Internet Use & Misuse
INTERNET USE
St. John’s Seminary’s computing resources are intended to enable the institution to carry out its responsibilities of education, research, administrative functions, and public service. Therefore, these functions have priority in using computing resources. Because SJS recognizes the value of the Internet as an essential resource for information and communication, when computing resources are available, SJS members may use them for electronic communications with colleagues and acquaintances outside SJS community, and to take advantage of information resources on the Internet, provided they abide by the policies and procedures governing such use. As stated above, when communicating via, publishing to, or downloading from, the Internet, users of SJS computing resources and systems are expected to conduct themselves in a manner that reflects well upon the Seminary. SJS members are advised to consider the public nature of information they disseminate on the Intra/Internet. In general, information in a World Wide Web site is published and available to everyone who can access the Web. SJS members must not assume that their information is restricted to only a close circle of friends, or even the campus community. SJS makes every effort to restrict external (Internet) access to internal (Intranet) information and communications, but cannot guarantee confidentiality. SJS members may not use computing resources and systems for advertising, fundraising, or other commercial activity without written authorization from the Rector. This includes, but is not limited to, linking any sort of private business to any SJS Web site. SJS members may not use the Seminary name in their Web sites in any way that implies SJS endorsement of other organizations, products or services, nor may they use SJS logos, trademarks, or seals without written authorization from the Rector. |
Examples of Misuse
SJS characterizes misuse of computing resources and systems as improper and as just cause for suspension of computer privileges and/or disciplinary action. Examples of misuse include:
CREATION OF ADDITIONAL GUIDELINES
As an aid to a better understanding of responsible computing practices, individual departments may develop their own guidelines for responsible computing. These documents must be consistent with the “Computer Use Policy” and should be approved by the Technology Review Committee, which may recommend adjustments to the guidelines to assist departments and units with this effort. |