Access to computing and networking resources is a privilege to which all USPF faculty, staff, and students are entitled. Accompanying that privilege is an obligation, on the part of users, to understand and abide by the responsibilities and regulations that govern the computing environment at the University of Southern Philippines Foundation.
This document outlines the University of Southern Philippines Foundation guidelines concerning the acceptable use of University owned networks and computer facilities. These guidelines reflect the general ethical principles of the USPF community and indicate the responsibilities inherent in the University computing environment.
- Information and Communication Technology significantly alters the information landscape for USPF by opening classrooms to a broader array of resources, including those from file servers throughout the world. University of Southern Philippines Foundation’s goal is to provide students with the understanding, tools and skill sets needed to use technology in ways appropriate to their education and learning as deemed by the university. Making this technology available to students carries with it the risk that some information may be identified as controversial or potentially harmful. Therefore, access will be provided only to individuals who pledge to act in a considerate, ethical and responsible manner.
- With the use of Information and Communication Technology, accessible information changes daily. It is not always possible to predict what students and other individuals may encounter. It is impossible to prohibit access to all controversial or potentially harmful sites and/or services. USPF does not condone the access and/or use of inappropriate material. An honor system is in effect. Individuals are expected to report any security abuses by others, or potential problems to computer teachers, librarians, or the Information Communication Technology Department.
- This policy applies to all technology including, but not limited to: computers, phones, audio/video equipment, copy machines, and information storage devices.
1) Unauthorized copying, installation, use or theft of software, media, electronic files, data or other intellectual property
- It is unethical and forbidden to copy, install, take or use software, media, electronic files, data or other intellectual property unless permission has been obtained from its creator, owner or publisher, either in writing or as a license agreement.
2) Unauthorized materials and electronic files
- Any attempt to distribute and/or gain access to inappropriate materials including, but not limited to pornographic materials, malicious codes and applications, unlicensed video and audio files and unauthorized games, is likewise prohibited.
3) Use of any technology for activities unrelated to specific university use
- Any use of technology by students must be directly related to their education as directed by teachers or staff. Students will not use university technology for accessing information or technology not within the university’s control without expressed and specific permission from the IT Office and the principal. This will include, but will not be limited to, remote control of home computers, remote access to other networks, unauthorized proxy services and others. Technology will not be used by students for entertainment, gameplaying or for activities unrelated to their current education and learning.
4) Prohibited Behaviors
- Students are responsible for their behavior on university computer systems, just as they are at all times throughout the university. Below are samples of conduct that will not be tolerated including, without limitation:
- Tampering and/or attempt to tamper, theft, remove or change any hardware or software from any USPF-owned or leased system or equipment
- Deleting , renaming, moving , copying or changing any electronic files or their properties, other than their own, without explicit permission from the owner or university authorities
- Changing or attempt to change passwords other than their own
- Intentionally impersonating someone else and/or misrepresenting another through the use of another’s university email account whether within or outside University of Southern Philippines Foundation
- Intentionally and/or maliciously bypassing, circumventing the user-security mechanisms of the network system
- Playing unauthorized computer arcade games
- Installing unauthorized personal software on university technology equipment
- Violating copyright laws by unauthorized copying and distribution of software
- Installing, copying or knowingly infecting a computer system with a virus and/or malicious programs
- Wasting resources including bandwidth, file storage space, printers or paper
- Using technology for unauthorized commercial purposes
- Mass Mailing
5) Harassment using technology
- Use of the phone system, copy machines, computer systems, email or any technology to send or display inappropriate, obscene or harassing messages or material anywhere or to anyone is prohibited.
6) Invasion of the privacy or property of individuals or the university using technology, reporting of violations
- All students must respect any individual’s work, electronic files and right to privacy. The ICT office reserves the right to inspect any student’s data, university email , media, electronic files and property brought into university and used to access university technology. This will include but will not be limited to: printed documents, diskettes, flash disks, CD/DVD ROMs. Students not willing to allow such inspection will not bring technology items not owned or controlled by the university into university facilities, nor use them to access university technology.
7) Accessing, creating, displaying or publishing inappropriate or demeaning materials or information
- Some materials or information available as electronic information on the network and the internet is considered objectionable by some. Students will not access, create, display, or publish any inappropriate or demeaning materials or information. Students are prohibited from accessing or participating in online “chat rooms” or other forms of direct electronic communication like internet SMS (other than e-mail) without prior approval from the principal and ICT Office.
8) Privacy in communication over the Internet and the network is not guaranteed.
- You must know that the ICT Office will monitor, log, review, and inspect all directories, files, and/or messages residing on or sent using the university’s computer network. Messages relating to or in support of illegal activities will be reported to the appropriate authorities.
9) Failure to Adhere
- The consequences for failure to adhere to information communication technology use policy may result in restriction or even complete loss of access to part or all forms of any technology or other disciplinary measures deemed appropriate by the university administration. There will be consequences for any individual who fails to follow University of Southern Philippines Foundation (USPF) policies. The consequences may include paying for damages, denial of access to technology, detention, suspension, or expulsion.