Student COmputer Use Policy
Franklin Pierce University provides students access to computing resources, including equipment and access to networks, as an integral part of the educational environment. As an academic community, Franklin Pierce University is dedicated to the free, open examination and exchange of ideas in the pursuit of knowledge. To preserve the privilege of network access, standards of behavior as outlined here apply to the use of resources. These guidelines are supplemental to, and to be used in conjunction with the Student Code of Conduct and the Honor Code. All equipment, network connections and computing facilities are the property of Franklin Pierce University. Use of networked resources implies acceptance of this policy.
General Information
Use of network resources is a privilege. The University reserves the right, without notice, to limit or restrict any individual's use, pending the resolution of alleged abuse of network resources. Each account includes email service to facilitate communication for faculty, staff, and students. The primary purpose of the computer lab is academic and University-related work. Each network account is provided with storage on the cloud. Students' data, stored on Microsoft Office 365 OneDrive or the Franklin Pierce networks, may be accessed by University personnel for appropriate management purposes, such as making back-up copies and reviewing reports of abuse.
- Students are responsible for safeguarding their network accounts, including user IDs and passwords.
- Students are expected to use this account in a responsible manner.
- Students are responsible for any network activity through their network account or originating from their equipment.
- Students are responsible for configuring the identification of their personal computers to match the user ID of their network accounts.
Inappropriate Use
The University's information technology equipment and services should be used in a responsible manner at all times. Inappropriate use or abuse of the University's information technology equipment/services will be considered serious policy violations. These include, but are not limited to, the following:
- Abusing, intimidating, threatening, or harassing another individual
- Sending unsolicited obscene material
- Interfering with the work of others
- Vandalizing, tampering with, or theft of the University's computing equipment or services in any way. This includes, but is not limited to, installation or modification of system software (unless under instruction from a professor during class), programs, and hardware configuration (including the installation of wireless routers);
- Searching for, or providing information about, another user's account, password or data files;
- Sharing network accounts with unauthorized users;
- Distributing unsolicited mass mailings (spamming);
- Using University network equipment and services for commercial purposes or unsolicited advertising;
- Using University network in attempt to gather information for use in identify theft.
- Download, saving and/or sharing illegally obtained or otherwise copyright-protected materials via the University’s network ; this is against the law and you could be liable for federal penalties (Basic information on Copyright Infringement)
Enforcement
The Vice President of Student Affairs and their designee(s) are responsible for investigating and adjudicating all alleged violations of the student code of conduct of which the computer use policy is a part.
CONTACT Student Conduct
Zauyah Waite, Ph.D.
Vice President for Student Affairs and Dean of Students
(603) 899-4162
waitez@shreekrishnaprakashan.com
studentaffairs@shreekrishnaprakashan.com