About This Policy
- Responsible Office
- Campus Technology (CT)
Grand Canyon University Guidelines for Responsible Computing
I. GENERAL STATEMENT
As a part of the physical and social learning infrastructure, Grand Canyon University acquires, develops, and maintains computers, computer systems and networks. These computing resources are intended for University-related purposes, including direct and indirect support of the University’s instruction, research, and service missions; University administrative functions; student and campus life activities; and contributions to knowledge, the profession and the educational environment of the University through the free exchange of ideas among members of the University community and between the University community and the wider local, national and international communities.
Computer systems and networks owned or operated by Grand Canyon University provide access to resources on and off campus. Such open access is a privilege and imposes upon users certain responsibilities and obligations. Access is granted subject to University policies, and local, state, and federal laws. Use of these resources must be consistent with professional standards and University policies; reflect the principles of academic integrity; show restraint in the consumption of shared resources; and adhere to law and University policy in regard to intellectual property, ownership of data, copyright, system security mechanisms, and individuals’ rights to privacy and to freedom from intimidation and harassment.
The rights of academic and political freedom and freedom of expression apply to the use of University computing resources. So, too, however, do the responsibilities and limitations associated with those rights. Therefore, legitimate use of a computer, computer system, or network does not extend to whatever is technically possible. Although some limitations are built into computer operating systems and networks, those limitations are not the sole restrictions on what is permissible. Users must abide by all applicable restrictions, whether or not they are built into the operating system or network and whether or not they can be circumvented by technical means.
All information, records and material maintained on the University’s computers and computing systems by University employees is the property of the University. Notwithstanding the above principle, the University acknowledges that faculty members may have an expectation, consistent with general practice in American higher education and any applicable collective bargaining agreement, of a proprietary interest in their scholarly and research materials, similar to the same interest they would have in handwritten materials produced within the scope of their employment.
This policy outlines the standards for acceptable use of University computing and information technology resources, which include, but are not limited to, equipment, software, networks, data and telephones, whether owned, leased or otherwise provided by Grand Canyon University.
II. APPLICABILITY
This policy applies to all users of computing and information technology resources owned or managed by Grand Canyon University, including resources available to the University through outsourced and applications service provider arrangements. Individuals covered by this policy include, but are not limited to, faculty, staff, students, guests, external individuals or organizations and individuals accessing the University’s information resources through external network services, such as the Internet.
Computing resources include all University owned, licensed or managed hardware and software, and use of the university network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.
This policy applies to technology administered in individual departments and resources administered by central administrative departments, such as the Helpdesk, University Library, and Campus Technology. Additional policies may apply to specific computers, computer systems, or networks provided or operated by specific units of the University or to uses within specific units. Users must consult the managers of the specific computer, computer system or network for further information.
III. POLICY
Preserving access to information resources is an effort that requires each member of the University community to act responsibly and guard against abuses. Therefore, anyone who accesses or uses the University’s computing resources in any way is obligated to abide by the following standards of acceptable and ethical use.
All users of university computing resources must:
- Comply with all federal, state of Arizona, and other applicable laws; all University rules and policies; and all contracts and licenses. Examples of such laws, rules, policies, contracts and licenses include the laws of libel, privacy, copyright, trademark, obscenity and child pornography; the Electronic Communications Privacy Act, and the Computer Fraud and Abuse Act, which prohibit various activities; the University’s code of student conduct; the University’s sexual harassment policy; and all applicable software licenses. Users are responsible for ascertaining, understanding and complying with the applicable laws, rules, policies, contracts, and licenses governing their computing activities.
- Use only those computing resources that they are authorized to use and use them only in the manner and to the extent authorized. Ability to access computing resources does not, by itself, imply authorization to do so. Users are responsible for ascertaining what authorizations are necessary and for obtaining them before proceeding. Accounts and passwords may not, under any circumstances, be shared with, or used by, persons other than those to whom they have been assigned by the University.
- Respect the privacy of other users and their accounts, regardless of whether those accounts are securely protected. The ability to access other persons’ accounts does not imply authorization to do so. Users are responsible for ascertaining what authorizations are necessary and for obtaining them before proceeding.
- Respect the finite capacity of computer resources and limit use so as not to consume an unreasonable amount of those resources or to interfere unreasonably with the activity of other users. Although there is no set bandwidth, disk space, or other limit applicable to all users of University computing resources, the University may require users to limit or refrain from specific uses in accordance with this principle, and users are required to constrain their use to reasonable limits. The reasonableness of any particular use will be judged in the context of all relevant circumstances.
- Refrain from using computing resources for personal commercial purposes, for personal financial, or other gain. Limited, occasional personal use of University computing resources is permitted where such use does not constitute commercial activity, activity for financial or other gain and when it does not consume a significant amount of those resources, does not interfere with the performance of the user’s job or other University responsibilities, and is otherwise in compliance with this policy. Further limits may be imposed upon personal use in accordance with normal supervisory procedures and as clarified in the State of Arizona’s Uniform Code of Ethics and the Student, Faculty and Employee Handbooks published by the University.
- Refrain from stating or implying that they speak on behalf of the University and from using University trademarks and logos without authorization to do so. Affiliation with the University does not, by itself, imply authorization to speak on behalf of the University nor does it permit members of the community to use the University’s trademarks and logos without the prior approval of University General Counsel or the Vice President for University Advancement. Please consult the University Code of Ethics and Policy for further clarification of requirements regarding disclaimers on expressive personal opinions, and to University Marketing pertaining to the use of University trademarks and logos.
IV. SECURITY AND PRIVACY
The University employs various measures to protect the security of its computing resources and of users’ accounts. Users should be aware, however, that the University cannot guarantee such security. Users should, therefore, be resolved in their efforts to establish appropriate access restrictions for their accounts, guarding their passwords, and changing them regularly.
