Office of Technology and Information Services (OTIS) Use of Student-owned Technology Laptop Requirement University Acceptable Use Policy
Thomas H. Carnwath \ email@example.com
VP of Technology
Mira Sophia Adornetto \ firstname.lastname@example.org
Director of Support Services
Kevin Brennan \ email@example.com
Director of Infrastructure Services
Adam Carrigan \ firstname.lastname@example.org
Director, Media Resources
Amanda D’Amico \ email@example.com
Director, Print Services and Borowsky Center for Publication Arts
Jack Post \ firstname.lastname@example.org
Director of Information Services
OTIS Help Desk
Terra Hall Room 802 | 215-717-OOPS (6677) | OTIS Website | email@example.com
Office of Technology and Information Services (OTIS)
OTIS provides the University community with technology and support of digital technologies used in the creative process. The departments of Support Services, Information Services, Infrastructure Services, Media Resources and Print Services work together to ensure students, faculty, and staff have the resources necessary to incorporate various computing tools into the daily routine of campus life and study.
OTIS Support Services is dedicated to supporting technology in both the academic and administrative departments within the university. It is the link between the other OTIS departments and the campus community. This is the department responsible for the set-up, maintenance, and upkeep of the 17 computer labs and 49 studios and suites, all of which are equipped with industry standard hardware and software. In addition, OTIS Support Services facilitates the installation of software onto students’ Mac laptops to allow students to make use of the University’s extensive application library, even when off campus. The primary role of OTIS Support Services is to provide assistance. Ways to access OTIS Support Services are at the walk-up Service Center, located in Terra Hall room 802, via e-mail at firstname.lastname@example.org, and by calling 215-717-6677(OOPS). Technicians are available throughout the day to assist with e-mail access, password issues, Internet problems, hardware concerns, and any number of other questions and/or problems. For supplemental application training the University has partnered with lynda.com, an extensive online tutorial library accessed through the campus portal at lynda.uarts.edu.
Print Services offers a unified resource for the University’s printing needs. It oversees and manages the copier/printer fleet throughout the campus, handling the Xerox service management and assistance. It monitors the print management system that gives students an annual print allowance to cover most printing and copying needs. Print Services also includes two Imaging Labs in Terra and Anderson with several print options through ink-jet, laser printing, and scanning, as well as the Borowsky Center for Publication arts on the 9th floor of Anderson providing opportunities to explore offset printing.
Media Resources provides an array of digital equipment for checkout in support of various academic programs - photography, film and animation - as well as equipment made available to the entire campus community.
Information Services provides resources to support collaboration and learning through the University’s information systems supporting the UArts Portal, MyUArts Record, and Digication–the learning management system. In addition, Information Services manages the University’s institutional database (Ellucian Colleague), shared files storage, and web services.
Infrastructure Services manages the University’s infrastructure, comprised of a gigabit fiber backbone, internet bandwidth in excess of 900 Mbps, email, and telephone services throughout the campus. Additionally, all University buildings have wireless and hard-wired access throughout.
Use of Student-owned Technology
All instructors reserve the right to regulate the use of technology in their classrooms. This may include the requirement that students close their laptops or other mobile devices, turn them off, or remove them from tabletops.
Please note that instructors also reserve the right to require that students use appropriate technologies within their classes. This may include the requirement that students bring and use their laptops to class, or that specific labs, hardware, or software are used as directed.
Students who do not comply with such faculty requests or requirements will be held accountable as dictated by the course syllabus and in accordance with the University’s Judicial System.
Although there are a number of computer labs on campus, it is required that students have a laptop which they can bring to campus and use to complete coursework. The minimum requirement for all students is a laptop equipped with Microsoft Word, the standard software for drafting papers for Liberal Arts courses. Many programs have specific hardware requirements that are found on the university website. The Adobe Creative Cloud array of applications is available free of charge to all students in CAMD, CPA students in Music Business, Entrepreneurship, and Technology and Theater Design & Technology, and Liberal Arts students in Film and Media Studies. Numerous other software applications are available through Support Services to students who comply with the laptop requirements of their program. Additionally, all university lab and studio machines have most applications installed.
University Acceptable Use Policy (Email and Internet)
This policy governs the management of the University’s computer data networks as well as stand-alone computers that are owned and/or administered by The University of the Arts and managed by the Office of Technology and Information Systems (OTIS). The policy reflects the general principles of the University community and indicates, in general, what privileges and responsibilities are characteristic of the University’s computing environment.
