Unacceptable Use of Information Systems
The following activities are prohibited. However, under appropriate circumstances employees may be exempt from these restrictions during the course of executing their job responsibilities. Such authorization will come from the President and will be in writing (For example, IT staff may disable the network access of a host if that host is disrupting production services).
The lists below are not intended to be an exhaustive list of unacceptable conduct, but rather provide examples of types of activities which violate BUF rules. BUF reserves the right to take appropriate disciplinary action against any constituent who violates the letter or spirit of these rules and policies. Sanctions imposed by BUF in response to academic or disciplinary violations shall be in addition to fines or penalties that may be imposed by law enforcement authorities for illegal acts.
Privacy Violations
- Attempting to access another user's computer files or data without permission
- Supplying or attempting to supply false or misleading identification information to access another user's account
- The unauthorized "borrowing" or examination of another user's data or output
- Deliberate, unauthorized attempts to access or use BUF resources, computer facilities, networks, programs, data, or any system files other than those designated for public access
- Unauthorized capturing of data from computer systems or computer networks
- Solicitation of email for any other email address, other than that of the poster's account, with the intent to harass or to collect replies
Theft
- Using any method to avoid normal charges for the use of computer resources
- Abuse of specific computer resources, such as the internet or BUF computer networks
- Attempting unauthorized or illegal access to computers outside the institution using BUF's computers or computer networks
- Removing or moving BUF owned computer equipment or audio/visual equipment without proper authorization
- Executing any form of network monitoring which may intercept data not intended for the constituent's host
- Providing information about or a list of BUF employees, students, alumni, or former students to parties outside the Baptist University of Florida
- Unauthorized use or forging of email header information
Vandalism
- Alteration, or attempted alteration, of user system software, data, or other files, as well as resource or equipment destruction or disruption
- Intentional introduction or spreading of computer viruses, Trojans, email bombs or other software which causes harm to information systems or to another users account
- Tampering with or obstructing BUF information systems
- Inspecting, modifying, or distributing data or software without proper authorization, or attempting to do so
- Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the constituent is not an intended recipient or logging into a server or account that the constituent is not expressly authorized to access, unless these duties are within the scope of regular duties. For purposes of this section, "disruption" includes, but is not limited to, network sniffing, ping floods, packet spoofing, denial of service, and forged routing information for malicious purposes.
- Damaging computer network related hardware, computer hardware or software
Copyright Issues
BUF owns licenses to a number of proprietary programs. Constituents who redistribute software from the computing systems break agreements with BUF software suppliers, as well as applicable copyright, patent, and trade secret laws. Therefore, the redistribution of any software from computing systems is strictly prohibited except in the case of software that is clearly marked as being in the public domain. Violations include, but are not limited to:
- Copying, transmitting, disclosing data, software or documentation without proper authorization, or attempting to do so
- Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws
Harassment
- Repeated sending of unwanted messages or files
- Generating or storage of spam on, or sending of spam from BUF Information Systems
- Interfering with the legitimate use of computer resources of another user
- Sending of abusive or obscene messages via information systems
- Use of information systems to engage in abuse of constituents
Unethical or Illegal Use, Games, Chain Letters, Miscellaneous
- Sending chain letters, unauthorized mass mailings, "Ponzi" or other "pyramid" schemes of any type
- Using BUF computer systems for non-professional, nonacademic, unethical, or illegal purposes
- Excessive use of BUF computer networks for personal entertainment (e.g.; radio, television broadcasts, music, games, competitions, file downloads, etc.) that hinders the legitimate work of other constituents
- Using BUF owned computers for recreational purposes
- Personal advertisements or commercial activity
- Port scanning or security scanning
- Posting the same or similar non-business-related messages to large numbers of public listings including newsgroups