Users should also be aware that their uses of University computing resources are not completely private. While the University does not routinely monitor individual usage of its computing resources, normal operation and maintenance require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns and similar activities that are necessary for the provision of service. The University may also specifically monitor the activity and accounts of individual users, including individual login sessions and communications, without notice, at its discretion, when (a) the user has voluntarily made them accessible to the public, as by posting to a web page; (b) the University requires access to information regarding the individual’s use of the computing resource; (c) it reasonably appears necessary to do so to protect the integrity, security or functionality of the University or other computing resources or to protect the University from liability; (d) there is reasonable cause to believe that the user has violated, or is violating, University policies; (e) an account appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns; or (f) it is otherwise required or permitted by law. Any such individual monitoring, other than that specified in “(a)”, required by law, or necessary to respond to perceived emergency situations, will be authorized in advance by the President, Vice President for Academic Affairs, or the Vice President for Information Technology, or their designees. All records of these authorizations will be maintained in a secure file by the Vice President for Information Technology as this is the unit that actually implements such requests.
The University, in its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, to appropriate University personnel or law enforcement agencies and may use those results in appropriate University disciplinary proceedings. Communications made by means of University computing resources are also generally subject to Arizona’s Open Public Records Act to the same extent as they would be if made on paper. Further clarification regarding the Open Public Records Act may be obtained at (https://azdor.gov/sites/default/files/media/NEWS_TAXCONFERENCE_2015_arizonapublicrecordslaw.pdf).
V. ENFORCEMENT
Violation of this computing policy threatens the atmosphere for the sharing of information, the free exchange of ideas and the secure environment for creating and maintaining information. Such violations of the University Computing Policy are treated like any other ethical violation as outlined in the Student Handbook, relevant contractual agreements, and applicable faculty and staff handbooks. Violators may also be subject to prosecution under applicable Federal and Arizona Statutes.
The University may temporarily suspend or block access to an account, prior to the initiation or completion of such procedures at its discretion and when it reasonably appears necessary to do so in order to protect the integrity, security, or functionality of University or other computing resources or to protect the University from liability. The record of such action consists of a written request to the Vice President for Information Technology and a copy to the University General Counsel.
The University may also refer suspected violations of applicable law to appropriate law enforcement agencies.
VI. POLICY ADDENDA AND NOTIFICATIONS
The University will, through appropriate administrative procedures, periodically amend this policy and generate addenda to it. When available, general notification will be made to the University community by means of electronic distribution lists and the University’s web page. In addition, in order to ensure that all Users have an opportunity to read and proactively affirm their acceptance of University computing policies, on an annual basis the University will deactivate all user accounts. Reactivation will be contingent upon a review by all Users of all applicable computing policies and affirmation that these policies have been read, understood, and acknowledged.
VII. WIRELESS AND NETWORKED COMPUTING
WIRELESS NETWORK DEVICES
A wireless network device is any computer, laptop, gaming console (Xbox, PlayStation, etc.) or other device that connects to the GCU wireless network to access the internet.
PERMITTED NETWORK DEVICES
You may use a standard PC, laptop, Ethernet wired gaming console (Xbox, PlayStation, etc.), or another approved network device not listed above to access the Internet. Be sure your device is configured so that it does not run any of the below restricted services and applications.
Devices Restricted in University Housing
Some devices can cause significant interference with GCU’s wireless networks and diminish wireless performance for you and your neighbors.
For the best wireless performance, please do not use the following restricted devices, including, but not limited to:
- Cell phone mobile hot-spots
- Wireless printers
- Smart Home devices
- Wireless TVs
- 802.11 Wireless: Do not run your own wireless AP.
- Do not configure your laptop as an Ad-Hoc network device.
- Do not run any device or service that accepts other wireless clients. Personal Bluetooth wireless is permitted.
- DHCP: Do not run your own DHCP services on a PC or any other network device.
- Web Server: Do not run your own web server or any other device with a web service built in.
- Peer-to-Peer file sharing software: P2P is strictly prohibited.
- Sniffer software: Do not use sniffer software to monitor the network traffic of other ResNet students.
- Google Home Hub
- Google Home Mini
- Google Nest
- Google Chromecast
- Apple Homepod
- Friendship Lamps
- Hatch Alarm
- Roku Smart LED Light Strip
- Thermometers
- Cameras
- Monitoring systems
- Restricted devices that require communication between your phone and the device
Any other device not listed on the Support Devices list is considered restricted.
RESTRICTED NETWORK DEVICES
You are to use only one network device at a time plugged directly into your network wall jack. Do not attach any routers, hubs, switches or wireless devices in your room including:
- Linksys
- D-Link
- NETGEAR
- Belkin
- Any other type of router, with or without wireless support
- Any device you would use to connect more than one device to the network.
We do not support the following devices on the wireless network: Xbox 360, Xbox One, Xbox Series S and X, Playstation 1-5. The supported method of connecting these devices is via Ethernet cable.
If you are found to be using any of these devices in University Housing, you will be asked to remove it from GCU’s network.
Why are some smart home devices restricted?
Communication between the above restricted devices on GCU’s wireless network is not supported. For example, a smart light bulb connected to a smart speaker is not allowed if the products communicate with each other directly (speaker ↔︎ light bulb).
Some devices that communicate through an online cloud service, rather than in a device-to-device fashion, are not allowed (speaker ↔︎ cloud service ↔︎ light bulb).
Smart assistants such as Amazon Echo or Google Home cannot be used to control lights, sockets, or other “smart” devices, and are not allowed.
If you are not sure what technology your smart home devices use, please contact GCU Tech Support for more information.