The purpose of this policy is to describe the appropriate use and security of University Technological assets, associated responsibilities, and rights of all Users employing these resources. All Users of University Technology assets are expected to be familiar with each policy contained here within and the consequences of violation as listed below. This policy supersedes all previous Gardner-Webb University Computer Usage Policies.

Violation of these contained policies may result in the immediate suspension of computer account and network access pending investigation resolution. Depending on frequency and/or severity, the offender may lose all computer account and network access in addition to facing the appropriate University judicial review. The penalties may include suspension or dismissal from the University and/or criminal prosecution where warranted.

Network Security and Privacy Policies:

  1. Unauthorized attempts to gain privileged access or access to any account or system not belonging to you on any University system are expressly prohibited.
  2. Creation of any program, web form, and/or any other mechanism designed to gain privileged account information is prohibited without the written permission of the Provost and Associate Vice President for Technology Services.
  3. Computer and network accounts are assigned to each individual uniquely and are considered confidential in nature. Individual accounts cannot be transferred to or used by another person. Given that access allows the User to retrieve personal information of the individual assigned the account, sharing of accounts and/or passwords is not permitted.
  4. Each User is personally responsible for the proper use of his/her account including all activity associated with his/her account. All illicit activity that can be traced to a User account will result in immediate termination of the account until the investigation is complete. Users who do not safeguard their usernames and passwords may lose their access permanently, subject to the appropriate University judicial review.
  5. Each system owner is responsible for the security of all systems he/she connects to the campus network (WEBBNET). Any system determined to cause network degradation and/or attacks other systems as a result of malicious software, e.g., viruses, worms, Trojans, will be removed from the network immediately and without notification until the system has been made secure. No University-owned or private system attached to the WEBBNET may be used as a vehicle to gain unauthorized access to any other system whether on or off campus.
  6. Anyone believing that a possible security lapse has occurred on any University technological resource or network MUST report it immediately to the respective department chairperson/manager and to Technology Services. The system and/or computer associated with the lapse should not be used until the problem has been investigated and cleared by the system administrator.
  7. All Users must be aware that Gardner-Webb system administrators conduct periodic security checks of University systems and networks. Additionally, outside agencies are annually contracted to assess and challenge the University systems and network security to ensure a safe operating environment. As a result of the analysis, Users may be required to change their passwords during their next login process where an easily guessed password has been employed.
  8. User files on a University server/system are kept as private as possible. Any attempts to access and/or read another person’s protected files will be treated with the utmost seriousness. System administrators will not override any file protections unless deemed absolutely necessary in the performance of their duties, and will treat the contents of those files as private and confidential information at all times. System administrators must make every effort to communicate with the owner of the files in the event any file protection is overridden.

Network and Computing Usage Policies:

  1. No University system or network may be employed in a manner or purpose that violates University statutes/regulations/policies and/or federal, state or local laws.
  2. Any activity, malicious or otherwise, resulting in obstructing the operation and work activities that employ University technological resources will not be tolerated. Activities include, but are not limited to, consuming gratuitously large amounts of system resources (disk space, CPU time, network bandwidth), and/or crashing University servers or individual machines.
  3. Use or access of any University system by outside persons or agencies requires written permission from the Provost’s Office and Technology Services to include payment of fees to the University and appropriate software vendors where applicable.
  4. Use of University technological resources, systems, and networks for commercial purposes is strictly prohibited except where explicitly approved by the Provost. Such prohibited use includes, but is not limited to, development of programs for commercial profit, data processing or computations for commercial use, and preparation/presentation of for-profit advertising material. Posting of published works, workshops, presentations, etc., related to a faculty member’s area of teaching are exempt from this prohibition.
  5. Frivolous, disruptive, and/or inconsiderate conduct, including the viewing of pornographic material, in any University computer lab, multi- media, or other room which employs technology is not permitted.
  6. No University computing facility may be used for participating in computer gaming outside of academic requirements.
  7. Copying, storing, displaying, or distributing copyrighted material using University systems and/or networks without express permission of the copyright owner, except as otherwise allowed under copyright legislation, is strictly prohibited. Under the Digital Millennium Copyright Act of 1998, repeat copyright infringements by a User can result in termination of the User’s access to University systems and networks. Statutory damages for copyright infringements range from $750 to $30,000 per infringement with willful infringements carrying potential damages up to $150,000 plus attorney fees.
  8. Tampering, reconfiguring, removing equipment, or physically accessing University network/computing resources and/or wiring without express permission by Technology Services or Plant Operations is strictly prohibited. Such action will be considered vandalism and/or theft and will be prosecuted to the fullest extent of University policy and criminal law.

E-Mail Usage Policies:

  1. Gardner-Webb University has established e-mail as a primary vehicle for official communications with enrolled students and current faculty/staff.
  2. Every enrolled student and current faculty and staff member has an official Gardner-Webb University e-mail address established and assigned by Technology Services. All University communications sent via e-mail will be sent to this address. Faculty members will use the official University e-mail address to communicate with students registered in their classes. Additionally, all administrative offices using e-mail to correspond with enrolled students will do so via this address.
  3. Students are expected to check their official e-mail address on a frequent and consistent basis in order to stay current with University communications. A student’s failure to receive and read University communications delivered to his/her e-mail address in a timely manner does not absolve the student from knowing and complying with the content and instructions of such communications.
  4. Students may not forward their email from their official University email address to another provider. Due to increasing security risks associated with phishing scams and email fraud, the forwarding feature is disabled.
  5. No e-mail may be sent or forwarded through a University system or network for purposes that violate University statutes and/or regulations and constitutes an illegal or criminal action.
  6. Electronic mail is considered private, confidential information and will be kept as private as possible. Attempts to read another person’s e-mail will be treated with the utmost seriousness. No University employee or system administrator will read any mail unless deemed absolutely necessary in accordance with specific job requirements or by judicial subpoena. The University makes every effort to respect e-mail privacy and adhere to state and federal statues governing e-mail confidentiality. However, the University reserves the right to investigate virus and illicit activity that can be introduced through e-mail systems. Additionally, if requested by the person assigned to the e-mail account, Technology Services may enter the specific e-mail account to assist with problem identification and resolution.
  7. Users should be aware that deletion of electronic information will not erase such information from the system storage until overwritten with other data. This can result in the information residing in the University’s network either on various back-up systems/media until such time as the information is overwritten.
  8. Nuisance e-mail or other online messages such as chain letters, obscene, harassing, and/or other unwelcome messages are prohibited.
  9. Unsolicited e-mail messages to multiple Users are prohibited unless explicitly used for University instruction and/or business purposes. Exceptions are granted by the appropriate University authority.
  10. All messages must show accurately from where and from whom the message originated, except in cases where anonymous messages are invited.
  11. Gardner-Webb reserves the right to refuse mail and other communications from outside hosts that send unsolicited, mass or commercial messages, or messages that appear to contain virus and/or illicit material. The University will refuse, filter and/or disregard such messages.