DCSIMG

Computer Use Policies

Computer Usage

All computer systems are established, maintained, provided and owned by Centenary College for faculty, students and staff to support the educational, administrative and other functions of Centenary College.  All material on College computers or going through College email is subject to College review.  All faculty, students and staff should never access inappropriate materials, e.g. Pornography, illegal file sharing, or anything deemed inappropriate by Human Resources. 

All personal computer systems and handheld devices should adhere to the same policies when connected to the Centenary College network (internet access).

Internet

Centenary College is not responsible for material viewed or downloaded by users of the Internet. The Internet is a world-wide network of computers that contains millions of passes of information. Users are cautioned that many of these passes include offensive, sexually explicit, and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. In addition, having an e-mail address on the Internet may lead to receipt of unsolicited e-mail containing offensive content. Users accessing the Internet do so at their own risk.

Virus Detection

Viruses can cause substantial damage to computer systems. Each user is responsible for taking reasonable precautions to ensure he/she does not introduce viruses into Centenary College's Network. To that end, all material received on floppy disk or magnetic or optical medium, or any external medium, and all material downloaded from the Internet or from computers or networks that do not belong to Centenary MUST be scanned for viruses and other distinctive programs before being placed onto the computer system.
Portions of this policy were drawn from policies at Yale University and Haverford College. Centenary College would like to gratefully acknowledge their input and permission to use the material.

Email Policies

To access your Centenary Email please log in to my.Centenaryยป

With the rapidly expanding access to new communications media comes the need to establish guidelines for appropriate use. As with all Centenary practices and policies, we expect the user to exercise good judgment in using the computer systems.

Because Centenary is connected to the Internet, a world-wide network of computing sites, your electronic mail account enables you to contact not only people in the College community, but those all over the world as well. Irresponsible use of the Internet may jeopardize Centenary Internet connection. 

Chain Email

Users may not invite or forward chain e-mail.  Chain e-mail is a message sent to a number of people asking each recipient to send copies with the same request to a specified number of other users. Please recognize and respect that any communication sent from your account has Centenary name as well as your name on it.

Conditions: In accordance with state and federal law, the college may

Privacy

Centenary College values privacy and recognizes its importance in an academic setting. However, circumstances arise which outweigh the value of a user's expectation of privacy and warrant college's access to relevant IT Systems without the consent of the user. Those circumstances are discussed below.
 
Conditions: In accordance with state and federal law, the college may
access all aspects of IT Systems, without the consent of the User, in
the following circumstances:

  • When necessary to identify or diagnose systems or security vulnerabilities and problems, or otherwise preserve the integrity of the ITSystems.
  • When required or permitted by federal, state or local law or administrative rules.
  • When there are reasonable grounds to believe that a violation of law or a significant breach of College policy may have taken place and access and inspection or monitoring may produce evidence related to the misconduct.
  • When such access to IT Systems is required to carry out essential business functions of the college.
  • When required to preserve public health and safety or to protect the college from liability.

Enforcement

When a violation of this policy occurs, Centenary College may enforce one or more of the following:

  • Temporarily suspend or block access 
  • Permanently suspend or block access 
  • When appropriate, refer suspected violators to the appropriate law enforcement agencies 
  • Disciplinary action up to and including termination or expulsion

Proscriptions on Use

  • Use that impedes, interferes with or otherwise causes harm to others.
  • Harassing or threatening use Attempts to defeat system security.
  • Unauthorized access or use Modification or removal of data or equipment.
  • Use of unauthorized devices.
  • Disguised use.
  • Deliberately distributing or launching computer viruses, worms, or other rogue programs.
  • Use in violation of the law.
  • Use in violation of Centenary College policy.

The list is not limited to and may include other areas not mentioned above.

Web Analytics Tracking Privacy Policy

This site is tracked and analyzed by an analytics and optimization service.  Usage data collected, such as page hits and device type used, will be used internally by Centenary College to optimize the website.  Centenary College adheres to all privacy rules as described under the HEA and FERPA privacy links in the collection of such usage data.