
- Do not use University IT resources to commit libel or slander, harass, or stalk others
- Do not attempt to access any other user’s computer, account or private information, regardless of your ability to do so
- Do not intercept or attempt to intercept data transmissions of any kind
- Keep personal use to an acceptable level
- Personal use is allowed to an extent that doesn’t interfere with University business or other users’ rights to access and use University IT resources
- Unnecessary network traffic should be limited
- Not engage in any commercial uses of University IT resources. This includes advertising, soliciting, selling and related financial transactions for personal gain
- Respect the limitations and integrity of University IT resources
- Do not attempt to extend or modify any IT resources beyond their current capabilities
- Do not download or install any files or software contrary to policy or pre-approved authorization
- Not communicate with others using a false name or unauthorized assumed Identity
- Use electronic communication in a legal, ethical, and respectful manner
- Do not post, transmit, or originate any unlawful, threatening, abusive, fraudulent, hateful, defamatory, obscene, or pornographic communication where the message would constitute or encourage a criminal offense, give rise to civil liability, or violate any local, state, national, or international law.
- Do not use mass mailing in a way that could reasonably result in network spamming or “chain letters”. ENFORCEMENT BYU–Hawaii reserves the right to act upon any violations of this policy, and to reasonably pursue disciplinary action up to and including termination or suspension. The University is also entitled to report to the appropriate agency any actions that may constitute or encourage illegal activity.
Users: Authorized users of University IT resources include faculty, staff, students and other preauthorized persons whose use furthers the mission of BYU–Hawaii.