The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
    Andrews University
   
 
  Dec 15, 2017
 
 
    
2017-2018

Student Use of Computer and Network Resources Policy


Return to: Student Handbook  

Andrews University provides various information technology services to its students. These services are provided by Information Technology Services (ITS). Services provided to students include email, personal Web space, Internet access, computer labs, wireless networking and network connections in the residence halls and apartments. The demand for resources can be essentially infinite, yet the funds to provide these services are finite. As a result, limits are maintained in most services so that everyone may have access to the resources provided.

At Andrews University, information technology resources must only be used in ways that support the mission of Andrews University. The opportunity to use the resources is a privilege which may be removed if the resources are misused.

ITS is responsible for maintaining these systems and assisting students in utilizing the resources. For assistance, please contact the ITS help desk at 269-471-6016 or via email at helpdesk@andrews.edu.

Requirements to Utilize Information Technology Resources
Personal computers connecting to Andrews University networks or systems must have the following in place:

  • The operating system must be up-to-date with all critical patches released by the vendor installed
  • Microsoft Windows-based systems must have the Andrews University-supported anti-malware software installed and be kept up-to-date with new releases from the vendor

Computers connected to the network are required to be registered to a person who will be responsible for any activity on or from that computer. A computer found to contain viruses or other software causing damage to any other computer network or system or excessively using resources will be immediately disconnected from the network until the problem is remedied.

Andrews Email Used for Official Communication
Each student will be issued an Andrews University username and password that is utilized for multiple purposes, including email. Official Andrews University communication will come to the student’s Andrews University email address, and students are responsible for having read the content of these messages. Students may forward their email to another email address but will remain responsible for what was sent to the Andrews University-provided email address.

Prohibited Activities
Prohibited activities on Andrews University computers and networks include, but are not limited to, the following:

  1. Accessing, transmitting or storing any of the following: pornographic or sexually-oriented video, images or text; documents containing profanity or obscene language or defamation of any individual or group; materials promoting hatred of any group or materials advocating lifestyles contrary to University policy and values
  2. Storage or transmission of copyrighted materials such as music, images, videos or software (unless you have legal permission from the copyright owner to do so). For more information on peer-to-peer file sharing see andrews.edu/services/its/peer-to-peer-file-sharing-policy.html
  3. Intentional introduction of viruses or other disruptive/destructive programs
  4. Attempts to evade or bypass system policies such as Web filters, firewalls or quotas
  5. Unauthorized access to or use of other users’ accounts or data, system software, University data, network equipment or other computer systems (includes collecting data through key logging or sniffing programs)
  6. Giving your password to another individual
  7. Forgery or attempted forgery of documents or email
  8. Excessive use of resources on the network such as network bandwidth or disk storage
  9. Participating in the unsolicited broadcasting of email (called “spam”) including the generation or forwarding of chain letters or participation in multilevel or pyramid schemes
  10. Harassment or intimidation of other users, including sexual harassment
  11. Using Andrews University resources to support a personal business
  12. Configuring a computer to provide network services (DNS, DHCP, etc.) to any other on- or off-campus computers or installing switches, routers, wireless access points or other equipment that interferes with official University services

Privacy and Confidentiality
Andrews University cannot guarantee the confidentiality or privacy of email messages and other documents stored on servers managed by the University, and the University makes no promises regarding their security. The following guidelines relate to confidentiality:

  • Andrews University does not routinely monitor the contents of email. However, the University reserves the right to conduct routine maintenance, track problems and maintain the integrity of its systems. As is the case with all data kept on University-managed systems, the content of email may be revealed by such activities.
  • Andrews University reserves the right to inspect the contents of email and all disk files in the course of an investigation into alleged impropriety or to comply with legal obligations.
  • Authorization to investigate the contents of user files must be given by the Chief Information Officer on the basis of instructions from the University administration.

Resource Limits
A number of specific networking protocols that cause security risks, enable illegal activity, allow access to objectionable material or utilize excessive resources are restricted on campus networks and computer systems. The current specific limit set on disk storage space for websites is 90 MB per person (subject to change as needed).

Results of Non-Compliance with this Policy
In the event that a student fails to comply with this policy, restrictions will immediately be placed on their access to information technology resources. Generally this will occur by restricting or disabling the person’s ability to connect to the network by either limiting network access to the quarantine zone or deactivating their username/password. When access has been limited to the quarantine zone, any attempt to access Web resources will be directed to a quarantine zone page. This page contains information regarding why the student’s access has been restricted and suggested changes to correct the problem. After making the necessary corrections, a release button may be selected to be released from the quarantine zone. If the problem continues to persist, the student’s access will again be limited to the quarantine zone. Up to three attempts in five days are allowed to clear up the problem and be released from the quarantine zone. If these steps do not resolve the access problem or if your username/password has been deactivated, contact the ITS help desk (269-471-6016) to check your account status or for troubleshooting assistance.

