Information, Network and Internet Usage policy
This policy applies to all users of computing resources owned or managed by NGU.
Individuals covered by the policy include (but are not limited to) University faculty and visiting faculty, physicians, staff, students, alumni, contractors, volunteers, guests or agents of the administration, and external individuals and organizations accessing network services via the University’s computing facilities.
Computing resources include all University-owned, licensed, or managed hardware and software, University assigned user accounts, and use of the University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.
These policies apply to personally owned computers and devices connected by wire or wireless to the University network, and to off-site computers that connect remotely to the University’s network services.
In making acceptable use of resources, individuals covered by this policy must:
- Use resources only for authorized purposes.
- Protect their user-id(s) and system from unauthorized use. Each individual is responsible for all access to university information resources and technology by their user-id(s) or any activity originating from their system. An individual’s user-id and password act together as their electronic signature.
- Access only information to which they have been given authorized access or that is publicly available.
- Use only legal versions of copyrighted software in compliance with vendor license requirements.
- Be considerate in the use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, degrading services, or wasting computer time, connection time, disk space, printer paper, manuals, or other resources.
- Restrict personal use of the university’s information resources and technology to incidental, intermittent, and minor use that is consistent with university Policy
- Include only material germane to university matters in university, school, or departmental electronic communications, such as e-mail, websites, blogs, etc.**
In making acceptable use of resources, individuals covered by this policy must not:
- View any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material;
- Use unlawful material, or material that is defamatory, threatening, discriminatory, extremist or which has the potential to radicalize themselves or others;
- Use unsolicited “nuisance” emails;
- Access material which is subsequently used to facilitate harassment, bullying and/or victimization of a member of the university or a third party;
- Use material that promotes discrimination on the basis of race, gender, religion or belief, disability, age or sexual orientation;
- Use material with the intent to defraud or which is likely to deceive a third party;
- Use material which advocates or promotes any unlawful act;
- Use material that infringes the intellectual property rights or privacy rights of a third party, or that is in breach of a legal duty owed to another party;
- Use material that brings the university into disrepute.
- Waste staff effort or other university resources;
- Corrupt, alternate or destroy another User’s data without their consent;
- Disrupt the work of other users or the correct functioning of the university Network;
- Deny access to the university network and its services to other users.
- Pursue commercial activities (even if in support of university business).
- Introduce data-interception, password-detecting, or similar software or devices to the university’s network;
- Seek unauthorized access to restricted areas of the university’s network;
- Access or try to access data where the user knows or ought to know that they should have no access;
- Carry out any hacking activities.
- Intentionally or recklessly introduce any form of spyware, computer virus, or other potentially malicious software.
In the event of a breach of this Acceptable Use Policy by a User the University may in its sole discretion:
- Restrict or terminate a User’s right to use the University Network;
- Withdraw or remove any material uploaded by that User in contravention of this Policy; or
- Where appropriate, disclose information to law enforcement agencies and take any legal action against a User for breach of this Policy, including but not limited to claiming all costs, fees, and disbursements (including but not limited to legal fees) connected therewith.
In addition, where the User is also a member of the University community, the University may take such action, disciplinary or otherwise as it deems appropriate and which is in accordance with its Charter, Statute, Ordinances, and Regulations.
All computing, telecommunication, and networking facilities provided by the University, with particular reference to all computing devices, either personal or University owned, connected to systems and services supplied.