Acceptable Use

Purpose

To define appropriate and responsible use of campus computing and networking facilities. The intent of this policy is to provide access to campus computing resources that is consistent with the generally accepted principles of ethics that govern the University's academic community. Bryant University seeks to provide access to staff, faculty, and students within institutional priorities and financial capabilities.

Access to University-owned computer facilities, equipment, hardware, software, printing facilities and services, is a privilege, not a right. This privilege is extended to all faculty, staff, and students. The University expects all members of the community to use computing, data, and information technology resources in a responsible manner, respecting the rights and privacy of others, the integrity of facilities and controls, state and federal laws, and University policies, guidelines and standards.

Scope

This policy applies to all users of the University’s computing, data, and information technology resources.

Policy

USER COMPLIANCE

When you use University computing services and accept any University issued computing accounts, you agree to comply with this and all other computing related policies, guidelines and standards. You have the responsibility to keep up-date on changes in the computing environment, as published, using University electronic and print publication mechanisms. Occasional limited personal use of University facilities, computers, and equipment, including email and Internet access, is permitted. University-owned electronic devices are intended for business use. Information Services is not responsible for the recovery of personal data stored on University-owned electronic devices.

ADHERENCE WITH FEDERAL, STATE, AND LOCAL LAWS

As a member of the Bryant University community, you are expected to uphold local ordinances and state and federal law. Some Bryant guidelines related to use of technologies derive from that concern, including laws regarding license and copyright, and the protection of intellectual property. 
As a user of Bryant's computing and network resources you must:

  • Abide by all federal, state, and local laws.
  • Abide by all applicable copyright laws and licenses. Bryant University has entered into legal agreements or contracts for many of our software and network resources which require each individual using them to comply with those agreements.
  • Observe the copyright law as it applies to music, videos, games, images, texts and other media in both personal use and in production of electronic information. The ease with which electronic materials can be copied, modified and sent over the Internet makes electronic materials extremely vulnerable to unauthorized access, invasion of privacy and copyright infringement.
  • Do not use, copy, or distribute copyrighted works (including but not limited to Web page graphics, sound files, film clips, trademarks, software and logos) unless you have a legal right to use, copy, distribute, or otherwise exploit the copyrighted work. Doing so may provide the basis for disciplinary action, civil litigation and criminal prosecution.

AUTHORIZED SOFTWARE

The purpose of this control is to provide measures that will mitigate information security risks associated with authorized software. Authorized software is any software that is acceptable for use on Bryant University information technology resources. All software installed or used on university-owned information technology resources must be appropriately licensed and approved in advance of its use.

Prior to purchase, lease, development, or use of university software, users must contact the IT Service Desk to begin the approval process. The IT Service Desk will assist organizations by guiding the request through the required reviews/approvals process.

OTHER INAPPROPRIATE ACTIVITIES

Use Bryant's computing facilities and services for those activities that are consistent with the educational, administrative and public service mission of the University. Other prohibited activities include:

  • Activities that would jeopardize the University's tax-exempt status.
  • Use of Bryant's computing services and facilities for political purposes.
  • Use of Bryant's computing services and facilities for personal economic gain.
  • Use of wireless printers and surveillance cameras on campus networks are not permitted

PRIVACY AND PERSONAL RIGHTS

  • All users of the university's network and computing resources are expected to respect the privacy and personal rights of others.
  • Be professional and respectful when using computing systems to communicate with others; the use of computing resources to libel, slander, or harass any other person is not allowed and could lead to university discipline as well as legal action by those who are the recipient of these actions.

While the University does not generally monitor or limit content of information transmitted across or stored on University resources, it reserves the right to access and review such information under certain conditions. These include but are not limited to: investigating performance deviations and system problems (with reasonable cause), determining if an individual is in violation of guidelines, or, as may be necessary, to ensure that Bryant is not subject to claims of institutional misconduct. Access to files on University-owned equipment or information will only be approved by specific University personnel when there is a valid reason to access those files.

FAIR SHARE OF RESOURCES

Information Services operates and maintains computers, network systems and servers, and is expected to maintain an acceptable level of performance and must assure that frivolous, excessive, or inappropriate use of the resources by one person or a few people does not degrade performance for others. The campus network and centralized computing resources are shared widely and are limited, requiring that resources be utilized with consideration for others who also use them. The University may choose to set limits on an individual's use of a resource through quotas, time limits, and other mechanisms to ensure that these resources can be used by anyone who needs them.

COMPLIANCE

The university reserves the right to monitor, audit, inspect, and limit the use of its information technology and digital resources, as well as to access, disclose, or remove any data stored or transmitted on or through these resources, in accordance with applicable policies and laws. The university also reserves the right to suspend, revoke, or restrict the access or privileges of any user who violates this policy or any other applicable policies or laws. The university may also impose disciplinary actions, up to and including termination or expulsion, and may refer any violations to the appropriate legal authorities for prosecution.

EXCEPTIONS

Any exceptions to directives outlined within this document are to be reviewed and approved by the Security Management Team as needed.

Policy Review and Revisions

Last ReviewedLast UpdatedSummary
1/12/20241/12/2024Annual review and update.