Issue link: http://denverseminary.uberflip.com/i/1495097
2022-2023 Student Handbook 30 • The official Seminary work of offices, departments, and recognized campus organizations. Unacceptable Use The following list is a guide to unacceptable uses of Denver Seminary's technical resources. It is not intended to identify all unacceptable uses, but to indicate various types of uses that are inconsistent with the purpose of these computer resources. The Seminary reserves the right to decide in every instance what unacceptable use is and will address each such use as it deems appropriate. The following actions by any person will be considered unacceptable use: • Using or attempting to use any Seminary computer resource without proper authorization. Further, no one shall assist in, encourage, or conceal from authorities any unauthorized use or attempt at unauthorized use of any Seminary computer resource. • Endangering or attempting to endanger the integrity or security of any Seminary computer resource or willfully interfering with others' authorized computer usage. • Using or attempting to use any Seminary computer resource for non-Seminary business without specific authorization. • Revealing or attempting to reveal any password for any Seminary computer resource or software application to any unauthorized person. • Misrepresenting of identity or relationship to the Seminary for the purpose of obtaining or using computer, server, or network privileges and/or services. • Reading, altering, deleting, or attempting to read, alter, or delete any other person's computer files or electronic mail without supervisor authorization. This rule applies regardless of whether the operating system of the computer permits these acts. • Copying, downloading, installing, or attempting to install or use any software or data file in violation of applicable copyrights, license agreements, or state laws. Peer-to-peer applications are prohibited on the Seminary network due to the overwhelming use of these applications used to download copyrighted material. • Creating, installing, attempting to install, or knowingly distributing computer viruses or other such malicious programs on any Seminary computer resource, regardless of whether any harm results. • Modifying, reconfiguring or attempting to modify or reconfigure the software or hardware of any Seminary computer resource without proper authorization. • Viewing, accessing, printing, or distributing indecent, obscene, or pornographic materials, or materials that are threatening, harassing, or for the purpose of gambling using a Seminary computer resource. Such activities are strictly prohibited. • Non-compliance with the regulations and policies of the various social networking sites, blogs, groups, mailing lists, and other public forums through which messages are disseminated or non- adherence to Seminary standards, policies, and procedures regarding said messages. • Personal financial gain from use of Seminary technology in any form, except for personal financial gain from tasks related to contractual obligations (such as writing books, external teaching opportunities, speaking engagements, etc). • Using email for sending unsolicited messages, engaging in unauthorized fund-raising, advertising, or creating, sending, and/or forwarding email chain letters. • Unauthorized scanning of Seminary computer resources with electronic devices, scripts, or any form of network monitoring. • Violating the copyrights, software licenses, and/or patent protections of Seminary resources. • Connecting unauthorized computer equipment to the non-student network. • Disruption of the authorized monitoring of computer resources. This includes any form of eavesdropping on electronic communications.