This policy states the obligations and rules that students of The University of North Carolina Asheville must follow in their use of computing and networks.
This policy applies to all UNC Asheville students and students of other institutions attending classes delivered at UNC Asheville and who use University and computing resources.
The University of North Carolina Asheville’s (hereinafter “University”) computing and telecommunications networks, computing equipment and computing resources are owned by the University and are provided primarily to support the academic and administrative functions of the University. The use of this equipment and technologies is governed by federal and state law, and University policies and procedures. Additional rules and regulations may be adopted by various divisions/departments to meet specific administrative or academic needs. Any adopted requirements must be in compliance with applicable federal and state laws, and this policy.
The University may monitor use of computing equipment, networks, and systems for the following purposes:
A. To ensure the security and operating performance of its systems and networks.
B. To enforce University policies.
C. The University reserves the right to limit access when federal or state laws or University policies are violated or where University contractual obligations or University operations may be impeded.
D. The University may authorize confidential passwords or other secure entry identification; however, students have no expectation of privacy in the material sent or received by them over the University computing systems or networks. While general content review will not be undertaken, monitoring of this material may occur for the reasons specified above.
E. The University generally does not monitor or restrict material residing on University computers housed within a private domicile or on non-University computers, whether or not such computers are attached or able to connect to campus networks.
F. All material prepared and utilized for work purposes and posted to or sent over University computing and other telecommunicating equipment, systems or networks must be accurate and must correctly identify the creator and receiver of such.
G. A personal home page or a personal collection of electronic material that is accessible to others must include a disclaimer that reads as follows: “The material located at this site is not endorsed, sponsored or provided by or on behalf of the University of North Carolina Asheville.”
Students are expected to follow this policy and any related University rules, regulations and procedures for University work produced on computing equipment, systems and networks. Students may access these technologies for personal uses if the following restrictions are followed:
A. The use is lawful under federal or state laws including copyright and trademark.
B. The use is not prohibited by Board of Governors, University or institutional policies. All policies governing student conduct apply to student use of computing and networking resources.
C. The use does not overload the University computing equipment or systems, or otherwise harm or negatively impact the system’s performance.
D. The use does not result in commercial gain or private profit (other than allowable under University intellectual property policies).
E. The use does not state or imply University sponsorship or endorsement.
F. The use does not violate state or federal laws or University policies against race or sex discrimination, including sexual harassment.
G. The use does not involve unauthorized passwords or identifying data that attempts to circumvent system security or in any way attempts to gain unauthorized access.
H. If the use is recreational, it does not prevent use by another University community member for legitimate University work.
Violation of Policy
A. Sanctions for violation of this policy may include suspension or revocation of access privileges in addition to any other sanction permitted under the student conduct code.
B. The Chief Information Officer (CIO) may suspend a student’s access privileges for as long as necessary in order to protect the University’s computing resources. As soon as practicable following the suspension, the CIO must take the following actions:
ii. The student must be given an opportunity to meet with the CIO to discuss the suspension if the student requests it.
iii. Following the meeting, the student must be notified that the student may appeal to the Chief of Staff if the student is dissatisfied with the outcome of the meeting.
C. The CIO may refer the matter to the student conduct system.
D. Violations of law may also be referred for criminal or civil prosecution.