Acceptable Use Policy

Goodwin University's information systems and resources (including computers, computer accounts, printers, networks, software, electronic mail, Web pages, Webcam, audio and video conferencing, and the telephone and voice mail systems) are for the use of Goodwin University students, faculty, and staff. Users are encouraged to explore and use information systems and resources and to share their knowledge and expertise with other Goodwin University users. Nevertheless, resources may not be used for commercial purposes outside the scope of the University's mission. The provision of information systems and resources at Goodwin University requires legal and ethical utilization by all users. The following list, though not covering every situation, specifies policies and regulations that govern usage of information systems and resources at Goodwin University.


Use of Computing Resources

All users must comply with federal and state laws and all University policies related to any copying and use of computer software and electronic files. Goodwin University resources must not be used to violate the terms of license agreements, copyright, or trademark laws.

In addition, other activities that threaten the integrity of the system or harm individual users are not allowed. Prohibited activities include, but are not limited to:
  • Falsifying your identity when sending a communication
  • Tampering with, abusing, or otherwise damaging computer or telephone hardware or software. This includes software or network tampering (hacking), such as attempting to crack or guess passwords, sending anonymous mail, or “bombing” a mailbox with multiple copies of a message
  • Running or installing any program or sending any mass communication that overloads or substantially interferes with the proper operation of the computer system or network
  • Overloading or substantially interfering with the proper operation of the University's network and computer data storage
  • Using the University's computers or network or the telephone system to transmit fraudulent, defamatory, harassing, obscene or threatening messages or any communications prohibited by law
  • Improperly or inaccurately stating or implying the University's sponsorship or endorsement of any communications, including anything contained on a personal web page on the University's computers or network
  • Participating in or signing up for activities, the cost of which will be charged to the University, without obtaining the University’s prior authorization

Users who publish web pages or similar information resources on the University computers or computer system shall take full responsibility for what they publish, shall abide by this policy and other University policies, shall comply with all applicable laws, and shall not publish commercial advertisements without prior written authorization.

Security and Privacy

Goodwin University computer and telephone systems are vital to the academic mission of the University. To protect the safety and security of these systems, you must only use your account. You are responsible for all use of your account and may not authorize anyone else to use your account. You must take all reasonable precautions, including password maintenance and file protection measures to prevent its unauthorized use.

You must log in only to your own account, except for extraordinary situations where faculty or staff receive permission to access another person's account from Human Resources or the network administrator. In all other circumstances, you may not use another person's password or otherwise seek to gain access to another user's account.

Within means available, every member of the faculty, staff and student-body must take personal responsibility for maintaining the security of institutional records. Institutional records include all matters pertaining to personnel, payroll, registrar, admissions, financial aid, development, medical records, security reports, financial data and other information of a privileged and private nature.

No one has the right or authority to extend his/her own established range of access to computer records. You must not attempt to modify the system facilities or attempt to crash the system. You must not attempt to subvert the restrictions associated with your computer accounts. You must not tamper with any software protection placed on any computer applications. You must not modify or delete data in a University data base without authority.

Privacy: The University acknowledges its obligation – within the limitations of this policy and its ability – to respect the privacy of users' electronic files and communications on the University's information systems and resources. All system administrators shall respect the privacy of users and shall comply with the terms of this policy.

Nevertheless, individual users of information systems and resources should be sensitive to the inherent limitations of shared network resources. No computer security system can absolutely prevent unauthorized persons from accessing stored information and the University cannot and does not guarantee the privacy or confidentiality of stored information or electronic communications.

The University has the right to monitor and access a user's communications, files, stored information and use of the system only under the following limited circumstances:

  • When the user has consented, or has voluntarily made information or communications accessible to the public, as by posting them to a web page or listserv;
  • When necessary to maintain University business functions and the employee is no longer with the University, is suspended, or is otherwise unavailable;
  • When required by law or by University policies or regulations, as reflected in the Information for Faculty, the Employee Handbook, or the Student Handbook;
  • When necessary to protect the integrity, security and proper functioning of the University's computers and networks or to protect the University from liability;
  • When necessary to enforce this policy or other University policies and regulations, as reflected in the Information for Faculty, the Employee Handbook, or the Student Handbook, including the University's sexual harassment policy and anti-discrimination policies, and to investigate when there is reasonable cause to believe that any of those policies or any state or federal laws has been or is being violated. A user's communications or files will be accessed for this purpose only with the prior approval of the Vice President, Facilities and Information Technology or their designee, and Human Resources, in consultation with the appropriate Senior Administrators.
  • If the University monitors or accesses a user's files or communications, it will respect information and communications that are privileged or otherwise protected from disclosure by law. Any monitoring or access to a user's files or communications will be no more extensive than necessary to accomplish the business-related purpose for which it is authorized under this policy.

Other Applicable Rules Laws

Users of the University's electronic resources, including E-mail communications, are subject to University policies and other statements of conduct as published in the Student Handbook, Faculty Handbook, and the Employee Handbook as well as all applicable federal and state laws. It should be understood that this Acceptable Use Policy does not supersede existing University regulations and policies – including the University's non-discrimination and sexual harassment policies – or the laws and regulations of the state of Connecticut and/or the United States of America.

Consequences: System administrators shall have the right to temporarily suspend any user's access to the system without notice where there is reasonable cause to believe such access poses a threat to the security or proper functioning of the system or where it is necessary to comply with the law. Violations of this policy or any other University rules on computer use will be considered grounds for removal of account and network privileges, and where appropriate, other disciplinary action. The University may revoke a user's account and network privileges for violations of law, of this policy or other University policies and regulations, only after notice and opportunity to be heard. Other possible disciplinary action will be determined through referral to the appropriate disciplinary authorities under existing University procedures.