Dec 26, 2024  
2008-2009 University Catalog 
    
2008-2009 University Catalog [Archived Catalogue]

Information Technology


Click on a link to be taken to the entry below.

 

 

Academic Computing

Ken Kramer
kkramar@uarts.edu

Ext. 6027
Office: Terra Building 839


iLab and Print Services

Justin Pekera
jpekera@uarts.edu

Ext. 6575
Office: Terra Building 1316A


Administrative Computing

Jack Post
jpost@uarts.edu
Ext. 6222
Office: Hamilton Hall 240A


Audio Visual

Brian Feeney
bfeeney@uarts.edu

Ext. 6062
Office: Furness Hall 260 

 

Office of Technology and Information Services (OTIS)

OTIS provides the university community with technology and support services that assist in the integration of digital technologies with the creative process. The departments of Academic Computing, Administrative Computing, Network and Telecommunications Services, Audio Visual, and Imaging and Printing work together to ensure students, faculty, and staff have the resources necessary to incorporate various computing tools into the daily routine of campus life and study.

The Department of Academic Computing is dedicated to supporting academic programs with the appropriate digital. The department maintains 26 separate computer labs equipped with industry-standard. In addition to multiple high-end graphics labs using enhanced Macintosh Intel Core 2 Duo systems, three music labs, and an animation lab, the University hosts a New Media Center comprising four dual-platform digital laboratories that enable the integration of animation, graphics, text, music, and sound. Other specialized digital facilities include a computer-driven loom for fabric making, and a facility incorporating a three-dimensional printer for creating objects and a laser-scanner for digitizing objects. The department also supports and maintains a collection of over 50 creative software applications that are used by students and faculty in the creative and learning process. The University is a member of the New Media Centers, a group of the nation’s leading academic institutions and technology corporations dedicated to the advancement of technology in education.

Open access to the computer labs is available daily for all students to facilitate individual exploration and to ensure adequate time outside of class for independent work.

Administrative Computing provides resources to support collaboration and learning through the university’s information systems supporting MyUArts Portal, MyUArts Record, Sakai - the learning management system, Network and Telecommunications Services manages the university’ infrastructure comprised of a gigabit fiber backbone, Internet bandwidth in excess of 90 Mbs, email, and telephone services throughout the campus. In addition, there is a robust wireless network in all university buildings. The Audio Visual Department supports AV needs across campus including over 100 classrooms equipped with AV resources such as projectors and/or sound. Imaging and Printing supports digitally produced output for creative works and manages printing throughout campus.

Starting in the Fall 2007 semester, all freshmen have been required to participate in the Anytime Anywhere Creativity laptop program. For a yearly fee, payable over four years to make purchase easier, participants in the program will receive a current model MacBook Pro preconfigured with general-use & major-specific software, an external hard drive, extended warranty, technical support, and access to loaner systems in the event of loss damage or theft.

Students owning existing systems that meet minimum specifications (Apple MacBooks or MacBook Pro) may opt to receive only the general software package for a lesser fee, but are not eligible for the benefits of warranty service, insurance, or access to loaner systems. The University does not accept responsibility for the installation, maintenance, repair, or security of computers not provided by the institution.

 

Use of Student-Owned Technology

^TOP

All instructors reserve the right to regulate the use of technology in their classrooms. This may include the requirement that students close their laptops, turn them off, or remove them from table tops. The same may apply to the use of cell phones, iPods or any other portable technology device.

Please note that instructors also reserve the right to require that students use appropriate technologies within their classes. This may include the requirement that Anytime Anywhere Creativity participants bring and use their laptops, or that specific labs, hardware or software are used as directed.

Students who do not comply with such faculty requests or requirements will be held accountable as dictated by the course syllabus and in accordance with the University’s Judicial System.
 

 

University Acceptable Use Policy (Email and Internet)

 ^TOP

Introduction
This policy governs the management of the University’s computer data networks as well as stand-alone computers that are owned and/or administered by The University of the Arts and Office of Technology and Information Systems (OTIS). The policy reflects the general principles of the University community and indicates, in general, what privileges and responsibilities are characteristic of the University’s computing environment.

