Policy Information

The links below provide current and past information regarding the University's IT, network and computer, and wireless policies.

 


 

UNIVERSITY OF LOUISIANA AT LAFAYETTE
POLICIES ON ACCESS AND USAGE OF COMPUTERS AND NETWORKS
DATE: JUNE 6, 1989
AVAILABILITY STATEMENT ADDED AT BEGINNING: 9/14/94
FROM: D. T. BONNETTE DCIS; S. J. MAHLER DIN

The University of Louisiana at Lafayette developed and maintains various computing and network facilities in order to enhance the effectiveness of the instructional, research, and administrative missions of the University. The primary goal of the related staffs is to maximize the available computation resources within prevailing constraints. Historically, available computational resources have not adequately handled all of the various needs. Thus, prudent utilization of available resources is a necessity. The following policies have been adopted in order to maintain a reasonable level of computing and networking resources. In relation to all the various University missions, policies given here seek to promote directly-related usage, curtail moderately-related usage, and eliminate unrelated, illegal and abusive usage. In addition, policies are included to help maintain an ethical and amicable working environment for all computer and network users. Network facilities (refered to as `network') are defined as any University network (such as OUINET) or any other network accessed through any University network or computer facility. Computer facilities (refered to as `computer') are defined as any University computer or any other computer accessed through network or University computer facilities.


  1. AUTHORIZATION
    Only persons properly authorized may access network or computer facilities. Proper authorization is provided by authorized staff or their designate in the form of an `account', `id' or `signon' issued in the name of the authorized person. Users may not permit other persons to access a network or host computer via their account. Users who violate this policy will lose their access authorization for a period of time commensurate with the infraction. Repeat offenders may be denied access indefinitely. 
    To enable staff to accurately maintain information about the user of each account, each user has the responsibility to provide current status information to necessary staff, including school or department of affiliation, degree program (undergraduate or graduate), expected graduation/termination date, and University position (faculty, professional, clerical, graduate assistant, graduate student or undergradute). To check the current information a staff has on file, contact that staff directly. If you are classified incorrectly, or the account termination date is incorrect, contact your site administrator or your school's office which handles computer accounts.

  2. APPLICATIONS
    Computer networks and host machines are intended to provide students, staff, and faculty the computational resources needed to meet their recognized educational, research, and administrative commitments to the University of Southwestern Louisiana. All other uses are proper only if machine load is low, the terminal is not otherwise needed, and the use is not prohibited by other applicable policy, i.e. University, School, Department or Information Networks. Low machine load is considered to be times when your presence will not be noted by any user with a primary mission session. If your computer or network usage is detectable (by delayed response times or performance or any other factor), you are in violation.

  3. CONDUCT
    Users may NOT harass or threaten other users, attempt to steal passwords, files, or other user/system information, attempt to crash, violate the integrity of, or adversely affect the activities of a computer system or network. When any process is consuming excessive system resources or objectionably degrading system response it may be terminated, or its priority may be altered, without notice. Distasteful or offensive displays, messages and printouts are not permitted. Physical abuse, mishandling and modification of terminals, printers and other hardware is not permitted. Occurrences of misconduct in these areas will result in loss of computer access. If you believe your account has been compromised by another party you are responsible for reporting (during the same or next business day) to the system administrator. Failure to do so will make you accountable for any (mis)use of your account. Computer files can be inspected without notice by the system administrator. Computer files not related to official missions of the University and which consume large amounts of space may be removed without warning by staff. When users exceed their storage allocation, they are notified. Some systems notify users by system electronic mail or direct message. The message (frequently) will indicate resource usage at the time storage accounting was performed, and the user's storage space allocation limit. If the storage allocation is exceeded for an extended period, the user account may be disabled.

