Acceptable Use Policy
Stevens Institute of Technology expects that all persons who make any use of computing hardware, software, networking services, or any property related or ancillary to the use of these facilities will abide by the following policy statement:
Information Technology resources are provided in the hope that the community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.
All hardware, software, and related services supplied by Stevens are for the sole purpose of supplementing and reinforcing the institution’s goals as set forth in the student and faculty handbooks and mission statement. We expect that no one will use hardware, software or services without authorization to do so. There has also been increasing concern over legal issues when using electronic communications. There are already laws that prohibit the following:
- Electronic libeling or defaming another person
- Sending/Posting messages that incites hate or discontent
- Transmitting repeated unwanted sexual advances
- Falsifying' information via impersonation
- Unauthorized use, providing, or copying protected intellectual property.
While the Internet is considered a public electronic highway, the Stevens network is a private resource. As such, access and use of the network must in accordance with Stevens' rules and policies as well as all legal regulations. Therefore, the following actions are strictly prohibited:
- Posting or transmission of confidential or classified information.
- Use of offensive or discriminatory language.
- Transmission of any graphic image, sound or text that is sexual in nature.
- Giving account passwords to individuals who are not the owners of such accounts.
- Obtain passwords to or use of accounts other than one's own.
- Use of resources for personal profit or gain.
- Harass, threaten, or otherwise invade the privacy of others.
- Initiate or forward e-mail chain letters.
- Cause breaches of computer, network or telecommunications security systems.
- Initiate activities which unduly consume computing or network resources.
The following actions are required:
- The MAC (physical address) of network devices must be registered with the Computer Service Center or the user must authenticate with a valid username and password.
- Members of the campus community must maintain their computers with virus-protection software, spyware protection, and operating system updates.
To ensure the lawful and ethical use of electronic communications, rights to privacy when using electronic communications at Stevens Institute of Technology are limited. Stevens reserves the right to monitor electronic messages and information stored on computers owned by Stevens. For example; email, web pages, conference contents, voice mail, are subject to archiving, monitoring or review and/or disclosure by others than intended recipients.
Failure to comply with the terms of this policy will be met with disciplinary and/or legal action.