Nov 21, 2024  
2010-2011 University Catalog 
    
2010-2011 University Catalog [Archived Catalogue]

Information Technology at UArts


Click on a link to be taken to the entry below.

 

 

OTIS Help Desk | 215-717-OOPS (6677) | helpdesk@uarts.edu

Service Center location: Anderson Hall, Room B9

VP of Technology
Thomas H. Carnwath
tcarnwath@uarts.edu

Support Services
Mira Adornetto, Director
madornetto@uarts.edu

iLab and Print Services
Justin Pekera, Director
jpekera@uarts.edu

Information Services
Jack Post, Director
jpost@uarts.edu

Infrastructure Services
Kevin Brennan, Director
 

Office of Technology and Information Services (OTIS)

 

OTIS provides the university community with technology and support services that assist in the integration of digital technologies with the creative process. The departments of Support Services, Information Services, Infrastructure Services, and Print Services work together to ensure students, faculty, and staff have the resources necessary to incorporate various computing tools into the daily routine of campus life and study.

Support Services is dedicated to supporting technology in both academic and administrative departments within the university. The department maintains 26 separate computer labs equipped with industry standard hardware and software. In addition to multiple high-end graphics labs using enhanced Macintosh Intel Core 2 Duo systems, three music labs, and an animation lab, the University hosts a New Media Center comprising four dual-platform digital laboratories that enable the integration of animation, graphics, text, music, and sound. Other specialized digital facilities include a computer-driven loom for fabric making, and a facility incorporating a three-dimensional printer for creating objects and a laser-scanner for digitizing objects. Support Services maintains Audio Visual needs across campus including over 100 classrooms equipped with AV resources such as projectors and/or sound. The department also supports and maintains a collection of over 50 creative software applications that are used by students and faculty in the creative and learning process. The University is a member of the New Media Centers, a group of the nation’s leading academic institutions and technology corporations dedicated to the advancement of technology in education.

Open access to the university’s computing centers is available daily for all students to facilitate individual exploration and to ensure adequate time outside of class for independent work.

Information Services provides resources to support collaboration and learning through the university’s information systems supporting MyUArts Portal, MyUArts Record, and Sakai–the learning management system. In addition Information Services manages the university’s institutional database (Datatel Colleague), shared files storage, and web services.  Infrastructure Services manages the university’s infrastructure, comprised of a gigabit fiber backbone, Internet bandwidth in excess of 180 Mbs (expanding to 400 Mbs later this fall), email, and telephone services throughout the campus. Additionally, there is a robust wireless network in all university buildings. Imaging and Printing supports digitally produced output for creative works and manages printing throughout campus.

All undergraduate students as well as select graduate students are required to bring a MacBook Pro or MacBook laptop, as required by their department and major. Laptop Bundles and accessories are available for purchase on the UArts Apple Custom Store online. For more information about the UArts Apple Custom Store, including laptop requirements by department/major, visit us online at http://www.uarts.edu/applestore or refer to our FAQs at http://www.uarts.edu/laptopFAQ

Students owning a MacBook or MacBook Pro laptop that meets minimum specifications for their major(s) need not purchase another laptop. However, all students will need to purchase the UArts Custom Imaging Services (also available on the UArts Apple Custom Store) in order to receive the UArts Software Package. Student will receive their UArts Software Package at our annual Software Distribution event that takes place in concert with New Student Orientation in late August. Please be advised that the university only provides software, service and support for the Macintosh platform.

Use of Student-owned Technology

^TOP

 

All instructors reserve the right to regulate the use of technology in their classrooms. This may include the requirement that students close their laptops, turn them off, or remove them from table tops. The same may apply to the use of cell phones, iPods or any other portable technology device.

Please note that instructors also reserve the right to require that students use appropriate technologies within their classes. This may include the requirement that Anytime Anywhere Creativity participants bring and use their laptops, or that specific labs, hardware, or software are used as directed.

