Hofstra University Computer Networks Acceptable Use Guidelines
Hofstra University is pleased to provide you access to its computing and information facilities, for the pursuit of supporting your educational goals.
Your access to the University's computing facilities and networks is granted subject to local, state, and federal laws; and University Judicial Code. These guidelines are designed to promote legal, ethical, and academic honesty, and encourages restraint in the consumption of shared resources. Adherence to these guidelines demonstrates respect for the laws of intellectual property, ownership of data, system security mechanisms, and for an individual's rights to privacy and freedom from intimidation, harassment, and unwarranted annoyance.
Hofstra University expects you to exercise responsible, ethical behavior according to these guidelines when using its computing facilities. Access to Hofstra University Computer resources is granted as long as these guidelines are followed. By connecting and or logging on to the Hofstra University computers and networks the user agrees to the terms and conditions of these Acceptable Use Guidelines as outlined below.
Password and Accounts
You are responsible for all usage of your account(s). Protect your password. Do not tell it or show it to anyone, including family members, friends or acquaintances. Properly log out of the system when you finish. Your account is for your personal use only.
Do not use another person's account regardless of how access to the account is obtained.
Commercial Use of University Resources
Your account is intended for the pursuit of your educational goals. You may not use the Hofstra University computer resources to solicit sales, conduct business or advertise or sell a service. This also applies to the use of any University resources through you personal computers.
You may not copy or attempt to modify any University owned software, except as permitted by the University. Any receipt, transmission, use or destruction of software or data must observe US copyright laws, and license restrictions.
Altering or destroying any document or file of which you are not the owner is a violation of these guidelines.
Misuse of the Network Systems
Connecting a personal computer or device to the University owned network and computers must be authorized by the Hofstra Computer Center.
You may not engage in activities which damage or disrupt hardware, software, or communications, such as virus creation and propagation, and overloading the network with excessive data.
You may not monopolize, misuse or waste the system resources by, for example, requesting multiple copies from printers or by playing games in the labs.
You may not forge or otherwise misrepresent another's identity through any form of communication.
You may not attempt to circumvent protection mechanisms or exercise security procedures in any computer or network component. You may not transmit or make accessible offensive, annoying, or harassing material, such as broadcasting unsolicited messages or sending unwanted mail.
You may not intentionally access or damage systems or information that is not yours, such as University records, or use any system for illegal activities.
The University seeks to protect the civil, personal, and property rights of those who use its computing resources as well as those whose student or employment records are maintained on its computing systems. Any unlawful attempt to access these resources is a serious offense.
The University is not responsible for any loss of data, damage to the hardware or software on your personal systems at home or in the Residential Hall.
Hofstra university believes in the user's rights to privacy, however when there is sufficient evidence of wrong doings, the University reserves the right to examine and impound any files, information or computer systems resident on/or attached to its networks.
Conduct which involves the use of the University resources in an inappropriate manner or which violates another person's rights may result in revocation of computing usage privileges and is subject to University disciplinary action as outlined in the University's Policies and Judicial Code. Such conduct may also be subject to criminal or civil legal action.