Computers and Internet

The computer information systems at Maranatha have been designed to be as open as possible, allowing you unrestricted access to authorized resources, as long as you and your equipment do not endanger the security of the network, and as such, Maranatha insists on responsible use of these systems. The use of computers, electronic information and computer networks is essential for research, instruction, and administration within the academic community. Because the electronic environment is easily disrupted and electronic information is readily reproduced, respect for the work and rights of others is especially important.

Maranatha seeks to protect the civil, personal, and property rights of those actually using its computing and network facilities and seeks to protect the confidentiality of university records stored on its computer systems.
  • Data, such as your e-mail and/or files that is stored on Maranatha-owned servers is considered the property of Maranatha.
  • Maranatha reserves the right to inspect any electronic file or mail stored on its network when given reasonable cause to do so.
  • Maranatha reserves the right to inspect any and all data communication transmitted from or received by any device connected to its network, including, but not limited to, devices connected by means of a wireless access point.
  • All Internet activity is logged and checked periodically.
  • Maranatha reserves the right to monitor and does limit Internet access.

Any attempt to violate the provisions of this policy or any posted rules will result in disciplinary action, regardless of the success or failure of the attempt. Disciplinary action will be at the discretion of the Student Life Office, and may range from temporary restriction of account to dismissal.

Internet/Modem Policy

  • Telephone lines, cell phones, and cellular wireless cards may not be used as modems.
  • Dorm students may access Internet services only through the campus network.
  • Internet access through Maranatha’s network is filtered. Attempts to bypass filters are prohibited.
  • If you use Internet access in other areas (such as the local public library), you are still expected to visit only appropriate sites, and may be subject to penalties for any violations.

Inappropriate and Pornography Internet Sites

See Life and Testimony for issues related to appropriate internet viewing and what to do in case you accidently view an inappropriate website.

Wireless Access Points/DHCP Servers

  • Students may not set up DHCP servers.

Computer Labs

  • Food and drink is prohibited in computer labs, music labs, and library computer study carrels.
  • You may not install a game requiring a license, including shareware games and games you own.
    • You must end the game and the leave the computer immediately if other students are waiting to the use the lab for legitimate work.
  • Married Students: Spouses of married students may use computers in the labs, but must see the I.T. department to setup their own account. They may not use their spouses’ account.

Communications – Emails, File Sharing

You are not allowed to send mass emails.
  • Sending emails to more than 30 people is not allowed (this includes reply-to-all emails).
  • If you need to make an event announcement, you may submit it to the My Maranatha Announcements.
  • To post items for sale you may submit the information on the My Maranatha Announcements.
  • If you wish to send surveys to more than 30 people for a class project, the instructor will need to contact the I. T. department.

Electronic Communication

You are responsible for the content of any electronic communication you send or receive, and the content should conform to the standards of Philippians 4:8. If you participate in communicating–including forwarding or directing people to, whether you read the content or not, content that violates this biblical standard, you may be subject to disciplinary action.
  • You will be held responsible for failing to report receipt of the objectionable material and/or for forwarding it.
  • If you receive an inappropriate email or other electronic transmission (excluding SPAM, which you should delete immediately) that contains objectionable material (i.e. profanity, lewd, or crude content), report the communication using this process:
    • Forward a copy to abuse@mbu.edu.
    • Tell a dean or Residence Supervisor about the communication.
    • Delete the communication. Such material should not be saved or forwarded to others.

File Sharing

File sharing is allowed, but only when the shared files are not protected by copyrights and the content is appropriate.

Account Privacy and Security

Maranatha’s network facility requires each user to have a unique identity to gain access to or otherwise use the system or facility. The identity is used to represent a user in various system activities and to provide access to certain software and data based on his/her credibility and purpose for requiring such access. As such, this identity is another instrument of identification and its misuse constitutes forgery or misrepresentation and is subject to disciplinary action. All users must take reasonable precautions to ensure the security of their account, such as choosing “difficult to guess” passwords.

Passwords must be eight characters or more in length and contain lower and upper case letters along with numbers.
  • If you repeatedly (about 10 times) attempt to login to your account using an incorrect password, your account will remain in a “locked” state for 30 minutes. If this occurs, you will need to visit or call the IT office.
You are responsible for your account and should not leave any computer unattended when you are logged in. Penalties may be issued for misuse of an unattended or otherwise unsecure computer.
  • You may lock the computer by selecting the “Windows Key + L” on Windows computers.
Using or attempting to access someone else’s computer account or sharing passwords to accounts is prohibited.
  • Deletion, examination, copying, or modifying files or data belonging to other uses without their prior consent is prohibited.
  • Attempting to (or helping someone else) bypass the network or internet login process is prohibited [IT 3/09].
Data stored on the network facilities is considered private. The following actions are prohibited and subject to disciplinary action:
  • Tapping the network for the purpose of examining data for which the user is not authorized.
  • Attempting to crash the network or computer systems.
  • MBU performs routine short term backups on data stored on network file shares (J-drives and Email), and the LMS (e-Racer). However, it is recommended that you acquire and use your own file backup devices: USB Sticks, Jump Drives, External Hard Drives, etc. to backup critical files that you may need now and in the future when you leave MBU [IT 3/09].
Maranatha respects licensing laws and regulations, and expects you to do the same.
  • Using illegally licensed software is against the law and is prohibited on Maranatha’s network.
  • Illegal copying or sharing of copyrighted materials is prohibited. Examples include
    • Using pirated or cracked license codes for games or other software, including operating systems.
    • Copying Microsoft Office or Windows CDs for others.
    • Using software on more computers for which it is licensed (most software licenses allow installation on only one computer).
    • Sending licensed music files (in any format) to others. This includes duplicating or burning CDs, sending the files electronically via email, IM, or file share, etc.

Also see Classroom Media Equipment, Video Conferencing, and Computer Monitors