Student Handbook: Information Technology Usage
The Information Technology ("IT") resources and services of Fordham University are provided for the advancement of the University’s educational, research, and service objectives. They are offered primarily to facilitate the University's academic and business purposes. Any access or use of IT resources and services that interferes, interrupts, or conflicts with these purposes is not acceptable. The University has adopted an IT Acceptable Use Policy, which include the following policies: Anti-spam, Email, Peer to Peer, Hosting, Wireless and Internet Usage. The complete text of these policies can be found on the University's website. All students are required to review these policies.
Statement of Prohibited Uses
IT resources and services cannot be assessed or used in the following manner:
- Giving others by password or other means unauthorized access to any user or network account.
- Using or attempting to use an unauthorized user or network account.
- Disguising or attempting to disguise the identity of the account or machine being used. This includes but is not limited to spoofing IP addresses, impersonating any other person or entity, or misrepresenting your affiliation with any other person or entity.
- Using the University network to gain or attempt to gain unauthorized access to remote networks, including remote computer systems.
- Conduct constituting wasteful use of IT resources or which unfairly monopolizes them to the exclusion of others.
- Interference or degradation of controls and system security.
- Engaging in computer crimes or other prohibited acts.
- Initiating or participating in unauthorized or personal mass mailings to news groups, mailing lists, or individuals (including but not limited to chain letters, spam, floods and bombs).
- Knowingly or negligently running or installing or giving to another user a program which damages, exposes to unauthorized access, or places excessive load on any computer system, network, or other IT resource. These programs include but are not limited to computer viruses, Trojan Horses, and worms.
- Using any IT resource or communication services, including email or other means, to intimidate, insult, embarrass and harass others; to interfere unreasonably with an individual's work, research or educational performance; or to create a hostile or offensive working or learning environment.
Responsibilities
In consideration of the privilege of accessing and using IT resources and services, all persons are expected to comply fully with the standards and responsibilities of acceptable use as outlined in:
- All applicable provisions of the University Code of Conduct, employee handbooks and agreements, student handbooks and other policies and procedures established by the undergraduate, graduate, and professional schools of Fordham University.
- IT Policies and Procedures, including the Statement of Prohibited Uses.
- All local, state, federal, and international laws, including but not limited to, copyright and intellectual property.
- All software license agreements acquired by the University and its authorized units.
- All applicable University policies and procedures, including but not limited to, sexual harassment, academic dishonesty, scientific misconduct, non-discrimination, copyright, intellectual property, and internet usage.
- The legal code and educational standards of software use as published in the EDUCOM Code.
Other responsibilities include:
- Self-policing of passwords and access codes.
- Changing passwords and access codes on an as-needed basis.
- Respecting authorial integrity and the intellectual property rights of others.
- Preventing and reporting viruses that infect computer systems.
- Properly backing up appropriate systems, software and data.