Policy Governing Information Technologies

TELEVISION, COMPUTERS, AND THE POST NETWORK 

All residence hall rooms are equipped with cable TV and computer internet access. Students must provide their own equipment (computer, television) to access the Post University information network. If assistance is needed with one of these items, the ICT Helpdesk is available between the hours of 7am-7pm by calling 203.591.7145. A voicemail system will pick up after hours. Students are asked to leave clear and accurate messages with needs and requests, a daytime phone number, and their residence hall room number so that every attempt can be made to address reported issues in a 24-hour time frame. Questions can also be submitted to the Help Desk at ICT@Post.edu.


CABLE TELEVISION USE 

The Post University residence halls are equipped with standard cable access. We have contracted with the local cable company to provide BASIC Cable. Premier channels are neither included in the package, nor available for an additional cost. Students must provide their own television set with coaxial connectors and a coaxial cable to access this service.


TELEPHONE USE

Post University provides phones in the hallways of all of our residence halls. These phones are 
available for local calls and any emergencies. 


COMPUTER USE 

Post University treats policy violations of computing facilities, equipment, software, information resources, and network privileges seriously. Any such problems must be reported to Residential Life staff or directly to ICT. Failure to comply with this policy will result in disciplinary action including loss of computing privileges, fine/restitution or other sanctions deemed necessary by the sanctioning board. Alleged violations of the policy shall be processed according to the judicial processes outlined in the "Student Handbook." Post University may also prosecute abuse under the Computer Fraud and Abuse Act of 1986, or other appropriate laws.   
 
Post University provides email addresses to all students and adjunct faculty. For students, these 
email addresses will continue to be available even after the student graduates. The University 
reserves the right to access user mailboxes and deactivate or restrict use of campus email accounts 
at any time. 

Each residence hall room is equipped with a network jack, and students are encouraged to purchase personal computers and to use them in their residence hall rooms. It is the responsibility of the student to ensure that proper care is taken in protecting their computer and the data stored therein. To enjoy the privileges of Post University intranet and Internet access, each network user is expected to meet certain responsibilities and honor certain limitations.  

If a user is found to have knowingly violated a network responsibility, his or her network access may be suspended. Depending on the seriousness of the violation, the user may also be subject to other University disciplinary actions. Violations of federal or state laws will result in referral to the appropriate legal authorities.

The following list of responsibilities applies to the use of all University-owned computers, as well as the use of the Post intranet and the Internet with a personally owned computer. (Additional responsibilities may be associated with specific networks and computers at Post University.)

  • Users must operate within the appropriate federal or state laws and Post University policies and must not engage in any conduct that presents a risk to the operating integrity of the systems and their accessibility to other users.
  • Users must abide by the terms of all software licensing agreements and copyright laws.
    Users must not make copies of, download or make available on the network, any
    copyrighted material, unless permitted by a license.
  • Users must not use the network resources of Post University to gain or attempt to gain unauthorized access to remote computers, networks, or systems.
  • Users may not use Post University networks to access, produce, or distribute pornography in violation of the law either on the Internet or Post University networks.
  • Any network traffic exiting Post University is subject not only to provisions of this policy, but also to the acceptable use policies of any network through which, or into which, it flows.
  • Users must notify the ICT Office, system administrators, and the appropriate authorities about violations of computer laws and policies, as well as about potential loopholes in the security of its computer systems and networks.
  • Users are to respect the rights of other users, including their rights as set forth in other Post
    University policies for students, faculty, and staff. These rights include but are not limited
    to: privacy, freedom from harassment, and safety of tangible and intellectual property.
  • Users may not place on any University-owned computer system any type of information or software that infringes upon the rights of another person or gives unauthorized access to another computer account or system.
  • Users may not misrepresent themselves or their data on the network.
  • Users are responsible for the use of their own accounts. No user may give anyone else access to his or her account, or use a Post University computer account assigned to another user. A user must not attempt to obtain a password for another user's computer account.
  • Users are responsible for the security of their passwords. This includes making sure no one else knows it. A user who suspects someone knows his or her password should contact ICT to have that password changed.
  • Users must not attempt to monitor other users' data communications, nor read, copy, download, change, or delete other users' files or software, without permission of the owner(s).
  • Users must not attempt to circumvent data protection schemes or exploit security loopholes.
  • Users must not deliberately perform acts that are wasteful of computing resources or which unfairly monopolize resources to the exclusion of others users.
  • Users must not deliberately perform acts that will seriously impair the operation of computers, terminals, peripherals, or networks. This includes, but is not limited to, tampering with components  of a local area network (LAN) or the high-speed network, otherwise blocking communication lines, or interfering with the operational readiness of a computer.
  • Users must not run or install, or give to another user, a program that could result in the eventual damage to a file or computer system and/or the reproduction of itself on any of the computer systems of Post University. This is directed towards, but not limited to, the classes of programs known as computer viruses, Trojan horses, and worms.
  • Users must not use Post University computer systems or networks for solicitation of funds or for commercial purposes. This includes solicitations for charitable or community organizations.
  • Users must not use Post University networks to distribute chain letters.
  • Students who violate these conditions face university judicial action.
     

POLICY STATEMENT REGARDING ANTI VIRUS SOFTWARE

Because of the inherent dangers associated with the introduction of viruses into computer systems, Post University requires that all students have their computers scanned by the ICT department prior to connecting their PC to the university network. Students who are authorized to attach their personal computers to the University network must ensure that their computer has virus
protection to the same level as University-owned equipment. This means that students must have current antivirus software installed and running on their computers, and that information about new viruses and new virus definition files are downloaded on a daily or weekly basis. Expired software or out-of-date definition files is equal to having no antivirus protection.

Currently, it is each student's responsibility to purchase, install, and update his/her own antivirus software. If upon scanning, the ICT department determines that antivirus software is missing or out- of-date, Post reserves the right to deny service to the Network until the issue is resolved. Once the ICT
department determines that the proper virus protection exists on the computer and that the computer is virus free they will issue a verification notice and the student will be connected to the network.

The University reserves the right to enter a student's room if it is believed that the computer within the room is infected and disabling the University network, running software that has the potential to disable the network, or is exhibiting malicious behavior such that the campus network is compromised. Every effort will be made to contact the student prior to doing so. The University also reserves the right to take a single or series of computers off-line to ensure the protection of the University system.


CAMPUS PRINTING

Campus printing is handled via print management software called Papercut. This system allows us to regulate printing by associating a value to each page printed. Every account is given $50 per year and the cost is $0.10 per page to print. If an account is depleted of funds, the user can speak to the librarian about recharging the account at cost to the student.

Printing credentials are to be kept private and secure. Do not share your account information. Do not allow other users to print using your credentials.


CELL PHONE USAGE

The use of cells phones has become a prevalent and important part of our society. While the ability to communicate through a wireless network is a prominent communication technology, it is critical that usage by students, faculty and staff does not disrupt the routine or the academic mission of the university.

In keeping with this philosophy, the university requests that all cell phones be turned off or turned to silent mode and that no cell phone conversations or text messaging take place while students are attending class, while working in open areas of Post University offices, while engaged in university meetings or while attending university events. Also, students may not leave class to have a cell phone conversation.

All cell phones must be turned off or on silent mode in restricted areas. However, if it is necessary to accept a call the individual should leave the restricted area for the duration of the call.

 

Download Polices