A number of terms used below have specific meanings in the context of this document. We define them here:
- OTIS – Office of Technology and Information Systems
- Network – The complete mechanism by which computers and peripherals are connected.
- Networked computer – A computer system that is connected to any data network maintained by OTIS.
- Shared computing resource – A networked computer and OTIS peripherals that can be used by more than one person.
- Central – Refers to networked computers and peripherals purchased, maintained, and operated by OTIS and made available to all or part of the University community.
- Department – Refers to networked computers and peripherals purchased, maintained, and operated for academic-specific purposes by individual academic departments (or OTIS) and made available to those associated with the program the resources support.
- Individual – Refers to networked computers purchased for use by an individual member of the University community, and which can be made available to other individuals or groups by the owner.
- System administrator – The person having executive authority over one or more networked computers.
- Clients – members and/or guests of the University for whom the services and resources of OTIS are provided.
- Distributed resources – applications and services (enterprise-wide and program specific) that are provided to members and/or guests of the University for academic, communication and social networking purposes.
Computer and network use has become an essential part of most University activities. While much computing is now done on individually controlled computers (personal computers, workstations, etc.) most information resources and communications systems reside on shared, central servers, or shared networks. Distributed resources, such as public access workstations provide additional computing tools. OTIS, together with computing resources throughout campus, as well as several academic departments, has the responsibility of providing and maintaining shared computing tools. General policies regarding the resources UArts provides are outlined below:
- Access – The University of the Arts will provide access to appropriate central and campus computing resources, and to networks, for all members of the University community whose studies and work requires it.
- Availability – The University of the Arts will make OTIS central and campus computing resources and networks available to the University community with the fewest interruptions possible.
- Monitoring - OTIS maintains logs of various activities associated with computer usage on campus (i.e. URLs visited, intrusion logs, email logs, etc.). These logs are only used to manage the network traffic and are not to be used to infringe upon the privacy of network clients.
- Interception – To protect the University community from email viruses and other threats to the network, OTIS may intercept messages that meet specific criteria indicating the presence of a threat, informing the University community as soon as reasonably possible. OTIS will notify any community member when a message to them or from them has been intercepted and not delivered. OTIS will not open any intercepted messages without the permission of the recipient. This activity is done in concert with our centrally maintained spam filtering service (Postini) as well as individual client filtering through personalized Junk Mail rules.
- Archiving – OTIS regularly archives (back-ups) material on enterprise servers. Information is preserved for a finite period and may be used to recover lost or corrupted data. Clients should be aware that these backup tapes contain a record of all files, including email and network logs, on the system at the time of the backup
The University of the Arts will assist clients of central and campus shared computing resources in protecting information they store on those resources from accidental loss, tampering, unauthorized search, or other access. The system administrator will make appropriate information on the security procedures implemented on all resources available. Clients should be aware, however, that unauthorized individuals might gain access to electronic communications and files. Clients who are concerned about maintaining the privacy of their email and files are encouraged to password-protect all documents and data stored on hard drives.
In the event of an inadvertent or non-malicious action resulting in the loss of or damage to that information, or the invasion of the user’s privacy, OTIS will make reasonable efforts to mitigate the loss or damage. The University will provide reasonable security procedures on University-maintained systems. Clients are responsible for properly maintaining the protections under their control specific to files associated with their computer accounts. Clients may request that arrangements be made to protect information stored on such resources. These requests will be honored at the discretion of the manager of the resource.
The individual is responsible for understanding the use of the tools each computer system provides for maintaining the security and confidentiality of information stored on it. For instance:
- Computer accounts, passwords, and other types of authorization are assigned to individuals and should not be shared with others.
- Individuals should select and protect their account password and change it frequently.
- Individuals should understand the level of protection each computer system automatically applies to files and supplement it, if necessary, for sensitive information.
- All individuals should be aware of computer viruses and other destructive computer programs, and take steps to avoid being a victim or unwitting conduit for attacks.
Maintenance of Resources
OTIS routinely updates and manages resources through centrally managed tools that periodically push updates and patches to applications it maintains. Users of university owned resources are reminded to leave computers on overnight at least three times a week so upgrades and patches can be remotely installed on their systems. Clients will be asked to login after such pushes the morning following any upgrades.
System administrators of departmental and individual computing resources are responsible for the security of information stored on those resources, for making appropriate information on security procedures available to clients of those systems, and for keeping those systems free from unauthorized access. These administrators are required to work with OTIS in the sharing of procedures so both OTIS and the department are aware of processes in place.