Students who do not comply with such faculty requests or requirements will be held accountable as dictated by the course syllabus and in accordance with the University’s Judicial System. 

 

University Acceptable Use Policy (Email and Internet)

 ^TOP

 

Introduction

This policy governs the management of the University’s computer data networks as well as stand-alone computers that are owned and/or administered by The University of the Arts and Office of Technology and Information Systems (OTIS). The policy reflects the general principles of the University community and indicates, in general, what privileges and responsibilities are characteristic of the University’s computing environment.

Terminology

A number of terms used below have specific meanings in the context of this document. We define them here:

  • OTIS – Office of Technology and Information Systems.
  • Network – The complete mechanism by which computers and peripherals are connected.
  • Networked computer – A computer system that is connected to any data network maintained by OTIS.
  • Shared computing resource – A networked computer and OTIS peripherals that can be used by more than one person.
  • Central – Refers to networked computers and peripherals purchased, maintained, and operated by OTIS and made available to all or part of the University community.
  • Department – Refers to networked computers and peripherals purchased, maintained, and operated for academic-specific purposes by individual academic departments and made available to those associated with the program the resources support.
  • Individual – Refers to networked computers purchased for use by an individual member of the University community, and which can be made available to other individuals or groups by the owner.
  • System administrator – The person having executive authority over one or more networked computers.
  • Clients – members and/or guests of the University for whom the services and resources of OTIS are provided.
  • Distributed resources – applications and services (enterprise-wide and program specific) that are provided to members and/or guests of the University for academic, communication and social networking purposes. 

General Policies

Computer and network use has become an essential part of many University activities. While much computing is now done on individually controlled computers (personal computers, workstations, etc.) most information sources and communications systems reside on shared, central computers, or use shared networks. Distributed resources, such as public access workstations provide additional computing tools. OTIS, together with computing resources throughout campus, as well as several academic departments, has the responsibility of providing and maintaining shared computing tools. General policies regarding the resources UArts provides are outlined below:

  • Access – The University of the Arts will provide access to appropriate central and campus computing resources, and to networks, for all members of the University community whose studies and work requires it.
  • Availability – The University of the Arts will make OTIS central and campus computing resources and networks available to the University community with the fewest interruptions possible.
  • Monitoring–OTIS maintains logs of various activities associated with computer usage on campus (i.e. URLs visited, intrusion logs, email logs, etc). These logs are only used to manage the network traffic and are not to be used to infringe upon the privacy of network clients.
  • Interception–To protect the University community from email viruses and other threats to the network, OTIS may intercept messages that meet specific criteria indicating the presence of a threat, informing the University community as soon as reasonably possible. OTIS will notify any community member when a message to them or from them has been intercepted and not delivered. OTIS will not open any intercepted messages without the permission of the recipient.
  • Archiving – OTIS regularly archives (backs up) material on enterprise servers. Information is preserved for a finite period and may be used to recover lost or corrupted data. Clients should be aware that these backup tapes contain a record of all files, including email and network logs, on the system at the time of the backup.

Security

The University of the Arts will assist clients of central and campus shared computing resources in protecting information they store on those resources from accidental loss, tampering, or unauthorized search, or other access. Appropriate information on the security procedures implemented on all resources will be made available by the system administrator. Clients should be aware, however, that unauthorized individuals might gain access to electronic communications and files. Clients who are concerned about maintaining the privacy of their email and files are encouraged to install personal security applications or password protect all documents and data stored on hard drives.

In the event of an inadvertent or non-malicious action resulting in the loss of or damage to that information, or the invasion of the user’s privacy, OTIS will make reasonable efforts to mitigate the loss or damage. The University will provide reasonable security procedures on University-maintained systems. Clients are responsible for properly maintaining the protections under their control, specific to files associated with their computer accounts. Clients may request that arrangements be made to protect information stored on such resources. These requests will be honored at the discretion of the manager of the resource.

