Network Acceptable Use




Southern New Hampshire University encourages the use and application of information technologies to support research, instruction and student needs. Users of Southern New Hampshire University equipment, software and computer accounts are expected to follow acceptable standards of ethics and conduct in their use of computing resources. All Southern New Hampshire University faculty, students and staff should be aware of the following acceptable use policy requirements, which augment the existing Nearnet and NSF acceptable use policies.

Definition: The Southern New Hampshire University network (SNHUnet) includes all computer and communication hardware, software and accounts owned by Southern New Hampshire University.
  1. Every computer account issued by Southern New Hampshire University remains the property of Southern New Hampshire University. The person to whom the account is issued is responsible for the account and its use. This responsibility continues until the person is no longer a student or employee of Southern New Hampshire University, at which time all rights and responsibilities regarding the account are terminated. The individual must keep the account secure by keeping the password secret, by changing the password often and by reporting to the Department of Computing Resources when anyone else is using the account without permission. Using another person’s account or allowing someone else to use an account makes both parties potentially liable to disciplinary action. 
  2. The use of SNHUnet is prohibited for:
    • illegal purposes;
    • transmitting threatening, obscene or harassing materials;
    • interfering with or disrupting network users, services or equipment (disruptions include, but are not limited to, distribution of unsolicited advertising, propagation of computer viruses and using the network to make unauthorized entry to any other computers accessible via the network);
    • profit-making from the selling of services and/or the sale of network access;
    • excessive private or personal business.
  3. The following activities are specifically prohibited:
    • tampering with Southern New Hampshire University-owned computer or communication hardware and software;
    • defining and/or changing IP addresses on any machine;
    • intercepting or attempting to intercept e-mail and file transfers;
    • originating or attempting to originate mail from someone else;
    • attempting to log on to computers without an account (other than using guest or anonymous accounts).
  4. Data within computer accounts issued by Southern New Hampshire University are private. Access to data within computer accounts issued by Southern New Hampshire University without written permission of the owner is prohibited. However, if there is probable cause to believe such data files or programs contain information relevant to a Southern New Hampshire University business requirement or legal proceeding, a person other than the authorized user may examine such data files or programs. Permission for such access would be granted by Southern New Hampshire University’s Vice President of Operations. Access to accounts and/or data by the Department of Computing Resources for routine computer systems maintenance work is permitted. 
  5. Backup copies of all data in Southern New Hampshire University computer accounts are made routinely to protect against loss of data. No exceptions can be granted.
  6. Requests to waive some policies will be reviewed by the Director of the Department of Computing Resources on an individual basis. Under no circumstances will a waiver be granted that violates state, local or other laws.
  7. Confirmed misuse of Southern New Hampshire University’s computing resources may result in one or more of the following punitive measures:
    • loss of access to computer resources
    • required repayment of funds expended in unauthorized use
    • expulsion from the university
    • termination of employment
    • legal action.
The prohibited uses as defined above may also violate state and federal law; thus criminal penalties may also apply.
 


Updated: 26 December 2013