Technology and Information Policy

  1. Technology Policy
    1. Introduction
      1. St. Edward's University provides information technology resources for educational, research, and administrative uses by its students, faculty, staff and visiting scholars. This policy supports and supplements the university's more general policies and procedures governing faculty, students, staff, and facilities.  
      2. University information technology resources that are subject to university policies include, but are not limited to, the following:
        1. Any computer related equipment and/or data (electronic or printed) owned or managed by the university. This includes electrical power.
        2. Any computer, server (i.e., any computer that runs an application which allows remote access to local resources), networking device, telephone, copier, printer, fax machine, or other information technology which is owned or leased by the university or is connected to any university network or system is subject to university policies.
        3. Any device that:
          1. connects directly to the university data or telephone networks,
          2. uses university network-dialup facilities (campus modem pool or wireless systems),
          3. connects directly to a computer or other device owned or operated by the university, and/or      
          4. uses or affects university information technology facilities.  
      3. Prior to accessing technology in order to post information outside the jurisdiction of the university, you should review the appropriate university policy. Please review
        1. For staff:   the Employee Handbook, "Outside Activities" policy
          http://think.stedwards.edu/hr/content/policies-and-procedures-0
        2. For students:   the Student Code of Conduct, Article 2: Misconduct
          http://think.stedwards.edu/deanofstudents/studenthandbook/article2expectationsstudentconduct
        3. For faculty:the Faculty Manual, 2.9 Faculty Rights and Responsibilities
          http://think.stedwards.edu/academicaffairs/facultymanual
      4. Scholarly communities within the university may extend the SEU community beyond SEU faculty, staff & students in support of academic goals and standards.
      5. Under no circumstances may anyone use information technology resources in ways that are illegal or against university policies, violate the university mission, threaten the university's tax exempt or other status, or interfere with reasonable use by other members of the university community. For information on some of the possible consequences of misusing information technology resources described in Section III.C. of this policy, please refer to the Employee Handbook, the Student Code of Conduct, or the Faculty Manual.  
    2. B. Roles and Responsibilities
      1. The University
          1. The university owns most of the computers and all of the internal computer networks used on campus. The university also has various rights to the software and information residing on, developed on, or licensed for these computers and networks. The university administers, protects, and monitors this aggregation of computers, software, and networks. In its management of information technology, the university and its administrative and academic departments take responsibility for the following:
            1. Managing computing resources so that members of the university community are not denied fair access to them;      
            2. Establishing and supporting reasonable standards of security for electronic information that community members produce, use, or distribute, and ensuring the privacy and accuracy of administrative information that the university maintains;      
            3. Delineating the limits of privacy that can be expected in the use of networked computer resources and preserving freedom of expression over this medium without permitting abusive or unlawful activities;      
            4. Enforcing policies by restricting access and initiating disciplinary proceedings as appropriate;      
            5. Ensuring that central university computer systems do not lose critical information because of failures or breakdowns;      
            6. Protecting individual passwords from disclosure;      
            7. Providing network access, including wireless access.  
      2. The Individual
        1. All members of the university community must follow the policies that make these resources secure and efficient. All users are subject to university policies and other statements of conduct as published in the Student Handbook, Faculty Handbook, and Employee Handbook as well as all applicable federal, state, and local laws.  The University prohibits individual commercial use of university computer systems. Incidental personal use by employees is allowed at the discretion of the cost center manager.    
        2. Examples of responsible use of technology include but are not limited to the following:
          1. Observing policies governing the privacy of others, including restrictions placed upon accessible data (secured or otherwise) stored locally or transmitted across network systems;      
          2. Using resources efficiently, and accepting limitations or restrictions on computing resources—such as storage space, time limits, or amount of resources consumed—when asked to do so;      
          3. Backing up files and other data regularly;      
          4. Preventing unauthorized network access to or from their computers or computer accounts;      
          5. Protecting personal passwords and respecting security restrictions on all systems;      
          6. Respecting the rights of others to be free from harassment or intimidation, to the same extent that this right is recognized otherwise on campus;      
          7. Honoring copyright and other intellectual-property rights;      
          8. Taking reasonable precautions to avoid introducing computer contaminants, such as viruses, trojans and worms into university computer systems.      
          9. Honoring academic freedom for professional presentations in public forums and correspondence.      
          10. Honoring scholarly postings and articles for publishing in social computing environments, including but not limited to blog and wiki tichnology;  
        3. Individuals who are not members of the university community may be allowed or invited to present information for publication on an electronic site (e.g. faculty blogs, wikis, or other research projects) hosted by the university provided that all laws, including copyright laws, are satisfied and the faculty member overseeing the presentation reasonably believes this information also satisfies academic conventions for scholarly research. Those items not meeting these criteria either may not be published on that electronic site or may be removed from public display by that faculty member. Notice of these criteria should also be diplayed to anyone submitting materials to that electronic site.