Computer Usage Guidelines
Authorization and Security
Each constituent: must have a valid, authorized account in areas where required; may only use his/her account in accordance with its authorized purpose; may not allow other persons to use his/her account; is responsible for safeguarding his/her own computer accounts, specifically user names, passwords and/or personal identification numbers (PIN). Users are cautioned against saving login and password information on their computer. Users are responsible for any usage or action taken with their account, with or without their knowledge.
Each constituent must have specific authorization from IT to use information systems. Constituents may not connect unauthorized or unsupported devices to BUF information systems.
Postings by constituents from a BUF email address to public listings should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Baptist University of Florida, unless posting is in the course of business duties.
All devices used by constituents and connected to Baptist University of Florida computer systems and computer networks, whether owned by the constituent or Baptist University of Florida must be continually executing virus-scanning software with a current virus database and definitions.
Constituents must exercise extreme caution when opening email attachments received from unknown senders, which may contain viruses, email bombs, or Trojan code.
Student Identification Verification and Privacy Policy
Baptist University of Florida verifies that the student who registers for a course (on campus or online) is the same student who participates in and completes the course and receives credit for the course by issuing and requiring the use of a secure login and pass code to access course information. The IT Department issues the secure login and randomized, complex pass code after a student applies to the university.
The privacy of all students (on campus or online) is protected through the institution’s adherence to all FERPA regulations. See Student Handbook, item 3.6 as well as item 1.8.7. This applies to the privacy of their online information as well as other student records and files. The student has access to his/her personal information because of the secure login and pass code. For exceptions to the privacy of the information, see Student Handbook, item 3.6.
Any charges associated with student identity and privacy are communicated to students (on campus and online) through the Finances section of the catalog and during orientation.
Auditing and Monitoring Policy
While Baptist University of Florida desires to respect the privacy of its constituents, constituents should be aware that the data created or stored on BUF information systems is the property of Baptist University of Florida and is subject to access by BUF as provided below. Because of the need to protect BUF information systems, BUF cannot guarantee the confidentiality of information stored on any network device belonging to Baptist University of Florida.
For security and network maintenance purposes, IT may monitor equipment, systems, network traffic and logs at any time. BUF designates certain personnel to investigate suspected information systems abuse or violations of other BUF policies. The university reserves the right to examine any and all files, including email and logs.
Audits may be conducted to: ensure integrity, confidentiality and availability of information and resources; ensure conformance to BUF Computer and Information Systems Policy; monitor user or system activity where appropriate; and investigate possible security incidents or violations of BUF policies.
When requested, or for the purpose of performing an audit, any access needed will be provided to authorized members of the BUF staff. This access may include: user level and/or system level access to any computing or communications device; access to information (electronic, hardcopy, etc.) that may be produced, transmitted or stored on BUF equipment or premises.
Access to BUF Information Systems
Constituents may not: change, copy, delete, read, or otherwise access files or software without permission of the custodian of the files or IT; bypass accounting or security mechanisms to circumvent data protection schemes; attempt to modify software except when intended to be user customized; prevent others from accessing the system by software modification.
Constituents must exercise caution to prevent the unauthorized or inadvertent disclosure or transmission of sensitive information.
Software Acquisition and/or Distribution
Constituents may not distribute or make available copyrighted proprietary material without the written consent of the copyright holder; violate copyright, information property or patent laws concerning computer software, documentation, or other tangible assets; load any copyrighted software onto any device (except software lawfully loaded onto personally-owned devices) without specific prior permission from IT.
Constituents are strictly prohibited from the unauthorized copying or use of unlicensed software; such action is not considered to be taken in the course of employment. As a result, BUF will not provide legal defense for individuals who may be accused of making unauthorized copies of software even if these individuals maintain that such action was taken in the course of their employment. If BUF is sued or fined because of unauthorized copying or use by constituents, it may seek payment from the individuals as well as subject them to appropriate disciplinary or legal action.
Decency/Community Values
Constituents must not use BUF computer systems or BUF computer networks to violate any rules in the BUF Faculty/Staff/Student handbooks or policy manuals or any local, state, or federal laws.
A constituent shall disclose to the appropriate BUF authorities misuses of computing resources or potential loopholes in computer systems security and cooperate with appropriate BUF or other authorities in the investigation of abuses.
BUF provides access to various resources, such as the internet, through its network. BUF does not tolerate the use of information systems for pornographic or other uses that are inappropriate in an academic or Christian setting and violate the values set forth in the BUF Faculty/Staff/Student handbooks. Values violations include computer misconduct, harassment, disorderly conduct, disrespect for others, insubordination, lewd and indecent conduct, misrepresentation or forgery, slander, and other conduct that is not consistent with BUF's moral and Christian values. In addition to the termination of computer user privileges, employees or students found guilty of values violations are subject to disciplinary action that may include dismissal.
Email Usage
Constituents must exercise utmost caution when sending any email from inside BUF to an outside network.
BUF Wireless Network Policy
BUF operates a wireless network on the 2.4 GHz and 5.8 GHz bands. Usage of low cost wireless 2.4 GHz devices has grown rapidly and this has created obstacles to the proper operation and performance of this wireless technology. We all must be aware of the potential interference of 2.4 GHz wireless devices within our wireless network coverage area.
Devices that interfere or conflict with the operation of BUF wireless networks should not be operated on the BUF campus. Devices that can interfere with BUF wireless networks include, but are not limited to:
- Wireless internet routers and access points
- Wireless printers
- Wireless gaming consoles
- 2.4 GHz spectrum cordless phones
- 2.4 GHz consumer short distance wireless video links
- A computer operating in IEEE 802.11b/g Ad-Hoc (peer-to-peer) mode
- Apple Airport Base Station and the Macintosh computer operating as a software base station