PhilaUCatalogHeader.png

Computing Policies (OIR)

General Purpose Computing Labs

The General Purpose Computing Labs provide access to computing and information resources for the academic community and support for students, faculty, and staff using computing resources. The labs provide access to a contemporary, high-speed data network, PCs & Macs, and an extensive array of software applications. There are three general-purpose labs (75 devices) located in Search Hall and more than 80 PCs & Macs located in the Gutman Library.

Numerous specialized labs can be found on the Main, Bucks County, and PURC campus sites all providing access to highly specialized software applications and peripherals for input and customized output. Each summer, incoming students are provided with a username and password prior to the start of the freshmen year. Students must use their username and password (which expires every 90 days) in order to use PCs or Macs in any campus location. All residence halls, apartments and townhouses are connected to the University's high-speed network and the

Internet at a frequency of one port per pillow. The University provides a rich array of network resources including, file storage space, web space, shared directory space, library databases and web-based information resources. Additional information about the Office of Information Resource's network can be viewed at www.philau.edu/oir.

Information Resources - Conditions of Use

The Office of Information Resources (OIR) is responsible for the information and technology resources at Philadelphia University. OIR develops and provides services in support of the students, faculty, and staff engaged in academic, research, and administrative activities at the University. All members of the Philadelphia University community are responsible for using information resources in a responsible, ethical, legal, and secure fashion. The conditions of use were developed and based on mutual respect and cooperation and are intended to promote the aforementioned manners of behavior for the protection of all University constituents.

Authorized Use

Students using the University's information resources agree to the following terms and conditions of use:

  1. To respect the privacy of others - for example, not to intentionally seek information on, obtain copies of, or modify files or passwords belonging to other users or the University, or represent others (i.e., logon as someone else).
  2. To respect the legal protection provided by copyright and licensing of programs and data - for example, not to make copies of a licensed computer applications to avoid licensing fees or to unlawfully share applications or application files with others.
  3. To respect the intended use of accounts - for example, to use assigned accounts, transactions, data and processes authorized by faculty, department heads or project directors only for the purposes specified. Not to access or use other accounts, transactions, data or processes for which authorization is not permitted.
  4. To respect the integrity of the system or network - for example, do not develop or use programs, transactions, data or processes that infiltrate or harm the system(s), damage or alter software applications or data components of a system.
  5. To respect the rights of others- for example, to comply with all University policies regarding any form of harassment or inappropriate behavior, and not divulge sensitive or confidential personal data concerning students, faculty, or staff.
  6. To adhere to all General University Policies and Procedures this includes, but is not limited to, policies on proper use of information resources, information technology and networks; acquisition, use and disposal of University-owned computer equipment; use of telecommunications equipment; ethical or legal use of software applications and software application files; and ethical or legal use of data.

 

External networks (internet service providers) through which Philadelphia University maintains connections (e.g., the Internet) have established acceptable-use standards. It is the student's responsibility to adhere to the standards of such networks and not violate the policies of an external network provider.

 

The Office of Information Resources provides security of data files, account numbers, authorization codes, and passwords pertaining to the University's core activities. Students, faculty and staff are partners in the process of information security and are urged to safeguard

their data, authorization codes and passwords; to take full advantage of file-security mechanisms built into the computing systems; to change password when prompted every 90 days; and to follow the security policies and procedures established to control access to and use of the University's data and information resources.

 

Violation of Conditions of Use

 

Violation of any of the above conditions of use represents unacceptable behavior and practice and may violate University policy or state and federal law. Students are expected to report possible violations of the above listed terms and conditions of use to the Technology Help Desk. The Office of Information Resources may initiate an investigation and/or suspend the access privileges of an individual(s) or the account(s) in question. If a violation has occurred, the appropriate offices (Student Life, and/or Human Resources) will become involved and which may result in disciplinary review, expulsion from the University, disciplinary action, up to and including termination of employment, and/or legal action.

 

Appropriate and Responsible Use

 

Information technology and information resources shall be used in a manner consistent with the instructional, research and administrative objectives and goals of the University.

Students are expected to use information resources in a responsible and efficient manner. The Office of Information Resources' services include communication systems, such as messaging and communication applications. Students, faculty, and staff who use these services and tools are expected to adhere to existing University policies prohibiting all forms of harassment. Students should be mindful of and abide by the standards of good citizenship and behavior described in

the Student Code of Conduct. Students should not store usernames and passwords in a publicly accessed desktop system, nor should they share their usernames and passwords with others under any circumstances.

 

Office of Information Resources Responsibilities

 

The Office of Information Resources prefers not to act as a disciplinary office and will work with the Division of Student Life whenever required. In situations involving unauthorized or inappropriate behavior or a violation of the conditions of use, OIR may take timely action to

limit the scope and impact of a violation by curtailing the access to information resources for any individual(s) or account(s) involved in an inappropriate activity. Any subsequent investigation of a series of events surrounding a possible violation of the conditions of use must have the knowledge and approval of the Vice President for Information Resources/CIO. Such an investigation may include the examination of files, passwords, account information, printouts, tapes, or other electronic material or communications that may aid the investigation. Any student involved in such an investigation is expected to cooperate with all offices involved in the

process. The Office of Information Resources will work directly with the Division of Student Life for guidance and coordination during such an investigation. Students may direct questions about the Conditions of Use Statement to the Office of Information Resources (send via e-mail to HelpDesk@PhilaU.edu or contact the Help Desk (215-951-4846).

 

Mass Distribution of Email

 

Messages to be sent to members of the Philadelphia University community (students, faculty, or staff) must be approved by the Office of Student Activities and/or the department of Public Relations. Members of those respective offices will be responsible for distributing the email to the University community using the most effective means available. The following guidelines should be followed when considering content for mass-distribution to the University community.

  1. The message must be in regard to University business and may not be used to send information about personal items for sale, to forward jokes, to continue chain letters or to share information of interest to only a small segment of the University community;
  2. The information conveyed should contain sufficient news value. Announcements of regularly scheduled meetings and activities do not generally warrant University-wide distribution via e- mail;
  3. The audience should be targeted and customized distribution lists should be created for specific groups of people;
  4. An expiration date should be set so that a message will automatically expire after the date of the announcement or event.
  5. Attachment size should be not exceed 10 MB.