{"id":305,"date":"2018-03-12T16:12:23","date_gmt":"2018-03-12T20:12:23","guid":{"rendered":"http:\/\/www.montclair.edu\/faculty-handbook\/?page_id=305"},"modified":"2022-02-16T15:51:07","modified_gmt":"2022-02-16T20:51:07","slug":"guidelines-for-responsible-computing","status":"publish","type":"page","link":"https:\/\/www.montclair.edu\/faculty-handbook\/regulations\/guidelines-for-responsible-computing\/","title":{"rendered":"Guidelines for Responsible Computing"},"content":{"rendered":"
The computing resources at 麻豆传媒在线 support the instructional, research and administrative activities of the University. Examples of these computing resources include, but are not limited to, the central computing facilities, the campus-wide network, local-area networks, electronic mail, access to the Internet, the World Wide Web, voice mail, departmental networks, the public computing facilities and related services. Users of these services and facilities have access to valuable University resources, to sensitive data and to external networks. Consequently, it is appropriate for all users to behave in a responsible, ethical and legal manner. In general, appropriate use means respecting the rights of other computer users, the integrity of the physical facilities and all applicable license and contractual agreements. The regulations described in the Guidelines for Responsible Computing apply to all computing systems owned or managed by 麻豆传媒在线. Individual departments may have additional guidelines regarding computing equipment held in those departments. Interested parties should contact the department chair for more information about computing guidelines in a specific department.<\/p>\n
Access to the University’s computing facilities is a privilege granted to University students, faculty and staff. Data owners – whether departments, units, faculty, students or staff – may allow individuals other than University faculty, staff and students access to information for which they are responsible, so long as such access does not violate any license or contractual agreement; University policy or guidelines; or any federal, state, county or local law or ordinance.<\/p>\n
The University vests the responsibility for ensuring the integrity and performance of its computing systems in various system administrators. While respecting the rights of all users, when the integrity of the system is threatened, systems administrators are authorized to take those actions necessary to maintain the system and are fully accountable for their actions.<\/p>\n
These guidelines apply to all users of computing resources owned or managed by 麻豆传媒在线, including but not limited to faculty and visiting faculty, staff, students, guests of the administration, external individuals or organizations and individuals accessing external network services, such as the Internet, via 麻豆传媒在线’s computing facilities.<\/p>\n
Central time-sharing computing facilities
\nFaculty, graduate and undergraduate students, and University employees may use the central computing facility for activities related to research, instruction or University administration.<\/p>\n
Other computing resources
\n麻豆传媒在线’s computing facilities and services – such as the public computing labs, consulting services and training – are available to members of the University community.<\/p>\n
Departmental and School computing resources
\nFor information on access to departmental and school computing resources, contact the appropriate department chair or Dean.<\/p>\n
Users should use all available methods to protect their files, including the frequent changing of their passwords, encryption of data where appropriate, and storing backup copies of information off-site. In the event that data have been corrupted as a result of intrusion, a system administrator should be notified immediately. Every reasonable attempt will be made to restore files to their status prior to intrusion. However, full restoration cannot be guaranteed.<\/p>\n
麻豆传媒在线 provides reasonable security against intrusion and damage to files stored on campus computing facilities. The University provides some facilities for archiving and retrieving files specified by users, and for recovering files after accidental loss of data. However, neither 麻豆传媒在线 nor its computing staff can be held accountable for unauthorized access by other users, nor can they guarantee protection against media failure, fire, floods, or other disasters.<\/p>\n
Although the University backs up some departmental servers and makes reasonable attempts to protect those servers from intrusion, it does not provide the same level of protection or offer restoration of files stored on departmental servers or personal computers. Therefore, it is especially important that users back up their files and use all available means to protect their data on departmental systems.<\/p>\n
麻豆传媒在线 participates in a range of computing networks, and many members of the community regularly use these networked computers in their work. Statements in public (i.e., not private) files in this medium are protected by the same laws, policies and guidelines, and are subject to the same limitations, as communications in other media. The same holds true for electronic personal files and communications (e.g. email). However, users should exercise caution when committing confidential information to electronic media, because the confidentiality of such material cannot be guaranteed. For example, routine maintenance or system administration of a computer may result in the contents of files and communications being inadvertently seen.<\/p>\n
Network and system administrators are expected to treat the contents of electronic files as private and confidential and to respect the privacy of all users. Members of the computing staff are forbidden to log on to a user account or to access a user’s files unless the user gives explicit permission (for example, by setting file access privileges).<\/p>\n
An exception to these privacy guidelines may be made, however, when a program or individual is suspected of threatening the integrity of the network or other shared services. Examples of such programs include worms or viruses. In such instances, the system administrator will immediately notify either the Associate Vice President for Information Technology or the Director of Academic Computing and a decision will be made as to whether the threat requires immediate action. If an immediate response is required, it will be undertaken and careful records will be kept as to the accounts and files examined. Once the threat is removed and system integrity restored, the Associate Vice President for Information Technology or the Director of Academic Computing will consult with the appropriate senior officer of the University and a written and an oral report will be forwarded to everyone involved in a timely fashion.<\/p>\n
