» Computer and Network Acceptable Use Policy

The University's computing and network systems and services, "Chapnet", are a University-owned resource and business tool to be used only by authorized persons for educational purposes and to carry out the legitimate business of the University. Individual Chapnet user accounts are created and removed according to the guidelines stated in the Chapnet Account Policies document.

Freedom of speech is central to the mission of higher education. Chapman University respects and encourages the exchange and debate of ideas, including electronic interchanges. However, all communications conducted on University computers or networks should be business-like, courteous and civil. The protection of confidential, sensitive, and proprietary information is of critical importance to the University; therefore it is essential that faculty, students and staff take steps to safeguard such information. The University does not condone messages of hate, bigotry, violence or intimidation directed at any individual or group, or harassment of any kind. Acts of harassment and threats will be thoroughly investigated by University, and may be subject to review by state and federal enforcement agencies.

All users of Chapnet agree to abide by the Chapman University Computer and Network Acceptable Use Policy. Use of Chapnet constitutes acceptance of the terms and conditions specified by these policies. The policy describes acceptable use of Chapnet, whether accessed through computers and devices owned by Chapman University, or through personally owned computers and devices connected to the Chapman network, or remotely through outside equipment. For the purposes of this policy, Chapnet is defined to include all Chapman University-owned computer equipment, the operating systems and application software that reside on this equipment, and the networking hardware and software which connects this equipment. By extension, this policy applies to all Internet traffic that flows through Chapnet. As a condition for receiving a Chapnet account, you agree to observe the following:

  1. It is appropriate to use Chapnet for classroom and instructional activities, research related activities, correspondence and support and administrative functions. Misuse includes but is not limited to violation of federal or state law, violation of University policy, unauthorized use of the system for commercial purposes, displaying sexually graphic images or text, abusive language, harassing behavior, unauthorized use of copyrighted materials, and excessive use for non-official or frivolous purposes.
  2. University owned equipment and Chapnet services may not be used for illegal purposes. Users must abide by all software licenses, copyright and intellectual property policies and applicable federal and state laws. Plagiarism of electronic works is prohibited. The unauthorized use of copyrighted material is prohibited. This includes but is not limited to:
    • (a) Reproduction of copyrighted materials, trademarks, or other protected material in any electronic form without express written permission from the material's owner;
    • (b) Use, distribution or duplication of copyrighted software without appropriate licensing agreements, or use of software in a manner inconsistent with its license;
    • (c) Use, distribution or reproduction, in any digital form, of copyrighted music, video, or other multimedia content without the express written permission of the material's rightful owner;
    • (d) Copyright violations as they apply to all information available electronically.
  3. Although Chapman University does not make a practice of monitoring Chapnet e-mail, the University reserves the right to retrieve the contents of University-owned computers or Chapnet e-mail messages for legitimate reasons, such as to find lost messages, to comply with investigations of wrongful acts, to respond to subpoenas, or to recover from system failure.
  4. Except as authorized, in writing or by e-mail, by the University, users are not to use Chapnet for compensated outside work, the benefit of organizations not related to the University (except in connection with scholarly, creative or community service activities), or commercial or personal advertising.
  5. Direct political campaigning and fundraising of any kind is considered an inappropriate use of Chapnet; however, general discussion and debate of political issues falling within the scope of intellectual activity is not discouraged.
  6. The privilege of using Chapnet is provided by the University and is not transferable or extendable by members of the University community to people or groups outside the University.
  7. Users are responsible for the use or misuse of their own accounts. Users are responsible for safeguarding their account passwords. A user should never use another person's account, or give his or her own password to another person for the purpose of gaining access to Chapnet. Account holders are responsible for all actions performed with their accounts.
  8. The ability to read, alter or copy a file does not imply permission to read, alter, or copy that file.
  9. It is unacceptable to try to bypass standard procedures, including attempting to discover another person's password, or to use an account for purposes for which it was not intended. Attempts to gain unauthorized access to machines via the network, to decrypt encrypted material, or to obtain privileges to which the user is not entitled are prohibited by public law. Attempts to circumvent data protection schemes, to discover security loopholes, or possession of software for such purposes by users are prohibited. Port scanning or other network vulnerability scanning to discover open services on computers inside or outside the Chapman network is prohibited except for use by the Network Operations staff of the Information Systems & Technology Department (IS&T) who, with the knowledge and permission of the Chief Information Officer, may use this technique to monitor the Chapman network.
  10. It is unacceptable to intentionally distribute a computer virus or engage in any procedure that interferes with the normal operation and delivery of services over the network.
  11. Chapnet users assume the responsibility for backing up their own data and programs.
  12. No person shall use or cause to be used any software on the University's computers that does not fall into one of the following categories:
    • (a) It is in the public domain.
    • (b) It is covered by an effective licensing agreement with the software author, authors, vendor or developer, whichever is applicable.
    • (c) It has been donated to the University and a written record of a bona-fide contribution exists.
    • (d) It has been purchased by the University and a record of a bona-fide purchase exists.
    • (e) It has been purchased by the user and a record of a bona-fide purchase exists and can be produced by the user upon demand.
    • (f) It is being reviewed or demonstrated by the users, pursuant to permission given by the owner, in order to reach a decision about possible future purchase or request for contribution or licensing.
    • (g) It has been written or developed by a Chapman University employee for the specific purpose of being used in the University's computer environment.
  13. The Chief Information Officer of Chapman University is designated as the only individual who may sign license agreements for all software for Chapman University.
  14. Copying of computer software may be done only in compliance with the published copyright and licensing agreements provided with the purchase of all software.
  15. All servers on Chapnet, including but not restricted to web servers, ftp servers, email servers, game servers and computers equipped with peer-to-peer file sharing software through which files are made available to other users, are prohibited unless authorized by the IS&T Department. Authorized servers must not interfere with the performance of the network by consuming excessive amounts of resources.
  16. Chapnet users who wish to create web sites on Chapman's web servers agree to abide by the guidelines in set by Strategic Marketing & Communication department.
  17. All Chapnet users must observe the policies of other networks accessed via Chapnet.
  18. Chapnet users may not conceal or misrepresent their identities when sending e-mail messages.
  19. Chapnet users should keep in mind that many people use the Chapnet network for daily work. Behaviors that inhibit or have the potential to inhibit the ability of others to utilize shared computing resources are considered policy violations. Such behaviors include but are not limited to:
    • (a) Exceeding limits for resource usage (e.g. disk space, bandwidth, CPU time). Allowable limits are determined by the IS&T Department.
    • (b) Providing access to Chapman resources to individuals outside the university community.
  20. The Chapnet system may not be used for playing computer games if such activity is detrimental to the use of Chapnet for academic, research or university business purposes in the judgment of the IS&T Department.
  21. Regardless of available encryption methods or other security, users should understand even with the commitment to safeguard Chapnet, it is impossible to eliminate all risk of breach; therefore, every effort should be made to secure data that is considered highly sensitive, confidential or personal.
  22. All wireless traffic is presumed to be insecure and susceptible to unauthorized examination. Due to this lack of privacy, users should not use the wireless network to access critical and essential applications or transmit sensitive material and information, social security numbers or credit card information. Individuals assume full responsibility and accountability of wireless network communications. Chapman University will take precaution to minimize this exposure and will proactively introduce new technologies, when available, to secure and safeguard network traffic.
  23. Chapman maintains broad wireless coverage throughout the Orange Campus and Residential Complex. In order to provide the best overall performance and security for this wireless service, personal wireless routers are not allowed. Any wireless device that is found to interfere with the proper operation of Chapman's wireless network is prohibited. This can include some portable telephones that operate in the 2.4 GHz or 5 GHz frequency bands.
  24. When connecting personally owned computers to Chapnet, the user of those computers must takes steps to make sure that the computers are free from security vulnerabilities and viruses. In particular these computers must have operating systems that are supported by their manufacturers (e.g. Microsoft Windows XP and Apple Macintosh OS/X) and must have antivirus software packages installed which are updated with the latest antivirus data files. Users must download and install the latest operating system and application software security patches. (Chapman provides antivirus software to be used by faculty, staff and students free of charge. Security patches can be downloaded at no cost to the user.) The IS&T department reserves the right to specify procedures that must be followed when connecting personally owned computer equipment to Chapnet.
  25. Each user is ultimately responsible for his or her own computing and his or her own work using a computer. Users should take this responsibility seriously. For example, users should remember to make backup copies of their data, files, programs, diskettes, and tapes, particularly those created on microcomputers and those used on individually or departmentally operated systems. Furthermore, users with desktop computers or other computers that they operate themselves must remember that they may be acting as the system administrators for those computers and need to take that responsibility very seriously.
  26. It is the user’s responsibility to review, understand and comply with this policy. The University is responsible to assure that all users are made aware of the policy and have access to the most recent version of it. Questions regarding the provisions and interpretations of this policy shall be directed to the Chief Information Officer or his/her designee.

Consequences of Misuse

The university reserves the right to restrict the use of its computing facilities and limit access to its networks when faced with evidence of violations of university policies or standards, contractual obligations, and federal, state or local laws. Violations of the law may be reported to the appropriate civic authorities.

Misuse of Chapnet may result in the loss of computing privileges and will require financial restitution to the University for losses incurred by the University. Misuse of Chapnet could also result in University disciplinary action and/or civil or criminal actions. Both unauthorized use of Chapnet and use of Chapnet for personal gain constitute theft under California law and will be prosecuted by the University.

Any actions which deter others from doing their work or which would be otherwise deemed malicious will result in the loss of access to the system and possible University disciplinary action and/or civil or criminal actions. Violations of this policy shall be referred to the appropriate University officials for disposition in accordance with the applicable policy governing the individual’s conduct.

  • Featured
  • News
  • Events