Terminology
A number of terms used below have specific meanings in the context of this document. We define them here:

  • OTIS – Office of Technology and Information Systems.
  • Network – The complete mechanism by which computers and peripherals are connected.
  • Networked computer – A computer system that is connected to any data network maintained by OTIS.
  • Shared computing resource – A networked computer and OTIS peripherals that can be used by more than one person.
  • Central – Refers to networked computers and peripherals purchased, maintained, and operated by OTIS and made available to all or part of the University community.
  • Department – Refers to networked computers and peripherals purchased, maintained, and operated for academic-specific purposes by individual academic departments and made available to those associated with the program the resources support.
  • Individual – Refers to networked computers purchased for use by an individual member of the University community, and which can be made available to other individuals or groups by the owner.
  • System administrator – The person having executive authority over one or more networked computers.
  • Clients – members and/or guests of the University for whom the services and resources of OTIS are provided.
  • Distributed resources – applications and services (enterprise-wide and program specific) that are provided to members and/or guests of the University for academic, communication and social networking purposes.

General Policies

Computer and network use has become an essential part of many University activities. While much computing is now done on individually controlled computers (personal computers, workstations, etc.) most information sources and communications systems reside on shared, central computers, or use shared networks. Distributed resources, such as public access workstations provide additional computing tools. OTIS, together with computing resources throughout campus, as well as several academic departments, has the responsibility of providing and maintaining shared computing tools. General policies regarding the resources UArts provides are outlined below:

  • Access – The University of the Arts will provide access to appropriate central and campus computing resources, and to networks, for all members of the University community whose studies and work requires it.
  • Availability – The University of the Arts will make OTIS central and campus computing resources and networks available to the University community with the fewest interruptions possible.
  • Monitoring - OTIS maintains logs of various activities associated with computer usage on campus (i.e. URLs visited, intrusion logs, email logs, etc). These logs are only used to manage the network traffic and are not to be used to infringe upon the privacy of network clients.
  • Interception - To protect the University community from email viruses and other threats to the network, OTIS may intercept messages that meet specific criteria indicating the presence of a threat, informing the University community as soon as reasonably possible. OTIS will notify any community member when a message to them or from them has been intercepted and not delivered. OTIS will not open any intercepted messages without the permission of the recipient.
  • Archiving – OTIS regularly archives (back-ups) material on enterprise servers. Information is preserved for a finite period and may be used to recover lost or corrupted data. Clients should be aware that these backup tapes contain a record of all files, including email and network logs, on the system at the time of the backup.

Security

The University of the Arts will assist clients of central and campus shared computing resources in protecting information they store on those resources from accidental loss, tampering, or unauthorized search, or other access. Appropriate information on the security procedures implemented on all resources will be made available by the system administrator. Clients should be aware, however, that unauthorized individuals might gain access to electronic communications and files. Clients who are concerned about maintaining the privacy of their email and files are encouraged to install personal security applications or password protect all documents and data stored on hard drives.

In the event of an inadvertent or non-malicious action resulting in the loss of or damage to that information, or the invasion of the user’s privacy, OTIS will make reasonable efforts to mitigate the loss or damage. The University will provide reasonable security procedures on University-maintained systems. Clients are responsible for properly maintaining the protections under their control, specific to files associated with their computer accounts. Clients may request that arrangements be made to protect information stored on such resources. These requests will be honored at the discretion of the manager of the resource.

Other Resources

System administrators of departmental and individual computing resources are responsible for the security of information stored on those resources, for making appropriate information on security procedures available to clients of those systems, and for keeping those systems free from unauthorized access. These administrators are required to work with OTIS in the sharing of procedures so both OTIS and the department are aware of processes in place.

Confidentiality

The University of the Arts intends that all files and email are private and confidential unless the owner intentionally makes this information available to other groups or individuals. Interception of network transmission is strictly forbidden. In general, information stored on computers is considered confidential, whether protected by the computer operating system or not, unless the owner intentionally makes this information available to other groups or individuals. The University of the Arts will assume that clients wish information they store on central and shared computing resources to remain confidential. OTIS will maintain confidentiality of all information stored on their computing resources. Similarly, privileged information on account usage (in other words, that available only to clients with system privileges) will also be treated with confidentiality. Privileged information available to system administrators will be held in confidence.

The administrator of the computer system involved will review requests for disclosure of confidential information. Such requests will be honored only when approved by University officials authorized by appropriate policy or procedures, or when required by local, state, or federal law.

