Network Usage Policy for Rockhurst University
Purpose
The purpose of this policy is to ensure the secure and efficient use of Rockhurst University’s network resources. It aims to protect the integrity, confidentiality, and availability of information while promoting a safe and lawful environment for students, faculty, and staff.
Scope
This policy applies to all users of the Rockhurst University network, including students, faculty, staff, contractors, and guests. It covers all devices that connect to the university’s network, whether owned by the university or by individuals.
Acceptable Use
-
Academic and Administrative Use: Network resources should primarily be used for educational, research, and administrative purposes that support the mission of the university.
-
Personal Use: Limited personal use is permitted as long as it does not interfere with network operations or violate any policies.
-
Prohibited Activities:Users must not engage in activities that are illegal, harmful, or that violate university policies. This includes, but is not limited to:
- Unauthorized access to systems, networks, or data
- Distribution of malware, viruses, or malicious software
- Copyright infringement
- Harassment, bullying, or stalking
- Distribution of obscene or offensive materials
- Any activity that could damage the university’s reputation
Security
-
Authentication: All users must use their unique university-provided credentials to access network resources. Sharing of credentials is strictly prohibited.
-
Password Management: Users must create strong passwords and change them regularly. Passwords should not be reused across multiple sites.
-
Device Security: All devices connected to the network must have up-to-date antivirus software, operating system updates, and appropriate firewall settings. Devices and operating systems that are no longer receiving security updates are not permitted to connect to the network.
-
Data Protection: Sensitive information must be encrypted during transmission and storage. Users should follow the university’s data classification and handling guidelines.
Monitoring and Privacy
-
Network Monitoring: The university reserves the right to monitor network traffic to ensure compliance with this policy, protect network integrity, and perform necessary maintenance.
-
Privacy: While the university respects the privacy of users, it may access user accounts and data under specific circumstances, such as compliance with legal requirements or investigations of policy violations.
Compliance with Laws and Regulations
-
Local and Federal Laws: Users must comply with all applicable local and federal laws, including but not limited to the Computer Fraud and Abuse Act (CFAA), the Digital Millennium Copyright Act (DMCA), and the General Data Protection Regulation (GDPR) where applicable.
-
Reporting Violations: Users are encouraged to report any suspected violations of this policy or security incidents to the university’s IT department immediately.
Policy Review and Updates
This policy will be reviewed annually and updated as necessary to ensure compliance with evolving laws, regulations, and best practices.
Contact Information
For questions or more information about this policy, please contact the Rockhurst University Computer Services at (816) 501-4357.
Last Review Date
07/15/2025