  4. LICENSES
    Many systems are operated at the University under license agreements with companies such as AT&T, Honeywell, IBM, and organizations such as SURA and NSF. Under these agreements some computers and networks may be used for instructional, research and administrative purposes only. The various licenses bind each and every user to respect the proprietary nature of the software; the specifics of the operating system may not be taught, nor may the system or any part thereof be moved to, or copies released to ANY other site. Under the license agreements and state regulations, there is a strict policy that network and computer facilities may under no circumstances be used for personal gain, or to place a third party in a position of commercial advantage. To protect our license status, the University requires that any person wishing to transport software from a host or personal computer, which he or she did not personally develop, get approval from the system administrator for the machine that the software was developed on.

  5. WASTEFUL AND ABUSIVE USAGE
    In general, the University does not have enough computing resources to meet the needs of students, faculty, and staff. Therefore, all users are expected to use good judgment in sharing limited resources. Computer usage not necessary to meet recognized educational, research, and administrative commitments of the University will be considered wasteful, abusive, and theft committed against users attempting to complete recognized work. Waste can also be in the forms of unnecessary storage of disk files, careless execution of high resource consuming programs, or generation of excessive printed output. Users should also be aware that hard copy output devices are expensive to operate and that wasteful usage of such devices must be avoided. GAME PLAYING (even considering redeeming qualities of user familiarization to computers) is considered wasteful and abusive except as prescribed here.
    ``Game playing'' is defined here as development or execution of a computer program which primarily provides amusement or pastime diversion. Game playing is permitted only when the game is a class assignment. Other uses including campus and non-profit organizations must be approved in advance by the Director of Computing and Information Services. Application for such use should be made in writing to the appropiate system administrator.

  6. LOSS OF ACCESS REPORTS
    Loss of Access Authorization and/or Account reports are always distributed to the system administrator of the involved computer system and to the Director of Information Networks. Subsequent report disposition and actions vary for the various organizations envolved. Typically, reports involving students are handled as follows: 
    First report: filed with student's records within his respective department. 
    Second report: same as first report with copies sent to his respective School's Academic Affairs Office and the Dean of Students Office. 
    Third report: same as second report with referal for University disciplinary action and indefinite loss of access authorization. 
    Any number of report levels may be skipped dependent upon the nature of the incident.

  7. LIMITATIONS
    This policy does not preclude enforcement under the laws and regulations of Federal, State and Local Authorities. Any questions concerning ethical or legal use of computing or network facilities should be directed to the Director of Computing and Information Services.

top

 

WIRELESS RULES & POLICY

These are the general rules and policies for wireless communications at UL Lafayette in the 2.4 and 5 GHz Unlicensed Bands.

  • Wireless data network access and services are subject to the same rules and policies that govern other computer and network services at UL Lafayette.

  • Radio interference: Because of a dependence on a scarce-shared resource, radio communication is subject to additional rules concerning interference and shared use. Off-campus interference may not be controllable and may prevent the University Wireless Information Network (UWIN) from operating.

  • Network policies: To successfully deploy an 802.11b/g/a network, it is required that all equipment operating in the 2.4 and 5 GHz spectrum be carefully positioned, installed and configured. Information Networks is responsible for the design and deployment.

  • To avoid potential interference with the UL Lafayette UWIN wireless network, users and departments are not allowed to install their own wireless access points or wireless networks on campus.

  • Installation: To minimize interference at UL Lafayette, any purchase or installation of 802.11b/g/a wireless networking equipment, or any other equipment that uses the same unlicensed frequency bands, inside of University buildings or on University property must be coordinated through Information Networks (this includes, but is not limited to, wireless video, cordless telephones, cordless RF keyboards and mice, Bluetooth devices etc.).

  • The owner of any uncoordinated wireless Access Point, AirPort, wireless router or other device that is connected to the University wired or wireless network is responsible for any unauthorized access and the results of such access to the UL Lafayette network. Information Networks may take down any wireless access point or other wireless device if it causes interference with UWIN Wireless or any other officially sanctioned UL Lafayette service operating in the 2.4 or 5 Ghz unlicensed spectrum.

  • Users are responsible for obtaining the correct computer hardware and software to access UWIN.

 top