Technology Use Policy

New Students, Faculty and Staff are automatically given accounts to access email and the Spalding Portal. All Spalding Students, Faculty and Staff are subject to the "Acceptable Use Policy" below. Enrollment in Moodle courses is determined by enrollment in a course or a teaching assignment. For additonal IT access for faculty and Staff, supervisors must complete the form linked below.

Information Technology Privileges revised Aug 2018.docx

Acceptable Use Policy
Prohibited Uses of Internet Systems and Services:
Theft or other abuse of the campus network, computers, or
computer time, including but not limited to:
Unauthorized entry into a file to use, read, or change the contents or for any other
Unauthorized transfer of a file.
Unauthorized use of another individual’s identification or password.
Use of computers or computing facilities and resources to interfere with the work
of another student, faculty member, or University official.
Use of computing facilities and resources in violation of copyright laws.
Illegal Use: Transmission, distribution, or storage of any
material in violation of an applicable law or regulation is prohibited. This
includes, without limitation, pornography, viruses, worms, or harmful code,
material protected by copyright, trademark, trade secret, or other intellectual
property right used without proper authorization. Students shall comply with
the Digital Millennium Copyright Act of 1998.
Threats: Threats of bodily harm or destruction of property, or
any other communication that constitutes an illegal threat or harassment.
Reselling: The resale of Internet Service or otherwise making
available to anyone outside the premises the ability to use the Service (i.e.
Wi-Fi, or other methods of networking) without proper authorization.
Impersonation/Forgery: The use of the Internet Service for the
impersonation of another person for any purpose, including, without limitation,
adding, removing, or modifying email or network header information, use of free
email services, selling or auction services, and chat or other instant
messaging services. Identity theft, misuse, or misrepresentation of one’s
identity on the Internet is a violation of KY state law and covered under
section 18 of the United States Federal Code.
Disruptions and Network Unfriendly Behavior: Any activities,
intentional or otherwise, which adversely affect the ability of other Students
or Clients of Spalding University to use Internet Services or the Internet. This
includes, without limitation, denial of service (DOS) attacks, unauthorized
attempts to gain access to any account or computer resource not belonging to
the student or employee, the alternation, destruction, or misuse of information
by any means or device, the interference or disruption of services.
Network Security: The operation, through action or inaction, of
student or University owned computers and equipment in an unsecured manner
which permits others to use the Residence Hall Internet Service in a means that
is in violation of this AUP or any applicable law or regulation including,
without limitation, DOS attacks, the proliferation of viruses or worms, email
relaying and unsolicited email (“email spam”).
Email: Sending unsolicited mail messages, including the sending
of “junk mail” or other advertising material to individuals who did not
specifically request such material (“email spam”). This includes, without
limitation, bulk-mailing of commercial advertising, informational
announcements, and political tracts. Students and employees in violation of
this policy will be subject to a fine by the internet service provider of no
less than five dollars ($5.00 US), not to exceed five hundred dollars ($500.00
US), per mail message. It also includes, without limitation, posting the same
or similar message to one or more newsgroups (excessive cross-posting or
Deception: Obtaining or attempting to obtain service by any
means or device with intent to avoid payment, or advertising, transmitting, or
otherwise making available any software, program, product, or service, which
includes, without limitation, the facilitation of the means to send email spam,
initiation of pinging, flooding, mail-bombing, DOS attacks, and piracy of
Use of any technology to create, display or distribute an audio,
video, digital file, picture or film of another individual without that
person’s knowledge and consent while the person is in a place the individual
would have reasonable expectation of privacy.