Acceptable Use Policy
As we move further into the computer age, we have to admit that we are not able to foresee every act of misconduct that will result in the need for disciplinary action. The heart and soul of our computer policy is based upon our Acceptable Use Policy, which is agreed upon by every student who enters Baylor School. The Acceptable Use Policy is broad in its scope (e.g., specific pieces of software are not mentioned), and the reason for this is that we are unable to predict the capabilities of specific software that will appear in the future. What we require is that all students read the policy and use common sense in applying it to their actions. Due to the evolutionary nature of the technology, it is imperative for students to realize that our policies regarding the use of technology in our community will also be evolutionary.
NOTE: When using the internet on or off campus, students need to remember that while internet use can be beneficial and fun, it can also be misleading and even dangerous. Students should protect their identity carefully; that includes not signing up for personals or dating services, both of which are forbidden. Also, exercise good judgment when joining chat rooms. Again, some are harmless, but others can be very risky.
Acceptable Use Policy for All Users of Computers and Networks at Baylor:
No policy can cover every possible specific case of acceptable and unacceptable behavior in computer use; the key is to understand that the same laws, regulations, and customs which govern behavior in civilized life also apply to the computer. What follows is a general outline which delineates the principles of the Baylor use policy; it is up to the user to read these rules, understand them, and be able to apply them to the conditions of his or her computer use. These regulations apply to the use of individual computers, school networks, school e-mail, internet use, and internet e-mail (a network is defined as a number of computers and electronic tools that are connected to each other for the purpose of communication and data sharing). Remember, it is always better to ask about situations that seem unclear.
1. Do not attempt to gain unauthorized access to any resource including, but not limited to, password protected areas or network administration software.
2. Do not engage in any activity that may interfere with or disrupt individual or network users, services, or equipment. NOTE: Attempting to circumvent the file protection system, disconnecting cables, erasing applications, and changing configurations of individual machines are all examples of acts that would put a student in violation of rules 1 and 2.
3. Adhere to the rules of copyright with respect to software, information, and attributions of authorship. NOTE: Decompiling programs, copying programs, or changing icons are examples of acts that would put a student in violation of this rule.
4. Do not engage in any commercial or business activities.
5. Do not send chain letters or any large files or attachment that might cause the system to overload.
6. Do not use offensive, inflammatory, obscene, or harassing speech either on the local network or the internet at large.
7. Do not access or process pornographic material, inappropriate text files, or files (such as viruses) which are dangerous to the integrity of the local network.
8. Use your own name in all accounts (such as e-mail) and in all other uses where a name is called for; never impersonate another or use unidentifiable nicknames.
9. Respect the privacy of others in general; and specifically, do not publicly post private communications, such as e-mail, without the expressed consent of the writer. NOTE: The use of applications such as e-mail is a privilege for students. If a student is thought to be using the e-mail system in a way that violates the AUP, the school reserves the right to open that student's e-mail account and examine its contents.
10. Be responsible for the security of your accounts and passwords. If you give others access to your accounts either by divulging your password or logging off incorrectly, you are responsible for any misconduct in which they may engage.11. Obey all specific regulations of the manager of the Baylor machine or Baylor network on which you are working. Where external networks are involved, you must obey the use policies of these networks. Violating any of these policies is considered a serious offense, and any intentional violation which causes damage is especially serious. Serious disciplinary offenses at Baylor may result in dismissal from school. Users should be aware that network administrators will respect individual privacy unless problems arise, but it is necessary for them to monitor network traffic such as e-mail. Remember also that the network can crash, resulting in loss of data. Clearly the network administrators are there to keep such problems to a minimum, but users should be aware that there is no absolute guarantee against disaster.