The following policies define the privileges of and restrictions on Walsh students and non-Walsh account holders who are provided with accounts to access the information resources and information technology of Walsh. The policies include examples of activities that are detrimental to the welfare of the overall community and are therefore prohibited.
This section also describes the process by which violators are identified, investigated, and disciplined. It should be noted that some activities that are legal are in violation of this policy and are prohibited with respect to Walsh information technology. Note that this policy does not apply to the employees, faculty and contractors who are governed by the policies of the Walsh Employee Handbook.
Walsh characterizes as unethical and unacceptable, and just cause for taking actions up to and including dismissal, and/or legal action, any activity prohibited by this policy statement.
Access to the information resources and information technology at Walsh is a privilege and must be treated as such by all users. The primary purpose of the information resources and information technology at Walsh is to fulfill the goals previously described. Use for other purposes, such as personal recreation, is secondary. A modest level of secondary use is permitted, but if secondary use activities interfere with fulfillment of the primary purposes of the technology, those activities may be terminated or restricted. Specific restrictions on use follow.
Walsh advises all users of its information resources and information technology that it has the right and the duty and will routinely monitor the use of its technology to prevent and detect any violations of these policies or applicable laws. Monitoring of use and investigation of suspected violations will be done routinely by the Office of Information Technology (OIT) and without prior notice. Investigations may also be initiated by faculty department chairs, officers and cost center directors of Walsh and will be carried out by the OIT department. Computer activity that may be monitored includes, but is not limited to:
All of these computer activities are visible and verifiable by Walsh’s network management facilities.
Unless otherwise indicated, the following are prohibited activities. This list may not be exhaustive. Additional prohibitions may be communicated to the community at any time: