UNIVERSITY OF SOUTHERN PHILIPPINES FOUNDATION

INFORMATION AND COMMUNICATIONS TECHNOLOGY

APPLY ONLINE NOW

Welcome to Information and Communications Technology

  • The ICT Department provides information services to the USPF community. This includes both resource provision and user support.
  • The ICT Department can be contacted by email helpdesk@uspf.edu.ph or by telephone 4148773 loc 218

Vision

  • Will be providing a 21st century ICT infrastructure in support of the mission and vision of the university.

Mission

  • Manage USPF’S ICT infrastructure and make it effective, efficient and secured

Generally Acceptable ICT Use Policies

Generally Acceptable ICT Use Policy for Students

1. PURPOSE

1.2 Access to computing and networking resources is a privilege to which all USPF faculty, staff, and students are entitled. Accompanying that privilege is an obligation, on the part of users, to understand and abide by the responsibilities and regulations that govern the computing environment at the University of Southern Philippines Foundation.

1.3 This document outlines the University of Southern Philippines Foundation guidelines concerning the acceptable use of University owned networks and computer facilities. These guidelines reflect the general ethical principles of the USPF community and indicate the responsibilities inherent in the University computing environment.
2. SCOPE

2.1 ALL BONA FIDE USPF STUDENTS

3. REFERENCE

3.1 APPROVED GENERALLY ACCEPTABLE ICT USE POLICY

4. REFERENCE FORM
4.1 http://uspf.edu.ph/about-us/information-and-communications-technology/generally-acceptable-ict-use-policy-for-students/
5. ACRONYMS

5.1 ICT - Information Communications Technology

5.2 Chat rooms - an area on the Internet or other computer network where users can communicate,typically limiting communication to a particular topic.

5.3 Internet forums/message boards - An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are often longer than one line of text, and are at least temporarily archived.

5.4 Social networking sites - A social networking service is an online platform that people use to build social networks or social relations with other people who share similar personal or career interests, activities,backgrounds or real-life connections. Some of the popular Social Media Sites are: Facebook, Twitter, linkedIn, Youtube, Pinterest, Instragram, etc.
5.5 Instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of nearreal-time messages through a stand-alone application or embedded software. Unlike chat rooms with many users engaging in multiple and overlapping conversations, IMsessions usually take place between two users in a private, back-and-forth style of communication.

5.6 E-mail - Electronic Mail is a method of exchanging messages between people using electronic devices.

5.7 Avatars - an image that represents you inonlinegames,chatrooms, etc. and that you can move around thescreen: You can talk to other avatars with your words displayed in a cartoon bubble.
5.8 Flame Trolling / Flame wars - Flame trolling is the posting of a provocative or offensivemessage, known as "flamebait", to a public Internet discussion group, such as a forum, newsgroup or mailing list, with the intent of provoking an angry response (a "flame") or argument.

5.9 Internet Advertising - Online advertising, also called online marketing orInternet advertising orweb advertising, is a form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers.

5.10 Redirected/automatic linking - URL redirection, also calledURL forwarding, is aWorld Wide Web technique for making aweb page available under more than oneURL address. Sometimes this is used for hostile purposes such asphishing attacks or malware distribution.

5.11 Spam - Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Mostspam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services.

5.12 Pop-ups - Pop-up ads orpop-ups are forms of online advertising on the World Wide Web. Apop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.

6. RESPONSIBILITY
6.1 All STUDENTS
7 INSTRUCTION

7.1 Information and Communication Technology significantly alters the information landscape for USPF by opening classrooms to a broader array of resources, including those from file servers throughout the world. University of Southern Philippines Foundation’s goal is to provide students with the understanding, tools and skill sets needed to use technology in ways appropriate to their education and learning as deemed by the university. Making this technology available to students carries with it the risk that some information may be identified as controversial or potentially harmful. Therefore, access will be provided only to individuals who pledge to act in a considerate, ethical and responsible manner.

7.2 With the use of Information and Communication Technology, accessible information changes daily. It is not always possible to predict what students and other individuals may encounter. It is impossible to prohibit access to all controversial or potentially harmful sites and/or services. USPF does not condone the access and/or use of inappropriate material. An honor system is in effect. Individuals are expected to report any security abuses by others, or potential problems to computer teachers, librarians, or the Information Communication Technology Department.

7.3 This policy applies to all technology including, but not limited to: computers, phones, audio/video equipment, copy machines, and information storage devices.
8 Unauthorized copying, installation, use or theft of software, media, electronic files, data or other intellectual property

8.1 It is unethical and forbidden to copy, install, take or use software, media, electronic files, data or other intellectual property unless permission has been obtained from its creator, owner or publisher, either in writing or as a license agreement. 9 Unauthorized materials and electronic files

9.1 Any attempt to distribute and/or gain access to inappropriate materials including, but not limited to pornographic materials, malicious codes and applications, unlicensed video and audio files and unauthorized games, is likewise prohibited.

10 Use of any technology for activities unrelated to specific university use
10.1 Any use of technology by students must be directly related to their education as directed by teachers or staff. Students will not use university technology for accessing information or technology not within the university’s control without expressed and specific permission from the IT Office and the principal. This will include, but will not be limited to, remote control of home computers, remote access to other networks, unauthorized proxy services and others. Technology will not be used by students for entertainment, gameplaying or for activities unrelated to their current education and learning.
11 Prohibited Behaviors

11.1 Students are responsible for their behavior on university computer systems, just as they are always throughout the university. Below are samples of conduct that will not be tolerated including, without limitation:

11.1.1 Tampering and/or attempt to tamper, theft, remove or change any hardware or software from any USPF-owned or leased system or equipment

11.1.2 Deleting, renaming, moving, copying or changing any electronic files or their properties, other than their own, without explicit permission from the owner or university authorities

11.1.3 Changing or attempt to change passwords other than their own

11.1.4 Intentionally impersonating someone else and/or misrepresenting another through the use of another’s university email account whether within or outside University of Southern Philippines Foundation

11.1.5 Intentionally and/or maliciously bypassing, circumventing the user-security mechanisms of the network system

11.1.6 Playing unauthorized computer arcade games

11.1.7 Installing unauthorized personal software on university technology equipment

11.1.8 Violating copyright laws by unauthorized copying and distribution of software or other Digital media

11.1.9 Installing, copying or knowingly infecting a computer system with a virus and/or malicious programs

11.1.10 Wasting resources including bandwidth, file storage space, printers or paper

11.1.11 Using technology for unauthorized commercial purposes

11.1.12 Mass Mailing

12 Harassment using technology

12.1 Use of the phone system, copy machines, computer systems, email or any technology to send or display inappropriate, obscene or harassing messages or material anywhere or to anyone is prohibited

12.2 Harassment on the Internet, can occur in many ways. A common form of sexual harassment on the Internet occurs when a harasser sends unwanted, abusive, threatening, or obscene messages to a victim via e-mail or instant messaging. Another common form of Internet harassment occurs when a victim is subject to unwanted, abusive, threatening or obscene messages and/or comments on internet forums, blogs, and discussion boards.
12.3 Harassment on the Internet can occur in a variety of ways but not limited through a variety of mediums:

  1. Chat rooms;
  2. Internet forums/message boards;
  3. Social networking sites;
  4. Instant messaging;
  5. E-mail;
  6. Avatars;
  7. Flame wars
  8. Internet Advertising
  9. Redirected/automatic linking
  10. Spam
  11. Pop-ups

12.4 Using the mediums as stated above to conduct harassment is highly prohibited.
13 Invasion of the privacy or property of individuals or the university using technology, reporting of violations

13.1 All students must respect any individual’s work, electronic files and right to privacy. The ICT office reserves the right to inspect any student’s data, university email, media, electronic files and property brought into university and used to access university technology. This will include but will not be limited to: printed documents, diskettes, flash disks, CD/DVD ROMs. Students not willing to allow such inspection will not bring technology items not owned or controlled by the university into university facilities, nor use them to access university technology.

14 Accessing, creating, displaying or publishing inappropriate or demeaning materials or information

14.1 Some materials or information available as electronic information on the network and the internet is considered objectionable by some. Students will not access, create, display, or publish any inappropriate or demeaning materials or information. Students are prohibited from accessing or participating in online “chat rooms” or other forms of direct electronic communication like internet SMS (other than e-mail) without prior approval from the principal and ICT Office.
15 Privacy in communication over the Internet and the network is not guaranteed.
15.1 You must know that the ICT Office will monitor, log, review, and inspect all directories, files, and/or messages residing on or sent using the university’s computer network. Messages relating to or in support of illegal activities will be reported to the appropriate authorities.

16 Failure to Adhere
16.1 The consequences for failure to adhere to Generally Acceptable ICT Used Policy may result in restriction or even complete loss of access to part or all forms of any technology or other disciplinary measures deemed appropriate by the university administration. There will be consequences for any individual who fails to follow University of Southern Philippines Foundation (USPF) policies. The consequences may include paying for damages, denial of access to technology, detention, suspension, or expulsion.
Generally Acceptable ICT Use Policy for Employees

1. PURPOSE

1.2 Access to computing and networking resources is a privilege to which all USPF faculty, staff, and students are entitled. Accompanying that privilege is an obligation, on the part of users, to understand and abide by the responsibilities and regulations that govern the computing environment at the University of Southern Philippines Foundation.
1.3 This document outlines the University of Southern Philippines Foundation guidelines concerning the acceptable use of University owned networks and computer facilities. These guidelines reflect the general ethical principles of the USPF community and indicate the responsibilities inherent in the University computing environment.

2. SCOPE
2.1 ALL BONA FIDE USPF

3. REFERENCE
3.1 APPROVED GENERALLY ACCEPTABLE ICT USE POLICY

4. REFERENCE FORM
4.1 http://uspf.edu.ph/about-us/information-and-communications-technology/generally- acceptable-ict-use-policy-for-employees/
1. PURPOSE

1.2 Access to computing and networking resources is a privilege to which all USPF faculty, staff, and students are entitled. Accompanying that privilege is an obligation, on the part of users, to understand and abide by the responsibilities and regulations that govern the computing environment at the University of Southern Philippines Foundation.
1.3 This document outlines the University of Southern Philippines Foundation guidelines concerning the acceptable use of University owned networks and computer facilities. These guidelines reflect the general ethical principles of the USPF community and indicate the responsibilities inherent in the University computing environment.

2. SCOPE
2.1 ALL BONA FIDE USPF

3. REFERENCE
3.1 APPROVED GENERALLY ACCEPTABLE ICT USE POLICY

4. REFERENCE FORM
4.1 http://uspf.edu.ph/about-us/information-and-communications-technology/generally- acceptable-ict-use-policy-for-employees/

5. ACRONYMS
5.1 ICT - Information Communications Technology

6. RESPONSIBILITY
6.1 All school officials, administrators, deans, directors, faculty and staff
7 INSTRUCTION
7.1 Access to telecommunications, network services and its contents are authorized for legitimate University of Southern Philippines Foundation’s business purposes only. All employees are expected to use discretion, good judgment and common sense and to conduct themselves morally and professionally in using, accessing and transmitting university related Information Communication Technology data and services. Any person who infringes this policy may be subjected to disciplinary action.

7.2 By definition, the Vice President Information Communications Technology will have access to all files on all computers and systems. Please do not store personal and confidential files on your computer machines.

7.3 All University of Southern Philippines Foundation students and employees will be responsible in safeguarding the data and services being offered by the university. They will likewise be responsible in safeguarding their account password and accesses. Any attempt to compromise account passwords is prohibited.

7.4 Unauthorized mass mailing is always prohibited.

7.5 Attempt to forge and/or tamper University of Southern Philippines Foundation online and network systems is also prohibited.

7.6 NO individual shall attempt and/or intentionally cause damage to any equipment or software belonging to University of Southern Philippines Foundation. Installing any software or systems, unauthorized by the University is likewise prohibited.

7.7 In addition, below are samples of conduct that will not be tolerated including, without limitation:

7.7.1 Tampering and attempt to tamper or remove any hardware or software from any USPF owned or leased system or equipment

7.7.2 Deleting, renaming, moving, copying or changing any files or its properties, other than their own files

7.7.3 Change and attempt to change passwords other than their own

7.7.4 Intentionally impersonating someone else and/or misinterpreting yourself using another’s email account, computer or other University of Southern Philippines Foundation assets.

7.7.5 Using other accounts to distribute or access inappropriate materials

7.7.6 Intentionally bypassing or circumventing the user-security mechanisms of the USPF network system without authorization.

7.8 Information Communication Technology resources may not be used for accessing, viewing, posting, downloading, storing, transmitting, sharing, printing, distribution or solicitation of any information or material, graphical or plain from any source that the university deems pornographic, obscene, abusive or otherwise offensive or inappropriate for the university system. This policy will apply to any activities occurring within the university’s premises or at any university-sponsored event. This policy also applies to any activity involving the use of university-owned or leased property including but will not be limited to laptops, PC’s, network systems, email, internet access and intranet access. Any person who infringes this policy may be subjected to disciplinary action.

7.9 Employees are responsible for reading their email regularly and report to ICT for any concerns.

7.10 Use of the university email account may give the appearance that you represent the University of Southern Philippines Foundation. Utmost care and discretion should be exercised when using these online services.

7.11 Guidelines should always be followed.
7.11.1 Be Polite. Abusive or derogatory words and messages is prohibited
7.11.2 Do not reveal information about you or other individuals
7.11.3 Do not use online systems to harass, intimidate or threaten any person or organization.
7.11.4 Communications intended for internal use should not be forwarded.
7.11.5 Protect and help protect copyright laws. Do not support illegal copying, distribution and use of pirated software whether this is in the data form, audio files and /or any video files.
8 University of Southern Philippines Foundation reserves the right to monitor and if necessary, block access and services to internal and external sites it considers unproductive, pornographic and/or any other sites and/or services it deems unfit for the university.
USPF E-Mail Policy
1 PURPOSE
1.1 The e-mail system at University of Southern Philippines Foundation is an official means of communication. Emails are routinely sent to the “University of Southern Philippines Foundation Family” and the University of Southern Philippines Foundation University “Student Body” and/or other subgroups of individuals affiliated with the University. It is the policy of University of Southern Philippines Foundation to ensure appropriate, safe, and effective e-mail use.

1.2 This policy is intended to help the University of Southern Philippines Foundation to provide a convenient means to communicate within and outside of the University and to protect the security of the University’s computer network. 2 SCOPE
2.1 This e-mail policy is applicable to all administrators, faculty, staff, and students

3 REFERENCE
3.1 APPROVED EMAIL POLICY

4 REFERENCE FORM
4.1 http://uspf.edu.ph/about-us/information-and-communications-technology/e-mail-policy/
5 ACRONYMS
5.1 ICT - Information Communications Technology

5.2 Auto Responder – A predetermined response to anyone who sends an email to a certain address. Employees who will not have access to email for an extended period of time commonly use auto responder to notify senders of their absence.

5.3 “The University of Southern Philippines Foundation Family” – E-mail recipients including University employees and students.

5.4 Data Leakage – (also called data loss) refers to data that is pilfered in small amounts or otherwise removed from the network or computer systems.

5.5 Leakage is sometimes malicious; other times, used inadvertently by users with good intentions.

5.6 Chain E-mail – An e-mail which in the body or the subject requests the recipient(s) to forward the e-mail to multiple persons.

5.7 E-mail – (short for electronic mail) refers to electronic communication sent between networked computer users and/or between networked and other users.

5.8 Encryption – The process of encoding data with an algorithm so that it is unintelligible and secure.

5.9 Spam – Unsolicited bulk e-mail which normally includes advertisements, but which can include malware, links to infected websites, or other malicious or objectionable content.

5.10 The “Student Body” – E-mail recipients including all University of Southern Philippines Foundation University students above 13 years old.
6 RESPONSIBILITY
6.1 administrators, faculty, staff, and students THAT WERE PROVIDED WITH EMAIL ACCOUNTS

7 INSTRUCTION
7.1 GENERAL RULE

7.2 Emails should be directed to the concerned office. Please refer toE-mail Use/Etiquettefor details.
7.2.1.1.1 Ex. Email to inquire regarding foreign student’s records should be sent to theintlstudsec@uspf.edu.ph Registrar’s Office.

7.3 Email users should check their emails everyday. E-mail users at University of Southern Philippines Foundation are strongly encouraged to use personal and professional courtesies and considerations in e-mails. University management has established general guidelines for the use of the e-mail system.

7.4 However, because these guidelines do not encompass many possible situations, it is ultimately at the discretion of University management to determine appropriate and inappropriate e-mail usage. The University’s guidelines under respective headings follow.
8 Appropriate E-mail Usage includes (but is not limited to):
8.1 Use related to the University’s mission, vision and objectives;
8.2 Use for the purpose of or in support of educational research; and
8.3 Use related to the administrative and other support activities of the University.

9 Inappropriate E-mail Usage includes (but is not limited to): Use, which violates the Law of the Republic of the Philippines, and other laws and/or University policies;
9.1 Sending or forwarding chain e-mails;
9.2 Sending or forwarding e-mails which harass or intimidate;
9.3 Sending or forwarding spam, solicitations, junk mail, threats, or pyramid schemes;
9.4 Sending or forwarding information of a pornographic, immoral or obscene nature;
9.5 Sending or forwarding the illegal download of music and/or literary material;
9.6 Sending or forwarding e-mails which may cause embarrassment, and/or damage to the
reputation of an individual or the University.
9.7 Sending or forwarding e-mails that may cause disruption to the workplace environment or which may create a hostile workplace. (This includes sending emails that are intentionally inflammatory, or that include information not conducive to a professional work environment.)
9.8 Using the University’s e-mail system for commercial use.
10 Other Relevant E-mail Usage includes (but is not limited to):
10.1 Confidential Data – E-mail is an insecure means of communication. The University requires that any e-mail containing confidential information, regardless of whether the recipient is internal or external to the University network, be encrypted. A user should consult personnel in the Office of Information Communication Technology regarding the encryption of confidential data.

10.2 Data Leakage – E-mail poses a particular risk to the control of the University’s data. Unauthorized e-mailing of University data, confidential or otherwise, to external e-mail accounts for the purpose of saving this data external to the University’s systems is prohibited. The University has provided the facility to save these emails, including all attachments to the Cloud. If a user needs access to information from external systems (such as from home or while traveling), rather than e-mailing the data to a personal account or otherwise removing it from the University’s systems, the user should use the USPF provided email facilityAT ALL TIMES.

10.3 E-mail Contents – University e-mail users should not open e-mails that appear suspicious. If a user is particularly concerned about an e-mail, or believes that it contains illegal content, he or she should notify his or her supervisor or the ICT Office athelpdesk@uspf.edu.ph

10.4 E-mail Deletion – Though the University’s email box is provided with UNLIMITED storage space per user account, the University management encourages users to periodically delete e-mails, which are no longer needed. However, the University strictly prohibits deleting e-mails in an attempt to hide a violation of a law, a violation of University policy, or which may be relevant to an active investigation or litigation.

10.5 E-Mail Subject Line – As a means to ensure good customer service and to ensure that e-mails get appropriate attention, University management require completion of the e- mail subject line to reflect the nature of the e-mail.

10.6 Mass E-mails – Only persons authorized by the Office of Information Communications Technology at University of Southern Philippines Foundation can send e-mails to large segments of the University’s population, such as all staff, faculty, or the student body.

10.7 Personal E-mail Use – Personal use of the University’s e-mail system is permitted as long as such usage does not negatively impact the University’s computer network and/or the user’s job performance.

10.8 E-mails to Multiple Recipients – The clarity of communications is important. Users should use caution in sending e-mail to make sure that all recipients included in an e mail are necessary; for example, some recipients may need to be aware of parts of an e-mail but not the e-mail in its entirety; in such cases, it may be beneficial to verbally communicate with those individuals rather than communicating through e-mail.

10.9 Opening E-mail Attachments – Viruses, Trojans, and other malware can easily be delivered as an e-mail attachment. USPF users should be careful when opening attachments that are unexpected and/or from unknown sources.

10.10 “Reply All” E-Mail Feature –E-mail users should use the “reply all” email feature sparingly. The feature should not be used if only the original sender(s) or particular (not all) persons need to receive the reply.

10.11 Sending E-mails – Careful sending of an e-mail will help the University avoid the unintentional disclosure of sensitive or non-public information. An e-mail must be addressed and sent carefully. Users must take extreme caution when typing in addresses, particularly when email address autocomplete features are enabled.

10.12 Sending Large E-mails – E-mail systems are not designed to transfer large files and as such e-mails should not contain attachments of excessive file size. University management recommends that e-mail users limit attachments to 10 megabytes or less.

10.13 The Three Email Rule – If you exchange more than three e-mails on a topic, call the recipient; as appropriate, consider visiting the recipient.
11 Management’s Rights and Responsibilities Regarding E-mails
11.1 Computer use (including use of the e-mail system) at University of Southern Philippines Foundation is a privilege, not a right. University management has the right to deny computer use to individuals who have not complied with the University’s Generally Acceptable ICT Use Policy. Please visit thewww.uspf.edu.ph website for details.

11.2 The University owns and maintains all legal rights to its e-mail system and its computer network. University rights may include but are not limited to transmission and storage of file messages. This may include the interception and review of any e- mails, or other messages sent or received, inspection of data stored on personal file directories, hard disks, and removable media.

11.3 When a user leaves the University, or his or her email access is officially terminated for another reason, the University will disable the user’s access to the account by password change, disabling the account, or another method. The University is under no obligation to block the account from receiving e-mail, and may continue to forward inbound email sent to that account to another user, or set up an auto-response to notify the sender that the user is no longer employed by the University. The deactivation the account will be subject to the recommendation of the HRMD and will be executed by the ICT Office.

11.4 Any individual found to have violated this policy is subject to disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities are suspected, the University may report such activities to the applicable authorities.

11.5 If any provision of this policy is found to be unenforceable or voided for any reason, such invalidation will not affect any remaining provisions, which will remain in force. An individual who has questions about this e-mail policy should contact the University’s Office of Information Communications Technology Office (helpdesk@uspf.edu.ph).
12 E-mail Use/Etiquette
12.1 To be a good netizen (network citizen) and to protect yourself and others, follow the USPF guidelines when sending electronic mail.
12.2 E-mail has a unique protocol related to specifics such the type of lettering.For example, using all CAPS in an e-mail is perceived as shouting.

13 What to Do
13.1 Write carefully. Once you send an email message, you cannot take it back or make it disappear. The reality is that your messages may be saved for a very long time. They may also be read inadvertently by others, or forwarded to others without your knowledge.
13.2 Use upper and lowercase text. Using all uppercase letters means SHOUTING. SEE WHAT I MEAN? Most people finding it annoying and harder to read.
13.3 Sign your messages with at least your name. It’s nice to add your email address, too, since some email programs make it difficult to see who the sender of the message was.
13.4 Address your messages carefully. Some addresses may belong to a group, even though the address appears to belong to just one person.

14 Use theTo,Cc, andBcc fields correctly. Here are a couple of simple guidelines:
14.1 When sending to several people who know each other, it’s okay to put their addresses in theTo field.
14.2 When sending to many people who don’t know each other, put their addresses in theBcc field instead.
(Why? Addresses in the To field are visible to all recipients. Addresses in the Bcc field are not. Using the Bcc field means you’re protecting the email addresses, not sharing them broadly.)
14.3 Indicate humor or jokes with a sideways smiley face. The basic smiley is a colon, dash, and right parenthesis. There are many variations. You can also include something like “grin” or “sarcasm on” to show your state of mind.
14.4 Be diplomatic. Criticism is always harsher when written, and email can be easily forwarded.
14.5 Be calm. You may have misunderstood what was meant. Don’t reply while you’re still angry (this is called “flaming”)
14.6 Be brief. Don’t include background images, pictures, animations, etc. unless they are critical to your message. When replying to a message, you don’t have to include the entire text of the original message. Include just enough to give the context of your response.
14.7 Watch out for viruses and other threats in attached files. Attached files are a common way to spread computer viruses. Generally speaking, just receiving an attachment cannot infect your computer. But opening or running an attachment can.
14.8 If you don’t know why you got an attachment, contact the sender directly to verify that it is what it appears to be. Some viruses can attach themselves without the sender even knowing it; some can hide where they actually came from. It is also a good idea to scan all attachments with up-to-date antivirus software before opening them.
15 What Not to Do
15.1 Don’t forward chain mail! These messages tell you to send or forward them to several other people. Don’t! Starting or continuing chain mail violates university policy.
15.2 Don’t get fooled byInternet hoaxes andcomputer virus myths.Before you forward a so-called virus alert to everyone you know, email thehelpdesk@uspf.edu.ph to find out if it’s for real. It probably isn’t.
15.3 Don’t send unwanted email. It can be regarded as harassment, which is governed by university policies and codes. Sending email that someone else perceives as abusive or threatening may constitute criminal harassment.
15.4 Don’t send numerous unsolicited messages (“junk mail” or “spam”). Most people hate getting junk mail. It also slows down the networks and is generally a waste of resources.
15.5 Don’t forge messages. Altering electronic communications to hide your identity or impersonate another person is considered forgery and violates university policy. Even forgeries intended as pranks or jokes are considered violations.
15.6 Don’t forward emails unless you have the permission of the author. What they wrote may not have been intended for wider distribution, so it’s always better to ask.
15.7 Avoid large attachment to your emails, as this will cause delay on sending your email.All USPF Accounts are provided withunlimited storage space on your Google Drive. Share your file from your Google Drive instead.

Contact Us

E-mail Address: helpdesk@uspf.edu.ph

Mabini Campus Address

Mabini Street Cebu City

Tel: 414-8600


Lahug Campus Address

Salinas Drive, Lahug, Cebu City

Tel: 414-8773

    Vision

  • University of Southern Philippines Foundation is a 21st century transformative learning environment of global lifelong learners.

  • Mission

  • We commit ourselves to a value-laden quality education that nurtures ethical, creative, competent, and socially responsive individuals

    Goal

  • Transform USPF into a dynamic high-tech, high-touch learning organization in keeping with global standards in education and workplace requirements.