• Print

11.25.5 Internet and Network Security

Students are expected to comply with all California, federal, and other laws, as well as the University of the Pacific's policies and guidelines with regard to computer usage. The University views abuse of computer facilities and usage as a serious offense which will be adjudicated as specified in Pacific Guide - under Judicial System page 18 through 21.

Students should not use University computer resources for personal gain or commercial purposes. Also, students must not engage in any activity that interferes with another student’s use of the University's computer systems, or in any way impedes or restricts access of a University employee's use of, or access to, University computer resources.

Students should also be aware that their use of the University computing resources may be monitored. Although the University does not normally or routinely monitor individual use of the computers or the network, certain computing processes require backup of data and/or communications. The University may monitor, and/or interrupt network activity if one or more of the following occurs:

  1. The student has made confidential information publicly available by posting in a chat room, public bulletin board or web site.
  2. The University deems it necessary to protect the security and/or integrity of the network, its data, or other resources or to protect the University from some liability.
  3. The University believes an account may be involved in illegal activity or activity that is in violation of this policy.
  4. A User account is using excessive computer/network resources.
  5. Knowingly performing an act, which will interfere with the normal operation of computers, terminals, peripheral, or networks.

The use of the Internet can be a valuable tool in conducting research, communication with family and friends, etc. However, there is a significant risk to the student as well as the University when using the Internet. Students should use “common sense” when accessing the Internet and follow some basic “etiquette”. The following rules are intended as a guide in the proper use of the Internet and the University's network. It is not intended to be an all-inclusive list.

  1. Students should access only the systems to which they have explicit authority. In other words, students must not attempt to “hack” into other systems, either over the Internet or University-owned systems.
  2. Do not attempt to speak on behalf of the University or use University trademarks, logos, etc. without official permission from the University communications office.
  3. Students should not attempt to sign onto a University system as someone else or attempt to guess someone else's password.
  4. When accessing the Internet or school systems, students should never represent themselves as someone else (spoofing).
  5. Students should not send sensitive data across the Internet. The Internet is basically an insecure environment and should be treated as such.
  6. Students should refrain from participating in e-mail chain letters
  7. Students should not download or upload information whose content could cause the University legal ramifications or negatively reflect on the reputation of the University - including material with derogatory racial, sexual, or religious statements, materials with offensive language, graphics, or images, or other material that is prohibited by law.
  8. Using electronic mail to harass others.