In the case of more serious policy violations (such as actions that cause others to lose IT services and/or illegal activities), ITS staff will discuss the problem with the student, assist in correcting the cause of the problem and reinstate the access once the cooperation and understanding of the student is gained (generally as quickly as possible). In cases of recurring issues, or lack of cooperation from the student, the deactivation may continue for a longer period of time. In the case of actions that violate policies regarding student behavior, including accessing inappropriate content, the case will be referred to Student Life. Some policy violations may involve legal issues and be required to be transferred to Campus Safety or the appropriate legal agencies such as the Berrien Springs-Oronoko Township Police Department, Michigan State Police or the Federal Bureau of Investigation. These situations may result in the impounding of computer equipment, fines or imprisonment depending on the issues involved.

Appeal Process
Appeals related to decisions made regarding this policy or to restrictions placed on a student’s access to resources may be made through the appropriate managerial levels in ITS up through the Chief Information Officer.

For information on appeals in matters relating to Student Life issues, see Right to Appeal/Grievance .

Safety Tips for Using Information Technology Resources
The online environment made possible by the Internet provides many advantages but also brings a number of serious risks. It is essential that each person be aware of these risks to make sure that their online actions do not result in damage or loss.

  • Identity theft is a very real risk when doing business online. You are responsible for any use of your Andrews University username and password. Beware of anyone asking for usernames and passwords, social security numbers, credit card or bank account numbers. This includes email messages that appear to be from a bank, the administrator of a computer system or other organizations that do business online. These organizations (including Andrews University) never request you to verify this type of information via an email message. Some messages that refer to a webpage that looks authentic may be set up to collect your information. Once a person obtains these pieces of information, they can transfer funds out of your bank account, get credit in your name, ruin your credit rating and participate in other unfortunate activities that may cause serious disruption to you and may require several months of effort for you to get resolved. Even in face-to-face or telephone conversations, it is not advisable to share your username and password as the bearer of that information can subsequently “be you” online.
  • Malware is a common problem for computers and their users. This can be picked up through an email attachment, by clicking on web URLs or by going to some websites. Malware can do damage to your user or system files and may require a complete rebuilding of your computer system. Some malware will encrypt all your files and then ask for a ransom to unlock the files. Some types of malware collect information and send it to other systems to be utilized for identity theft.

    Malware transmitted through email attachments is screened via systems that attempt to quarantine these emails. This blocks the vast majority of email-borne malware, but some may get through. It is very important that you not click on an attachment unless the person sending it is known to you, the attachment is mentioned in the body of the message and the combination matches your experience (for example, opening an attachment labeled “Invoice” from someone you have not done business with would be risky).

    It is highly recommended that you back up your important files on a device that does not remain connected to your computer as a safeguard against loss of data from malware.

  • Web filtering systems are in effect at Andrews to attempt to minimize the exposure to inappropriate material. Specifically, websites that are known to contain pornographic material are blocked. While Andrews strives to prevent contact to this type of material, it is not possible to do this completely. If you observe that University systems allow access to inappropriate material found on the web, please report it by sending email to filteradmin@andrews.edu.
  • Social networking sites such as Facebook, YouTube, Twitter, Instagram and Snapchat, while popular for sharing among friends, are also available to the general public. You should use caution in determining what information you post on any public website as this information can be used by predators as well as potential employers. In addition, you will be held accountable for content that violates the Code of Student Conduct (see Code of Student Conduct ).

Information Technology Services will continue to work to reduce these risks but will not be able to completely eliminate them. It is the responsibility of each student to be alert and vigilant in their actions in the online environment in order to avoid these hazards.

ACES (Cable Television)
ACES provides cable TV services in University Towers, Lamson Hall, Meier Hall, and the Garland, Maplewood and Beechwood apartments. Basic service (which includes the local off-the-air channels) is provided to every room or apartment for no additional fee. Contact Telecommunications for more information: 269-471-3455, telecom@andrews.edu, andrews.edu/services/its/telecom.

Telecommunications
Telecommunications provides basic phone service to every residence hall room and apartment for no additional fee. Basic service includes campus calls, unlimited local calls and CallerID. You are responsible for supplying the telephone. Long-distance calls may be made by using a calling card. Contact Telecommunications for more information: 269-471-3455, telecom@andrews.edu, andrews.edu/go/telecom.

Computer Labs
ITS provides one general-purpose computing laboratory on campus available for use by all students, faculty and staff. This lab contains Windows-based computers with a variety of software. Laser printing is available for a fee.

  • Bell Hall 182—Schedule posted at lab entrance

Additional computer labs exist in various schools or departments including:

  • Chan Shun Hall 225/226—269-471-3422
  • Harrigan Hall 205—269-471-6148 (Mac Lab)
  • Haughey Hall 316—269-471-6554
  • Library Lab—269-471-3283