Censorship

Free expression of ideas is central to the academic process. Therefore, UArts computer system administrators will not evaluate any information from individual accounts unless it is determined that:

The presence of the information involves an illegality (e.g., copyrighted material, software used in violation of a license agreement).

The information in some manner endangers computing resources or the information of other clients (e.g., a computer worm, virus, or other destructive program).

A University judicial or grievance process finds cause for content to be removed in accordance with standing policies and procedures.

OTIS computer systems administrators and department computer systems administrators may remove from central or department computers information as defined above. Clients whose information is removed will be notified of the removal as soon as is feasible. Clients wishing to appeal such removal of information may do so in accordance with the appropriate appeals process relative to their status within the University.

Responsibilities of the User

Access to computing resources and networks is a privilege to which all University faculty, staff and students are entitled. Access may also be granted to individuals outside the University for purposes consistent with the mission of the University. Certain responsibilities accompany that privilege; understanding them is important for all computer clients. Refer to the section ‘Sanctions’ regarding the policy of The University of the Arts in handling infractions of these responsibilities. These responsibilities are listed below:

Institutional Purposes

Use of UArts computing resources and networks is for purposes related to the University’s mission of creativity and artistic expression; academic teaching, learning and research; and community engagement. The use of computing resources and networks are for purposes related to an individual’s studies, instruction, or the discharge of duties as employees, their official business with the University, or their other University-sanctioned activities. The use of UArts computing resources, networks, or bandwidth for commercial purposes is not permitted except by special arrangement with appropriate computing systems administrators and other appropriate University officials.

Security

The user is responsible for correct and sufficient use of the tools each computer system provides for maintaining the security and confidentiality of information stored on it. For instance:

  • Computer accounts, passwords, and other types of authorization are assigned to individuals and should not be shared with others.
  • Individuals should select and obscure the account password and change it frequently.
  • Individuals should understand the level of protection each computer system automatically applies to files and supplement it, if necessary, for sensitive information.
  • All individuals should be aware of computer viruses and other destructive computer programs, and take steps to avoid being a victim or unwitting conduit for attacks.

Legal Usage
Computer resources and network access and bandwidth may not be used for illegal purposes. Examples of illegal activities include:

  • Intentional harassment of others.
  • Intentional destruction of or damage to equipment, software, or data belonging to The University of the Arts or other clients.
  • Intentional disruption or unauthorized monitoring of electronic communications.
  • Unauthorized acquisition of and/or distribution of copyrighted and/or licensed material.

Ethical Usage

Computing resources and network access should be used in accordance with the standards of the University community as described in such documents as the Student Handbook and Faculty Handbook. Examples of unethical use follow; some of them may also be illegal:

  • Violations of computer system security.
  • Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others.
  • Intentional use of computer communications facilities and resources in ways that unnecessarily impede the computing services available to others (randomly initiating interactive electronic communications or email exchanges, overuse or interactive network utilities, etc.).
  • Use of computing facilities for private business purposes unrelated to the mission of the University or campus life.
  • Academic dishonesty (plagiarism, cheating).
  • Violation of software license agreements.
  • Violation of network usage policies and regulations.
  • Violation of others’ right to privacy.

Collegial Usage

Individuals using The University of the Arts computing resources can facilitate computing in the University environment in many ways. Respecting the diversity of the user community demands the practice of responsible computing. This should include:

  • Regular deletion of unneeded files from one’s accounts on shared servers.
  • Refraining from overuse of connection time on public access machines, information storage space, printing facilities, or processing capacity.
  • Refraining from overuse of interactive network utilities.
  • Refraining from overuse of network-shared bandwidth.

Sanctions

The University of the Arts treats the abuse of computing facilities, equipment, software, data, networks, or privileges seriously. Unauthorized access to electronic communications and files is strictly forbidden. Use of computing resources is to be conducted in keeping with the guidelines established in the following official publications of the University: this Catalog, the Faculty and Student Handbooks, and the Academic Inegrity Policy . Sanctions adjudicated by The University of the Arts will be resolved in the manner stated in the appropriate handbooks and policies applicable to the status of the individual user. Illegal acts involving The University of the Arts computing resources may also be subject to prosecution under local, state, and federal laws.

  ^TOP