List of active policies

Name Type User consent
Cairn University Acceptable Use Policy Site policy All users

Summary

This Acceptable Use Policy (AUP) sets forth the standards by which all students, employees and authorized guests (hereafter referred to collectively as "User(s)") may use their assigned system accounts, email services and the shared computing resources at Cairn University (hereafter referred to collectively as the "Cairn Network"). 

The computing resources at Cairn University support the educational, instructional, research, and administrative activities of the University and the use of these resources is extended to members of the Cairn community to aid in performing these responsibilities. In general, acceptable use means respecting the rights of other computer users, the integrity of the systems, and all pertinent license and contractual agreements. 

By using or accessing the Cairn Network, Users agree to comply with this AUP and other applicable Cairn University policies. The use of the Cairn computer and network resources including University-provided electronic communication systems and equipment is a revocable privilege. Users should not have any expectation of privacy with regard to communications passed through the network or stored on computers that use it. Accessing the Cairn Network without proper authorization is strictly prohibited.

This policy is subject to change as state and federal laws develop and change.


Full policy

1. Acceptable Use and Terms

The following statements govern access to the Cairn Network:

1.1.     The Cairn Network and data is owned by the University and managed by Technology Services. All access is denied unless expressly granted. Technology Services (TS) generally grants access in the form of computer and network accounts to registered students, faculty, staff, and others as appropriate for such purposes as research, education or University administration. 

1.2.     Accounts are assigned to Users and are not to be shared. Each User is solely responsible for all functions performed from accounts assigned to them. Users may not allow others (including other Users within the Cairn Network) to use or have access to their account. It is a violation to use another User's account, with or without that person's permission. Intentionally or negligently revealing one's password is prohibited. It is a violation to attempt to learn the password to another User's account, whether the attempt is successful or not.

1.3.     Every user bears the responsibility for knowing and complying with applicable laws, policies, and rules; for appropriately securing their computers and other electronic devices from misuse or theft by others; and for avoiding any use that interferes with others’ legitimate access to and use of University information technology. University policies that may apply, depending on the identity of the user, include but are not limited to the University’s personnel, financial and administrative policies, the Employment Handbook, the Student Handbook, and any divisional, departmental, or school handbook, manual, policy or procedure, all of which are subject to change from time to time.

1.4.     Users may use only the computers, computer accounts, and computer files for which they have authorization. When other policies are more restrictive than this policy, the more restrictive policy takes precedence.

1.5.     Users may not attempt to disguise their identity, the identity of their account or the device that they are using. Users may not attempt to impersonate another person or organization. 

1.6.     Users may not attempt to intercept, monitor, forge, alter or destroy other Users' communications. Users may not infringe upon the privacy of others' computer or data. Users may not read, copy, change, or delete another User's data or communications.

1.7.     Users may not engage in actions that disrupt or interfere with the legitimate use by other Users of any computers and/or networks, including the Cairn Network, that interfere with the functions of the systems, or that are likely to have such effects. Such conduct includes, but is not limited to: placing of unlawful information on the system, transmitting data or programs likely to result in the loss of an individual's work or system downtime, sending "chain letters" or "broadcast/spam" messages to lists or individuals, or any other use that causes congestion of any networks or interferes with the work of others.

1.8.     Users may not possess, distribute or send unlawful communications of any kind, including but not limited to threats of violence, obscenity, child pornography and/or harassing communications (as defined by law), or participate or facilitate communications in furtherance of other illegal activities.

1.9.     Users may not attempt to bypass computer or network security mechanisms, including the Cairn Network. Possession of tools that bypass security or probe security, or of files that may be used as input or output for such tools, shall be considered as the equivalent to such an attempt. The unauthorized scanning of the Cairn Network is also prohibited.

1.10.   Users must abide by all established guidelines for any computers or networks used, both inside and outside Cairn University. Users accessing off-campus computers via external networks must abide by the policies established by the off-campus owners of those systems as well.

1.11.   Users may not engage in the unauthorized copying, distributing, altering or translating of copyrighted materials, software, music or other media without the express permission of the copyright holder. Information on the Digital Millennium Copyright Act can be found at: http://www.copyright.gov/legislation/dmca.pdf and the Copyright Act at: http://www.copyright.gov/title17/

1.12.   Users may not use the Cairn Network for political activities, fundraising, or advertising on behalf of non-Cairn organizations, unlawful activities or uses that violate other Cairn University policies. 

1.13.   Users may not extend or share the Cairn Network.

1.14.   Users may not violate any laws or ordinances, including, but not limited to, copyright, discrimination, harassment, and/or export controls. Cairn University may contact local or federal law enforcement authorities to investigate any matter at its sole discretion. 

1.15.   Users may not make system changes to the Cairn owned equipment including adding unauthorized software without the express permission from TS. 

2. Handling Personal Information

The following apply to Users handling Personally Identifiable Information:

2.1    Personally Identifiable Information (PII) includes the full name, home address, email address, SSN, passport number, driver’s license, credit card information, telephone numbers maintained by the University, of members of the Cairn community, including, but not limited to students, faculty and staff.

2.2    No person is permitted to access, retrieve, distribute, or disclose PII without explicit authorization. 

2.3    Users granted PII access must comply with the University’s FERPA, HIPAA and PII policies for accessing, handling and storing PII information.  

2.4    Printed materials, computer equipment and storage media containing PII should be handled and disposed of in accordance with the procedures set in the University PII policy. 

3. Other Disclosures and Best Practices

3.1    While every effort is made to ensure the privacy of Cairn University Users, this may not always be possible. In addition, since Users are granted use of electronic information systems and network services to conduct University business, there may be instances where approved authorized personnel, may access and inspect stored information without the consent of the user.

3.2    When any use of Cairn Network presents an imminent threat to other users or to the University’s technology infrastructure, or poses a likely violation of the law or University policy, the University may, without notice to the user, take whatever steps are necessary to manage the threat and/or preserve and access data. Those measures may include changing passwords, removing access rights, implementing quotas, disabling or impounding computers, or disconnecting specific devices or entire network segments from University voice and data networks. 

3.3    Upon notice of a breach of information or security, exploitation of Cairn maintained data, or violation of the AUP, Users must inform TS of any and all applicable information related to the infringing act.

3.4    Electronic messages pertaining to the official business of the University, including academic and administrative matters should be sent from University-owned messaging systems. 

3.5    Users may not, under any circumstance, tell anyone the system password. This includes friends, co-workers, and TS staff. 

3.6    Users have the responsibility to keep up-to-date on changes in the computing environment, as published, using University electronic and print publication mechanisms, and to adapt to those changes as necessary.

4. Consequences of Policy Violation

4.1    Noncompliance to these standards by Users may result in the revocation of access to the Cairn Network, and may result in legal action. Disciplinary actions will be at the discretion of the University. 

4.2    The University reserves the right to change this policy or any portion of the policy, at any time, with or without prior notice.