Computer Use and Networking Policy
The following guidelines govern the acceptable use of computer and networking resources within the University Libraries.
- WSU students, faculty, and staff may use library computer resources located in the public service areas for the purposes of learning, teaching, and scholarly research. These uses have priority, and any other use of computer facilities by WSU students, faculty, and staff may be terminated immediately if it interferes with priority uses. Examples of secondary uses that may be terminated are: non-academic e-mail, recreational games, non-academic chat rooms, or downloads of large recreational files.
- Persons other than WSU students, faculty, and staff may use university library computer resources only for academic purposes furthering the mission of the University. Use of the University Libraries computer resources to send or receive e-mail, play computer games, or access chat rooms not directly related to learning, teaching or scholarly research is not permitted.
- The University Libraries computer and networking resources may not be used to disseminate commercial or personal advertisements, solicitations, promotions, destructive programs, or political materials.
- The University Libraries computer and networking resources may not be used for commercial gain, mass e-mailing, the posting of chain letters, or representing oneself electronically as another user.
- The University Libraries computer and networking resources may not be used to download personal software. Users are prohibited from attempting to circumvent security measures implemented on any University Libraries systems, networks, or applications as well as altering the configuration or bypassing the authentication measures implemented on all library technology.
- The University Libraries computer and networking resources may not be used to violate any applicable software or product licensing agreements, or any other intellectual property laws or policies.
- The University Libraries computer and networking resources may not be used to violate any Wichita State University, Kansas Board of Regents, or State of Kansas policy or procedure.
- The University Libraries computer and networking resources may not be used to violate any applicable state or federal law or regulation. (For examples of illegal uses, see below)
The University Libraries will not be held responsible for any unlawful use of the Web. The University Libraries also makes no warranties respecting any harm that may be caused by defective equipment or by transmission of a computer virus, worm, time bomb, logic bomb, or other such computer program.
WSU Libraries reserves the right to terminate access to the University Libraries computer and networking resources or the library privileges of any person found violating these guidelines.
Approved: January 30, 2003
Excerpts from Wichita State University Computing and Information Technology Acceptable Use Policy
- Access to University computing is a privilege. Computing and information technology resources are the property of Wichita State University and should be used for the primary purpose of benefiting, enhancing, and furthering the mission of the University.
- Authorized users are defined as currently enrolled Wichita State students, currently employed WSU faculty and staff, and certain other designated affiliated users. Other members of the community may have access to the Internet through the University’s service if “said resources are used for academic purposes deemed to further the mission of the University.”
Computing and Information Technology Acceptable Use Policy
Acceptable Use Policy for Campus Network Access
Excerpts from the Wichita State University Internet Policy
- Wichita State University is not responsible for the quality, accuracy or validity of information found on the Internet.
- Wichita State University is not responsible that some users may find certain materials accessible on the Internet to be personally objectionable.
- Ultimate responsibility for Internet usage through University computing and information technology resources by individuals under the age of eighteen shall be with that individual's parent or guardian.
- An account and a password are intended as entrance keys to the University's computing and information technology resources. They should not be used by anyone other than the assigned user.
WSU Policies and Procedures - Technology
Examples of Illegal Uses as Defined by Federal and State Statute
- Viewing, downloading, distributing or possessing child pornography
- Distributing any type of pornography to minors
- Looking for or exploiting security flaws to gain system access or data access (“hacking”)
- Making more copies of software than allowed by license
- Downloading, distributing, or using pirated software
- Vandalizing systems
- Sending forged e-mails
- Attempting to access another person’s password or data without permission