If the instance does not require immediate action but privacy must still be breached, then reasonable attempts will be made to contact the file-owner by telephone and e-mail. If the attempts are not successful or the file-owner refuses permission, the system administrator in conjunction with either the Vice President for Information Technology or the Director of Information Technology, after consultation with an appropriate senior officer of the University, is permitted to examine the accounts and files involved. Afterward, a written report will be forwarded to everyone involved in a timely manner.<\/p>\n
Any inspection of electronic files, and any action based upon such inspection, will be limited to what is necessary to restore the integrity of the system and will be governed by all applicable federal and New Jersey laws.<\/p>\n
Similar principles and procedures apply to the temporary denial of service. In particular, a system manager cannot deny access to a user without following the due process procedures outlined above. An exception to these procedures may be made for routine maintenance and system administration; however, every effort will be made to perform such activities during off-hours. Any extended denial of access can only result from a fair hearing in accordance with University judicial procedures.<\/p>\n
麻豆传媒在线 makes every effort to maintain an error-free hardware and software environment for users and to ensure that the computing staff are properly trained. Nevertheless, it is impossible to ensure that hardware or system software errors will not occur or that staff will always give correct advice. 麻豆传媒在线 presents no warranty, either expressly stated or implied, for the services provided. Damages resulting directly and indirectly from the use of these resources are the responsibility of the user.<\/p>\n
When significant changes in hardware, software or procedures are planned, the University community will be notified through electronic and other media to ensure that all users have enough time to prepare for the changes and to voice any concerns that they might have.<\/p>\n
Those who avail themselves of the campus and network computing resources are required to behave in their use of the technology in a manner consistent with 麻豆传媒在线’s codes of conduct.<\/p>\n
The University subscribes to the statement on software and intellectual rights distributed by EDUCAUSE, the non-profit consortium of colleges and universities committed to the use and management of information technology in higher education, and the Information Technology Association of America (ITAA), a computer software and services industry association:<\/p>\n
“Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to work of all authors and publishers in all media. It encompasses respect for the right to acknowledgment, right to privacy, and right to determine the form, manner, and terms of publication and distribution.”<\/p>\n
“Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against members of the academic community.”<\/p>\n
The University is a “carrier” of information via electronic channels rather than a “publisher” (except with regard to official University publications) and therefore not expected to be aware of, or directly responsible for, material any individual member of the University community posts, sends, or publishes via the World Wide Web or Internet groups.<\/p>\n
The following list does not cover every situation which pertains to proper, or improper, use of computing resources, but it does suggest some of the responsibilities which you accept if you choose to use a computing resource or the network access which the University provides.<\/p>\n
Privately-owned computer systems, when attached to the University’s data network and\/or other campus resources, are subject to the same responsibilities and regulations as pertain to University-owned systems. You are responsible for protecting the University’s property, license agreements, and good name from damage by others to whom you might provide access, and for assuring that no copyrighted material is published on, or distributed from, that system without permission of the copyright holder.<\/p>\n
You should be aware that there are other federal, state and sometimes local laws which govern certain aspects of computer, broadcast video, and telecommunications use. Additional legislation is emerging. Members of the University community are expected to respect and comply with the federal, state and local laws in use of the campus technologies and University-provided network access, as well as to observe and respect University-specific rules and regulations.<\/p>\n
Violations of the University Guidelines for Responsible Computing are treated like any other ethical violation as outlined in the Student Handbook, relevant contractual agreements, and applicable faculty and staff handbooks. Violators may also be subject to prosecution under applicable Federal and New Jersey statutes.<\/p>\n
This document contains excerpts and paraphrased sections from similar documents prepared by Brown University, Princeton University, University of Delaware, University of Illinois at Champaign-Urbana, Iowa State University and the Electronic Frontier Foundation. We gratefully acknowledge their contributions.<\/p>\n","protected":false},"excerpt":{"rendered":"
I. SUMMARY The computing resources at 麻豆传媒在线 support the instructional, research and administrative activities of the University. Examples of these computing resources include, but are not limited to, the central computing facilities, the campus-wide network, local-area networks, electronic mail, access to the Internet, the World Wide Web, voice mail, departmental networks, the public computing […]<\/p>\n","protected":false},"author":80,"featured_media":809,"parent":285,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-305","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/pages\/305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":1,"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/pages\/305\/revisions"}],"predecessor-version":[{"id":1512,"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/pages\/305\/revisions\/1512"}],"up":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/pages\/285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/media\/809"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/faculty-handbook\/wp-json\/wp\/v2\/media?parent=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}