Computing and Network Resources

ACCEPTABLE USE OF COMPUTING AND NETWORK RESOURCES POLICY 


American InterContinental University provides computing and network resources to faculty, staff, and students. As members of the AIU community, and in accordance with the Acceptable Use of Computing and Network Resources Policy, all users have the responsibility to use these resources in an effective, efficient, ethical, and legal manner. Ethical and legal standards that apply to computing and network resources derive directly from standards of common sense and common courtesy that apply to the use of any shared resource. 


All members of the AIU community who use computing and network resources are responsible for the integrity of those resources. University information technology resources are to be used in a manner that is consistent with the instructional, research, and administrative objectives of AIU, including use for study, instruction, research, the discharge of official university business, and other university-sanctioned activities. Use of computer and network resources is limited to members of the AIU community. In no event shall AIU be liable for any damages, whether direct, indirect, special or consequential, arising out of the use of information technology resources (i.e., the internet, campus servers, etc.), accuracy or correctness of databases or information contained therein or related, directly or indirectly, to any failure or delay of access to information technology resources. Use of any information obtained via the Internet is at the user's own risk. AIU reserves the right to remove user access to information technology resources to prevent further unauthorized activity as specified in this document. 


AIU works to create an intellectual environment in which students, staff, and faculty may feel free to create and to collaborate with colleagues both at AIU and at other institutions, without fear that the products of their intellectual efforts will be violated by misrepresentation, tampering, destruction and/or theft. Access to the computing and network resource infrastructure both within AIU and beyond the campuses, sharing of information, and security of the intellectual products of AIU, all require that each and every user accept responsibility to protect the rights of the community. 


AIU’s computing and network resources must not be used to produce, view, store, replicate, or transmit harassing, obscene, or offensive materials. This includes, but is not limited to, material from the internet, screen savers, etc. In addition, printed copies of such material, including those from magazines, are not permitted in the school. 


Students are responsible for backing up their data to media such as memory stick, CD, ZIP, or floppy disk, or other future storage media the University may offer and support. As a user of AIU provided resources, AIU reserves the right to view/investigate your data. Please be sensitive to the inherent limitations of shared network resources. No computer security system can absolutely prevent a determined person from accessing stored information that they are not authorized to access. Show consideration for others and refrain from engaging in any use that would interfere with their work or disrupt the intended use of network resources. Students should especially avoid wasteful and disruptive practices, such as sending chain letters, broadcast messages or unwanted material. Email and other network resources may not be used for commercial purposes or for personal financial gain. 



GUIDELINES FOR USE OF COMPUTING AND NETWORK RESOURCES 


AIU expects all students to be responsible users of Computing and Network resources. Failure to act responsibly may result in restricted access and could lead to withdrawal. In addition, AIU will not hesitate to report potentially illegal activities to the appropriate authorities. AIU’s policies concerning the unauthorized use of computer resources include, but are not limited to the following:


• Users are responsible for use of all of their accounts. No one should attempt to use another person’s password and/or user name. Users will be held accountable if others abuse the system in their name. 

• Users must not attempt to modify system resources, interfere with other users or system operations, or circumvent the limits and permissions associated with their accounts. 

• The technology resources may not be used for any form of commercial solicitation or advertising or solicitation of donations to charitable causes or organizations without proper authorization from AIU. 

• Technology resources may not be used to view, produce, store, replicate, or distribute harassing or obscene material.