Network and Computing Policy

North Carolina Wesleyan University, hereinafter referred to as NCWU, maintains a private network with connectivity to the Internet, a public/global network. NCWU exercises limited control over the content of the Internet and subsequent transmissions into the private network. Those with valid NCWU network service accounts, hereinafter referred to as USERS, are expected to abide by all current and future policies/guidelines deemed necessary and prudent. These guidelines will be made publicly accessible, either through printed or electronic media. This policy is intended to do the following:

  • Preserve the utility and flexibility of the system
  • Protect the privacy and work of students, faculty, and staff
  • Preserve the right of NCWU to access global networks in order to facilitate the goals of the NCWU educational system.

Network Connectivity

Users requiring network connectivity will request such from authorized Network Services personnel. Personal computer systems will be reviewed and audited before such network connectivity is granted. Only systems with compliant hardware and software will be granted connectivity. Hardware and Software in development stages may not be used without written notification to Information Systems department. Upon request of the IS Dept personnel, hardware and software believed to be causing problems must be removed. Contact the IS Dept personnel for further clarification.

General Usage Policy

  • Faculty, staff, students and others with NCWU authorized accounts may use the available computing facilities, including transmissions of data for scholarly purposes, official NCWU business, and for personal purposes so long as such use:
    – Does not violate any law or University policy.
    – Does not involve significant use of University resources, direct costs, or substantial interference with the performance of University duties /work.
    – Does not result in commercial gain or private profit.
    – Does not bring discredit to the NCWU establishment.
  • All users are expected to preserve the integrity of the NCWU network by prohibiting any person from sharing personal passwords or sharing personal accounts. It is the users’ responsibility to report any unauthorized use and protect their accounts from such use by changing their passwords periodically and using passwords which have the following requirements: Minimum of seven characters Combination of upper and lower case letters or a Combination of letters and numbers
  • Owners of an account are responsible for actions that occur from that account.
  • Any attempt to circumvent system security, guess other passwords, or in any manner gain unauthorized access to NCWU or Internet resources is prohibited.
  • Transferring copyrighted materials to or from any system or via the NCWU network without express consent of the owner may be a violation of Federal Law and is a felony under State Law. Such violations will be subject to case-by-case review and may result in censure, removal of network access, or reported to pertinent authorities.
  • Use of electronic mail and other network communications facilities to harass, offend, or annoy other users of the network is prohibited.
  • The use of NCWU network facilities for playing graphics-based interactive games is NOT permitted; unless written permission has been granted. Users must stop such activity on request from authorized staff.

Information Access and User Privacy

Electronic mail and other information passing over the University network, including information stored in user accounts and computers are considered to be private and confidential. Although this type of information must be accessed by system personnel for the purpose of backups, network management, etc., the content of user files and network transmissions will not be viewed, monitored, or altered without the express permission of the user except in the following circumstances:

  • The University has reason to believe that an account or system has been breached and is being used by someone other than the authorized user.
  • The University has received a complaint that an account or system is being used to gain unauthorized access or to attempt to gain unauthorized access to another network site
  • The University has reason to believe than an account or system is being used in violation of University Policy, Federal or State Law.

Under these circumstances a Vice President of the University may authorize system support personnel to monitor the activities of a specified account or computer system and to search electronic information stored in that account. The authority for this search must be requested on an account-by-account basis and monitoring will be restricted to the specified account. If this search provides evidence of violation the account will be disabled and action taken with appropriate authorities.

Private Machines Connected To The University Network

It will become increasingly possible for computer systems owned by students, staff, or faculty to be attached directly to the NCWU Network via on-campus attachment or dial-in services. Of course, the owner of a personal machine may use that machine at his or her discretion, however, the use of the University network is subject to all of the policies stated in this document.

  • The owner of a machine connected to the NCWU network is responsible for the behavior of all users of that machine and for all network traffic to and from the machine. NCWU maintains no responsibility or liability for loss of data or hardware corruption on personal computer systems.
  • A private machine connected to the University network may not be used to provide network access to individuals who would not otherwise have access through official NCWU channels. The private machine may not be used to redirect data to other networks, nor may it serve in any way as an electronic gateway to non-University affiliated systems.
  • Private machines may not use the University network for commercial gain or profit.
  • Private machines may be used to support anonymous ftp, http, or gopher services when these services fall within the definition of scholarly use. Unless otherwise approved, in writing, provisions for interactive login services for non-University affiliated users is prohibited.
  • Should the University have reason to believe that a privately owned system is using the network inappropriately, network traffic to and from that system will be monitored and, if justified, the system will be disconnected and appropriate punitive action will be taken.