Computer Use Policy
Point Loma Nazarene university encourages the use of technology for learning, communication, and collaboration. It is the responsibility of anyone using Point Loma Nazarene University’s (PLNU) technology resources to use them in a responsible, legal, and ethical manner. Users must respect the rights and privacy of others and act in compliance with all university policies and standards as well as federal, state, and local laws.
The university reserves the right to restrict the use of its computer facilities and limit access to its networks when faced with evidence of violations of university policies or standards, of contractual obligations, or of federal, state, or local laws. The university has the right to remove or limit access to material posted on or transmitted by its computers. By connecting to the campus network, the user agrees to the terms and conditions of this Acceptable Use Policy.
Actions which are detrimental or inappropriate when accessing university and Internet resources include, but are not limited to, the following:
- Sending harassing, intimidating and/or threatening messages through electronic mail or other means
- Using foul or abusive language on the network or any electronic communication
- Use of university computers, systems, and/or services for commercial purposes or unauthorized financial gain
- Unauthorized solicitation for charity or other benefits
- Initiating or encouraging the promulgation of chain letters, unauthorized automated or mass postings, or other types of unauthorized large-scale distributions
- Accessing and/or disseminating pornography
- Copying for oneself or distributing to others commercial or other copyrighted software or proprietary data which has not been placed in the public domain or been distributed as freeware
- Installing and/or using personal wireless access points on the university network
- Removing any computer equipment (hardware, software, data, etc.) without authorization
- Intentionally intercepting, disclosing, or using any electronic communication to which authorized access is not explicitly provided; authorized access includes mail directed to or from an individual and those messages intended for public consumption (news groups, bulletin boards, broadcast messages)
- Providing others with access to one's personal computer account(s) or gaining or attempting to gain access to the personal computer accounts, files, or electronic information of others or to accounts, files, or systems to which authorized access has not been granted
- Supplying or attempting to supply false or misleading information or identification in order to access another user's network account or information
- "Hacking" or related behavior attempting to compromise university computer security or the security of remote systems accessed through university equipment or systems
- Unauthorized access to or use of data, systems, or networks, including any attempt to probe, scan or test the vulnerability of a system or network to breach security or authentication measures
- The unauthorized manipulation of university computer systems, programs, or data
- Tampering with or obstructing the operation of the network/computer systems owned by the university, students attending the university, or other third parties
- Using an unauthorized IP address
- Monitoring or sniffing of data on any network or system without express authorization of PLNU Information Technology Services
- Creating or releasing computer viruses or engaging in other destructive or potentially destructive programming activities
- Interference with service to any user, host, or network, including, without limitation, mail bombing, flooding, deliberate attempts to overload a system, and broadcast attacks
- Use of university computers, systems, and/or services to perpetrate fraud, misrepresentation, or illegal activity
- Any act chargeable as a violation of local, state, or federal law, whether or not charges are brought by civil authorities
Sanctions imposed as a result of violations of this Acceptable Use Policy may include, but are not limited to the following:
- Network resource suspension or termination
- Suspension or termination from the university
- Monetary reimbursement to the university or other appropriate sources
- Prosecution under applicable civil and/or criminal laws
The Student Development Office will adjudicate student violations of this Acceptable Use Policy.
Information Technology Services maintains the PLNU networks and monitors network traffic in accord with university, local, state, and federal laws and regulations.