Student Handbook 2021-2022

Walsh

Acceptable Use Policy

The following policies define the privileges of and restrictions on Walsh students and non-Walsh account holders who are provided with accounts to access the information resources and information technology of Walsh. The policies include examples of activities that are detrimental to the welfare of the overall community and are therefore prohibited.

This section also describes the process by which violators are identified, investigated, and disciplined. It should be noted that some activities that are legal are in violation of this policy and are prohibited with respect to Walsh information technology. Note that this policy does not apply to the employees, faculty and contractors who are governed by the policies of the Walsh Employee Handbook.

Walsh characterizes as unethical and unacceptable, and just cause for taking actions up to and including dismissal, and/or legal action, any activity prohibited by this policy statement.

Access to the information resources and information technology at Walsh is a privilege and must be treated as such by all users. The primary purpose of the information resources and information technology at Walsh is to fulfill the goals previously described. Use for other purposes, such as personal recreation, is secondary. A modest level of secondary use is permitted, but if secondary use activities interfere with fulfillment of the primary purposes of the technology, those activities may be terminated or restricted. Specific restrictions on use follow.

Walsh advises all users of its information resources and information technology that it has the right and the duty and will routinely monitor the use of its technology to prevent and detect any violations of these policies or applicable laws. Monitoring of use and investigation of suspected violations will be done routinely by the Office of Information Technology (OIT) and without prior notice. Investigations may also be initiated by faculty department chairs, officers and cost center directors of Walsh and will be carried out by the OIT department. Computer activity that may be monitored includes, but is not limited to:

  • Files and data stored on Walsh computers
  • Programs installed on Walsh computers and programs used on Walsh network
  • Websites visited
  • Electronic messages sent and received
  • Information uploaded, downloaded and posted
  • Usage levels
  • Access to Sensitive (confidential) information

All of these computer activities are visible and verifiable by Walsh’s network management facilities.

Unless otherwise indicated, the following are prohibited activities. This list may not be exhaustive. Additional prohibitions may be communicated to the community at any time:

  • Students may not use any resource, equipment, or software to harass, discriminate against or threaten others. Such conduct may constitute a violation of Walsh policy, including but not limited to the Policy on Discrimination, Harassment and Sexual Misconduct in this handbook. Example: A student must not use the computer to contact another person repeatedly where no legitimate purpose exists and the recipient requests the communication to stop.
  • Students may not steal, forge, lie, cheat, eavesdrop, intercept, attempt to intercept, or compromise information. They may not alter the content of a message with the intent to deceive.
  • Students may not attempt to access or disclose any confidential or private information about Walsh, other students, staff, faculty or contractors. Confidential or private information includes, but is not limited to, personal information, health information, student records and Walsh business records.
  • Students may not masquerade as another user. They may not misrepresent the identity of the sender or source of an electronic communication. They may not acquire or attempt to acquire or discover the passwords of others. Example: A student must not access or attempt to access the account of another student, even if the student left their account logged in. Tip: Always log out of an application when you are not using it or lock your desktop. Tip: Always use long and complex passwords that meet the Walsh password guidelines. Never use passwords that can be easily guessed or that may be found in a dictionary. If you believe someone may know or be using your password, change it and report the security policy violation to the Office of Information Technology (OIT).
  • Students may not in any way destroy, damage, or alter any information, resource, equipment, or software, or monopolize computing resources. Example: Generating activities that consume excessive network bandwidth or other system resources causing or threatening to cause disruption of system availability. These activities could include “spam,” sharing or downloading large files, using a file sharing service, or generating Denial of Service network packets. Example: Deliberately installing malicious software such as a worm, virus, key logger or rootkit. Example: Accessing and altering information without authorization.
  • Students may not scan Walsh network for vulnerabilities without direct authorization from the OIT Director. Scanning of a separate non-production network Cybersecurity Lab or Virtual Lab is permitted when required for a class and authorized by the instructor.
  • Students may not possess any software, resource, or equipment whose purpose is to affect a violation of any of these policies. Exceptions will be made for software, resources and equipment required or recommended for classes the student is currently enrolled. This exception does not give any student permission to use the software, resources or equipment to violate any of these policies. Example: Possessing on any Walsh-owned system account or on the student’s personal computer those programs which may be used to determine the passwords of others, intercept network traffic or to obtain computer system privileges beyond those authorized.
  • Students may not attempt to violate any of these policies. An attempt will be considered the same as a violation. Example: If a student attempts to obtain system privileges to which they are not entitled, the student is as guilty as if they had succeeded.
  • Students may not create, possess, willingly receive, or distribute obscene material. Examples: Child pornography is absolutely against the law. It is a violation of Federal statutes to possess this material or to transmit it across state lines, even electronically.
  • Students may not violate this Technology Usage Policy off-location anywhere in the world using Walsh resources. Example: An attempt to gain unauthorized entry to a Walsh computing resource such as the Walsh Student Portal, email etc., via any computer off Walsh location is treated as if the student attempted to gain access from a computer located on location.
  • Students may not copy, install, or use any equipment, service, information, data, image, recording, or other work in violation of applicable copyrights or license agreements, including media file-sharing, streaming, or hosting. Example: If a student places on Walsh computing resources or uses Walsh’s network to download to a personal device any material created by or belonging to others, they must have their documented permission to do so, and will be expected to produce written permission when proprietary or copyrighted material is involved.
  • Students may not use Walsh’s information resources or information technology for political purposes or non-Walsh commercial business or advertising. Students must not generate unsolicited commercial email unless they have express written authorization to do so from the appropriate authority. However, any officially sanctioned Walsh student group may maintain an official Web page that presents objective information about the group itself. Example: Individuals may not use Walsh owned statistics software on the academic shared systems to do work for off-location entities for which they are paid. Example (Permitted activity): The Young Democrats/Republicans may have a page that presents information about their activities and goals. They may not engage in the following activities, which is not an exhaustive list: endorsing a candidate for office; linking to a candidate’s campaign site; or political fundraising. Example: The sending of unsolicited bulk email (spamming) is not allowed.
  • Students may not make alterations to the Walsh network. They must not add or alter network components such as routers, wireless routers, firewalls or switches. They must not add to or alter cabling. They must not alter domain names or IP addresses. Example: A student must not add a wireless router to any Walsh network jack or port. Example: All IP addresses and domain names are owned and assigned by the Office of Information Technology. The Office of Information Technology may also restrict World Wide Web, ftp and other network services that interfere with fair network use by others.
  • Students must take full responsibility for what they publish, download, transmit, or possess.