The computer information systems at Maranatha have been designed to be as open as possible, allowing you unrestricted access to authorized resources, as long as you and your equipment do not endanger the security of the network, and as such, Maranatha insists on responsible use of these systems. The use of computers, electronic information and computer networks is essential for research, instruction, and administration within the academic community. Because the electronic environment is easily disrupted and electronic information is readily reproduced, respect for the work and rights of others is especially important.
- Data, such as your e-mail and/or files that is stored on Maranatha-owned servers is considered the property of Maranatha.
- Maranatha reserves the right to inspect any electronic file or mail stored on its network when given reasonable cause to do so.
- Maranatha reserves the right to inspect any and all data communication transmitted from or received by any device connected to its network, including, but not limited to, devices connected by means of a wireless access point.
- All Internet activity is logged and checked periodically.
- Maranatha reserves the right to monitor and does limit Internet access.
Any attempt to violate the provisions of this policy or any posted rules will result in disciplinary action, regardless of the success or failure of the attempt. Disciplinary action will be at the discretion of the Student Life Office, and may range from temporary restriction of account to dismissal.
- Telephone lines, cell phones, and cellular wireless cards may not be used as modems.
- Dorm students may access Internet services only through the campus network.
Internet access through Maranatha’s network is filtered. Attempts to bypass filters are prohibited.
If you use Internet access in other areas (such as the local public library), you are still expected to visit only appropriate sites, and may be subject to penalties for any violations.
Inappropriate and Pornography Internet Sites
See Life and Testimony for issues related to appropriate internet viewing and what to do in case you accidently view an inappropriate website.
Wireless Access Points/DHCP Servers
- Students may not set up DHCP servers.
- Food and drink is prohibited in computer labs, music labs, and library computer study carrels.
- You may not install a game requiring a license, including shareware games and games you own.
- You must end the game and the leave the computer immediately if other students are waiting to the use the lab for legitimate work.
- Married Students: Spouses of married students may use computers in the labs, but must see the I.T. department to setup their own account. They may not use their spouses’ account.
Communications – Emails, File Sharing
- Sending emails to more than 30 people is not allowed (this includes reply-to-all emails).
- If you need to make an event announcement, you may submit it to the My Maranatha Announcements.
- To post items for sale you may submit the information on the My Maranatha Announcements.
- If you wish to send surveys to more than 30 people for a class project, the instructor will need to contact the I. T. department.
- You will be held responsible for failing to report receipt of the objectionable material and/or for forwarding it.
- If you receive an inappropriate email or other electronic transmission (excluding SPAM, which you should delete immediately) that contains objectionable material (i.e. profanity, lewd, or crude content), report the communication using this process:
- Forward a copy to firstname.lastname@example.org.
- Tell a dean or Residence Supervisor about the communication.
- Delete the communication. Such material should not be saved or forwarded to others.
- File shares may not be password protected. Only the computer owner may have rights to post files to the share files. The same principles and regulations apply to FTP sites and websites hosted on your computers.
- Also see dishonesty and cheating regarding sending schoolwork over the internet or email.
Account Privacy and Security
Maranatha’s network facility requires each user to have a unique identity to gain access to or otherwise use the system or facility. The identity is used to represent a user in various system activities and to provide access to certain software and data based on his/her credibility and purpose for requiring such access. As such, this identity is another instrument of identification and its misuse constitutes forgery or misrepresentation and is subject to disciplinary action. All users must take reasonable precautions to ensure the security of their account, such as choosing “difficult to guess” passwords.
- If you repeatedly (about 10 times) attempt to login to your account using an incorrect password, your account will remain in a “locked” state for 30 minutes. If this occurs, you will need to visit or call the IT office.
- You may lock the computer by selecting the “Windows Key + L” on Windows computers.
- Deletion, examination, copying, or modifying files or data belonging to other uses without their prior consent is prohibited.
- Attempting to (or helping someone else) bypass the network or internet login process is prohibited [IT 3/09].
- Tapping the network for the purpose of examining data for which the user is not authorized.
- Attempting to crash the network or computer systems.
- MBU performs routine short term backups on data stored on network file shares (J-drives and Email), and the LMS (e-Racer). However, it is recommended that you acquire and use your own file backup devices: USB Sticks, Jump Drives, External Hard Drives, etc. to backup critical files that you may need now and in the future when you leave MBU [IT 3/09].
- Using illegally licensed software is against the law and is prohibited on Maranatha’s network.
- Illegal copying or sharing of copyrighted materials is prohibited. Examples include
- Using pirated or cracked license codes for games or other software, including operating systems.
- Copying Microsoft Office or Windows CDs for others.
- Using software on more computers for which it is licensed (most software licenses allow installation on only one computer).
- Sending licensed music files (in any format) to others. This includes duplicating or burning CDs, sending the files electronically via email, IM, or file share, etc.