You are here:
  • KB Home
  • IT Policies
  • Policy: Staff & Faculty Use of University Technology, Data, Systems and Network

The following constitutes a university-wide procedure for the management of college computer data networks, both on- and off-campus; as well as all services and resources supplied by the university or used for university business.

Use of Ohio Christian University resources for purposes related to the instructional and administrative mission of the college. Faculty, Staff, and Students may use technology resources for purposes related to their instruction, their studies, their duties as employees of the University, official University business, or other college-sanctioned activities. The use of OCU owned computer and information resources for commercial purposes other than university related business is prohibited. Facilities used for connectivity are to be used in a responsible, ethical, and legal manner.

All individuals authorized to use OCU systems, which include but are not limited to computers, printers, peripherals, network and email accounts, online and web services are required to use their personal University provided account information and are responsible for any use or mis-use involving their account credentials.

  • Activation and de-activation of user accounts and access to resources are at University discretion.
  • Inappropriate use of the information technology resources, which Ohio Christian University makes available to faculty, staff, and students, may result in suspension or termination of access. In addition to federal, state, and international laws, University policy prohibits but not limited to:
    • Harassment, including creating, displaying, or transmitting threatening, racist,sexist,
      or obscene language and/or materials both inside and outside of campus community.
    • Deliberate or intentional destruction or damage to equipment, system installations
      and configurations, software, or data belonging to the college or others.
    • Use of computer systems in a manner that results in a violation of the privacy rights
      of others.
    • Unauthorized monitoring of electronic communications.
    • Violating computer system security.
    • Unauthorized use of computer accounts or access codes.
    • Use of computer facilities (i.e., labs, rooms) for purposes unrelated to the college’s
      mission, goals, and administrative functions. For non-tangible computing resources, such as e-mail, priority to access and resource use is given to academic and college-related work. Everyone is expected to avoid creating excessive network traffic or storage consumption.
    • IT Staff will not review contents of files nor monitor the content of files, unless one of their special tasks (e.g., recover a file) may require them to review the contents. In a situation where the content of the file is disclosed to the system administrator, he/she is required to maintain complete confidentiality.
    • System administrators work with files for the maintenance of networks, computers, and storage systems to create backup copies or resolve network difficulties. Additionally, IT Staff may routinely monitor and log utilization statistics (e.g., network session connection times, etc.).
    • Phone’s, email, network usage are randomly monitored for quality and assurance. Release of individual monitoring results will require authorization from the users Department Head or executive seat.
    • Mass/Bulk emailing through University Mail servers are prohibited unless specifically authorized.
    • Online messages such as chain letters, obscene or harassing email, bulk mail forwards, or other unwelcome messages are considered nuisance e-mail, and are strictly prohibited.
    • No e-mail may be sent or forwarded through a University system or network for purposes that violate University statutes or regulations or for an illegal or criminal purpose.

The University reserves the right to refuse email and other connections from outside hosts that send unsolicited, mass or commercial messages, or messages that appear to contain viruses to University users, and to filter, refuse or discard such messages.

Last Updated March 06, 2018