The University of the Arts intends that all files and email are private and confidential unless the owner intentionally makes this information available to other groups or individuals. Interception of network transmission is strictly forbidden. In general, information stored on computers is considered confidential, whether protected by the computer operating system or not, unless the owner intentionally makes this information available to other groups or individuals. The University of the Arts will assume that clients wish information they store on central and shared computing resources to remain confidential. OTIS will maintain confidentiality of all information stored on university computing resources. Similarly, privileged information on account usage (in other words, that available only to clients with system privileges) will also be treated with confidentiality. Privileged information available to system administrators will be held in confidence.
The administrator of the computer system involved will review requests for disclosure of confidential information. Such requests will be honored only when approved by University officials authorized by appropriate policy or procedures, or when required by local, state, or federal law.
Free expression of ideas is central to the academic process. Therefore, UArts computer system administrators will not evaluate any information from individual accounts unless it is determined that:
- The presence of the information involves an illegality (e.g., copyrighted material, software used in violation of a license agreement).
- The information in some manner endangers computing resources or the information of other clients (e.g., a computer worm, virus, or other destructive program).
- A University judicial or grievance process finds cause for content to be removed in accordance with standing policies and procedures.
OTIS computer systems administrators and department computer systems administrators may remove from central or department computers information as defined above. Clients whose information is removed will be notified of the removal as soon as is feasible. Clients wishing to appeal such removal of information may do so in accordance with the appropriate appeals process relative to their status within the University.
Responsibilities of the User
Access to computing resources and networks is a privilege to which all University faculty, staff and students are entitled. Access may also be granted to individuals outside the University for purposes consistent with the mission of the University. Certain responsibilities accompany that privilege; understanding them is important for all computer clients. Refer to the section ‘Sanctions’ regarding the policy of The University of the Arts in handling infractions of these responsibilities. These responsibilities are listed below:
Use of UArts computing resources and networks is for purposes related to the University’s mission of creativity and artistic expression; academic teaching, learning and research; and community engagement. The use of computing resources and networks are for purposes related to an individual’s studies, instruction, or the discharge of duties as employees, their official business with the University, or their other University-sanctioned activities. The use of UArts computing resources, networks, or bandwidth for commercial purposes is not permitted except by special arrangement with appropriate computing systems administrators and other appropriate University officials.
Computer resources, network access, and bandwidth may not be used for illegal purposes. Examples of illegal activities include, but are not limited to:
- Intentional harassment of others.
- Intentional destruction of or damage to equipment, software, or data belonging to The University of the Arts or other clients.
- Intentional disruption or unauthorized monitoring of electronic communications.
- Unauthorized acquisition of and/or distribution of copyrighted and/or licensed material
Computing resources and network access should be used in accordance with the standards of the University community as described in such documents as the Student Handbook and Faculty Handbook. Examples of unethical use follow; some of them may also be illegal:
- Violations of computer system security.
- Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others.
- Intentional use of computer communications facilities and resources in ways that unnecessarily impede the computing services available to others (randomly initiating interactive electronic communications or email exchanges, overuse or interactive network utilities, etc.).
- Use of computing facilities for private business purposes unrelated to the mission of the University or campus life.
- Academic dishonesty (plagiarism, cheating).
- Violation of software license agreements.
- Violation of network usage policies and regulations.
- Violation of others’ right to privacy.
Individuals using The University of the Arts computing resources can facilitate computing in the University environment in many ways. Respecting the diversity of the user community demands the practice of responsible computing. This should include:
- Regular deletion of unneeded files from one’s accounts on shared servers.
- Refraining from overuse of connection time on public access machines, information storage space, printing facilities, or processing capacity.
- Refraining from overuse of interactive network utilities.
- Refraining from overuse of network-shared bandwidth.
The University of the Arts treats the abuse of computing facilities, equipment, software, data, networks, or privileges seriously. Unauthorized access to electronic communications and files is strictly forbidden. Use of computing resources is to be conducted in keeping with the guidelines established in the following official publications of the University: Academic Catalogue, the Faculty and Student Handbooks, the Employee Handbook, and the Academic Integrity Policy. Sanctions adjudicated by The University of the Arts will be resolved in the manner stated in the appropriate handbooks and policies applicable to the status of the individual user. Illegal acts involving The University of the Arts computing resources may also be subject to prosecution under local, state, and federal laws.