Acceptable Use Policy
William Woods information technology resources, including electronic communications on and off the William Woods campus and the computers attached to this network, are for the use of persons currently affiliated with William Woods, including faculty, staff and students. Information technology resources are provided by the University to further the mission of lifelong education. Use of these resources should be consistent with this mission and this policy.
Central to appropriate and responsible use is the stipulation that computing resources shall be used in a manner consistent with the instructional, public service, research, and administrative objectives of the University. Use should also be consistent with the specific objectives of the project or task for which such use was authorized. All uses inconsistent with these objectives are considered to be inappropriate use and may jeopardize further access to services.
Unacceptable uses include, but are not limited to, the following:
- Using the resources for any purpose that violates federal or state laws.
- Using the resources for commercial purposes, sales and/or advertising.
- Using excessive data storage or network bandwidth in such activities as propagating of “chain letters” or “broadcasting” inappropriate messages to lists or individuals or generally transferring unusually large or numerous files or messages.
- Sending or storing for retrieval patently harassing, intimidating, or abusive material.
- Misrepresenting identity or affiliation in the use of information technology resources.
- Using someone else’s identity and password for access to information technology resources or using the network to make unauthorized entry to other computational, information or communications devices or resources.
- Attempting to evade, disable or “crack” password or other security provisions of systems on the network.
- Reproducing and/or distributing copyrighted materials without appropriate authorization.
- Copying or modifying files belonging to others or to the University without authorization including altering data, introducing or propagating viruses or worms, or simply damaging files.
- Interfering with or disrupting another information technology user’s work as well as the proper function of information processing and network services or equipment.
- Intercepting or altering network packets.