Responsible Use of Information Resources and Technology

Our use of these technology resources is to be guided by Christian principles of wise stewardship and responsible use.

Responsibility to Others

Respect for one another's need for access

Students, faculty, and staff who are involved in educational, research, or administrative activities have the highest priority in the use of technology and information resources. While use of information resources for other purposes may be acceptable, such use should never interfere with educational or research activities. Practices that conflict with this policy include, but are not limited to, the following examples:

  • Use of computer lab equipment for recreational purposes in a way that prevents others from using it for educational, research or administrative tasks.
  • Deliberately degrading the performance of the network or computer system. Specific examples include e-mail chain letters or junk mail, flooding the network, and the intentional spread of viruses.
  • Mass email policies via Campus Cruiser: Students are not to use the mass email aspect of Campus Cruiser or other students’ email addresses for personal or professional solicitation of goods or services.

Respect for one another's values and feelings

Fresno Pacific University upholds the principle of treating all people with profound respect. University computing resources may not be used to intimidate or harass other people. Practices that conflict with this policy include, but are not limited to, the following examples:

  • Sending fraudulent, threatening or obscene e-mail, or e-mail attachments 39 meant to harass or intimidate.
  • Displaying obscene or otherwise offensive written, aural, or graphic material on one's computer in a manner likely to be seen by other people.

Respect for Another's Property

Theft, misuse or unauthorized use of either tangible or intellectual property will not be tolerated. All users are required to abide by the following guidelines:

  • Making unauthorized copies of copyrighted software is prohibited. Such theft is punishable under state and federal law and can affect both the user and the university.
  • No one may access network resources (e-mail accounts, personal directories, etc.) of another user without their express permission, except as described in section II.3.
  • No one may use, edit, adapt, sample, or copy another member of the community's intellectual property without their consent. Intellectual property includes any words, images, or other expressions of a person's ideas. It may include, but is not limited to, written papers in electronic format, computer-based presentations, or electronic tests prepared for university courses. While use of such material with another person's permission may be acceptable, such use in academic settings should not violate university rules against plagiarism.
  • Users should avoid excessive or unnecessary printing of documents. Overuse of paper in university offices and labs represents both a waste of the university's monetary resources and a waste of natural resources. Editing of documents should, as much as possible, be done onscreen. Avoid printing a new copy for every small change made to a document.

Responsibility to Self

Use of inappropriate materials

Fresno Pacific University is a community of learners. The university seeks to provide settings in which individuals can learn as a result of the interaction between persons, ideas, and experience. Learning and interaction remain key components to the educational mission of Fresno Pacific.

The educational mission of the community and the self may be subverted when inappropriate behaviors manifest themselves. The use of electronic technology may be used as a tool for interaction with persons, ideas, and experience in both positive and negative ways. Thus, one must take responsibility in determining the nature of sites accessed and messages sent. The following types of Internet sites, among others, may be problematic when accessed repeatedly:

  • Sites containing sexually explicit content.
  • Sites containing depictions or descriptions of violence or hate speech.
  • Sites promoting the inappropriate use of illegal drugs, alcohol, or tobacco.
  • Sites promoting gambling.
  • Individuals should consider the purpose for which they enter sites such as these and the potential harm the information on these sites could have on them.

Understanding the Limits of Personal Privacy

The university acknowledges that users have a right to expect that the privacy of their data and their use of the system will not be violated. Although the university does not monitor computer files, e-mail, and Internet use, normal maintenance of the campus network or individual computers may reveal information about the nature of an individual's computer and network usage to Information Services staff.

All logins, requests for web pages, and commands executed by users are recorded in log files that are maintained by Information Services. In order to preserve the integrity of its resources against accidents, failures, improper use, or other disruption, the university reserves the right to inspect or remove any data, file, or system resource as it deems necessary. In so doing, Information Services has an obligation to preserve the confidentiality of any user data to which their legitimate responsibilities give them access. However, in cases where there is clear evidence of violation of laws, contracts or license agreements, Information Services will report this information to the Provost. The same actions will be followed if Information Services, during normal maintenance procedures, discovers a pattern of repeated violation of the community standards set out in this policy. Existing policies will assist the Provost in determining appropriate action in such cases.

Electronic mail is a convenient means of communication. Because of the nature of such electronic communication, it is not possible to guarantee the privacy of e-mail. Such messages are not erased from the system when deleted but are retained for a certain, designated period of time to serve as backup protection against inadvertent deletion. Furthermore, courts have ruled that Internet providers must disclose the identity and content of e-mail messages when it is determined necessary to investigate the inappropriate use of the system. Therefore, despite reasonable attempts to maintain the privacy of use on university-provided technology, data that is stored, sent, received, or accessed using university-provided technology should not be considered completely private or confidential. Highly confidential materials should be delivered or stored in another manner.

The university makes no warranty, express or implied, regarding its information resources, their continued availability, privacy, or their fitness for any particular purpose. Use of technology resources at Fresno Pacific University is a privilege, not a right. Violation of any of the above guidelines may subject the violator to disciplinary action, rendered by the appropriate authority, according to existing university policies. Such action could include any of the following: warning, loss or restriction of technology privileges, suspension, or legal prosecution.

This document is a baseline policy applying to all users of FPU technology resources. It does not preclude additional provisions being applied where appropriate within various segments of the university.