Misconduct Online
Students are cautioned that behavior conducted online, may subject them to University action, if there is a University impact from the cyber-conduct. Students must also be aware that blogs, web pages, social media websites, and similar online communications are in the public sphere, and are not private. These postings can subject a student to allegations of conduct violations, if evidence of policy violations are online. The University does not regularly seek/search for this information, but will take action if and when such information is brought to the attention of the University. All references to “student” in the Technology Policies section of this Catalog refer to current students and alumni.
The following uses of University electronic mail are prohibited.
- Personal use that creates a direct cost for the University;
- Use for personal monetary gain or for commercial purposes that are not directly related to University business, including but not limited to, spamming, phishing, and/or soliciting personal information;
- Sending copies of documents in violation of copyright laws;
- Inclusion of the work of others into electronic mail communications in violation of copyright laws;
- Use of electronic mail to substantially disrupt the ability of others to conduct University business;
- Use of electronic mail systems for any purpose restricted or prohibited by laws or regulations;
- “Spoofing,” (i.e., constructing an electronic mail communication so it appears to be from someone else);
- Snooping,” (i.e., obtaining access to the files or electronic mail of others for the purpose of satisfying idle curiosity, with no substantial University business purpose); or,
- Attempting unauthorized access to electronic mail or attempting to violate any security measures on any electronic mail system, or attempting to intercept any electronic mail transmissions without proper authorization.
Online Communication: Written communication in an online community is an important factor in online educational programs. The ability to communicate clearly and effectively is crucial to the success of all online learning programs and should be reflected online. Language relevant to the course content should be used in the online discussion postings. Behaviors that do not support the inclusive learning environment and discourse includes, but is not limited to discrimination, hate speech, solicitation, etc.:
Discrimination: Derogatory statements that are based upon an individual’s actual or perceived sex, race, color, religion, sexual orientation, national origin, ancestry, citizenship, pregnancy, childbirth and related medical conditions, marital status, age, physical disability, mental disability, genetic information, medical condition (including certain cancer-related conditions and genetic characteristics), gender identity, veteran status, service in the uniformed services, political activities and affiliations, or any other consideration protected by law that is sufficiently serious that it interferes with or limits a student’s ability to participate in or benefit from the University’s educational program.
Solicitation: Students are prohibited from sending unsolicited emails to other users for non-academic reasons. Students may not send emails to classmates or post messages that attempt to sell products, promote business, or solicit employees.
Misuse of Technology Resources: University technology resources are to be used to advance the University’s mission of education, scholarship, and service. Students may use these resources for purposes related to their studies or research or other University-sanctioned activities. These resources include, but are not limited to, hardware (including telephones, computers, and traditional media equipment) either owned or leased by the University, software, and consulting time (and expertise) of the University technology support staff. The use of technology resources provided by the University for commercial or other purposes not directly related to study, research, or University-sanctioned activities should be considered as secondary activities (i.e., personal or otherwise). Should such secondary activity interfere with primary activities, it must be terminated immediately.
Many of the University’s technology resources are shared among the entire University community. The use of these resources will not violate law or the rights of others. Prohibited activities include, but are not limited to:
- Activities that violate copyright or other intellectual property rights of others, including but not limited to, the infringing use of peer-to-peer file sharing services;
- Sending copies of documents in violation of copyright laws via email or any other electronic transmission;
- Inclusion of the work of others into email communications or any other electronic transmission in violation of copyright laws;
- Activities that obstruct usage or deny access to technology resources;
- Activities that could be considered as discriminatory harassment, libel or obscenity;
- Activities that substantially disrupt University activities;
- Activities that violate University policies, local, state, or federal laws;
- Unauthorized use of computer accounts;
- Impersonating other individuals;
- Attempts to exploit or explore security provisions, either at the University or elsewhere;
- Activities that invade the right to privacy of others;
- Destruction or alteration of data belonging to others;
- Creating, using or distributing computer viruses;
- Allowing other individuals to use your account or password, including for the purpose of meeting attendance requirements in an online class;
- Disruption or unauthorized monitoring of electronic communications or of computer accounts; and
- Inappropriate/widespread email distribution.
Consequences for Misuse of Technology Policies
If it is determined that a student is found responsible for misuse of the Technology Policies, the issue may be referred to Student Affairs for review and sanctioning, up to and including removal from the University.