Other Resources

System administrators of departmental and individual computing resources are responsible for the security of information stored on those resources, for making appropriate information on security procedures available to clients of those systems, and for keeping those systems free from unauthorized access. These administrators are required to work with OTIS in the sharing of procedures so both OTIS and the department are aware of processes in place.

Confidentiality

The University of the Arts intends that all files and email are private and confidential unless the owner intentionally makes this information available to other groups or individuals. Interception of network transmission is strictly forbidden. In general, information stored on computers is considered confidential, whether protected by the computer operating system or not, unless the owner intentionally makes this information available to other groups or individuals. The University of the Arts will assume that clients wish information they store on central and shared computing resources to remain confidential. OTIS will maintain confidentiality of all information stored on their computing resources. Similarly, privileged information on account usage (in other words, that available only to clients with system privileges) will also be treated with confidentiality. Privileged information available to system administrators will be held in confidence.

The administrator of the computer system involved will review requests for disclosure of confidential information. Such requests will be honored only when approved by University officials authorized by appropriate policy or procedures, or when required by local, state, or federal law.

Censorship

Free expression of ideas is central to the academic process. Therefore, UArts computer system administrators will not evaluate any information from individual accounts unless it is determined that:

The presence of the information involves an illegality (e.g., copyrighted material, software used in violation of a license agreement).

The information in some manner endangers computing resources or the information of other clients (e.g., a computer worm, virus, or other destructive program).

A University judicial or grievance process finds cause for content to be removed in accordance with standing policies and procedures.

OTIS computer systems administrators and department computer systems administrators may remove from central or department computers information as defined above. Clients whose information is removed will be notified of the removal as soon as is feasible. Clients wishing to appeal such removal of information may do so in accordance with the appropriate appeals process relative to their status within the University.

Responsibilities of the User

Access to computing resources and networks is a privilege to which all University faculty, staff and students are entitled. Access may also be granted to individuals outside the University for purposes consistent with the mission of the University. Certain responsibilities accompany that privilege; understanding them is important for all computer clients. Refer to the section ‘Sanctions’ regarding the policy of The University of the Arts in handling infractions of these responsibilities. These responsibilities are listed below:

Institutional Purposes

Use of UArts computing resources and networks is for purposes related to the University’s mission of creativity and artistic expression; academic teaching, learning and research; and community engagement. The use of computing resources and networks are for purposes related to an individual’s studies, instruction, or the discharge of duties as employees, their official business with the University, or their other University-sanctioned activities. The use of UArts computing resources, networks, or bandwidth for commercial purposes is not permitted except by special arrangement with appropriate computing systems administrators and other appropriate University officials.

Security

The user is responsible for correct and sufficient use of the tools each computer system provides for maintaining the security and confidentiality of information stored on it. For instance:

  • Computer accounts, passwords, and other types of authorization are assigned to individuals and should not be shared with others.
  • Individuals should select and obscure the account password and change it frequently.
  • Individuals should understand the level of protection each computer system automatically applies to files and supplement it, if necessary, for sensitive information.
  • All individuals should be aware of computer viruses and other destructive computer programs, and take steps to avoid being a victim or unwitting conduit for attacks.

Legal Usage

Computer resources and network access and bandwidth may not be used for illegal purposes. Examples of illegal activities include:

  • Intentional harassment of others.
  • Intentional destruction of or damage to equipment, software, or data belonging to The University of the Arts or other clients.
  • Intentional disruption or unauthorized monitoring of electronic communications.
  • Unauthorized acquisition of and/or distribution of copyrighted and/or licensed material.

Ethical Usage

Computing resources and network access should be used in accordance with the standards of the University community as described in such documents as the Student Handbook and Faculty Handbook. Examples of unethical use follow; some of them may also be illegal:

  • Violations of computer system security.
  • Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others.
  • Intentional use of computer communications facilities and resources in ways that unnecessarily impede the computing services available to others (randomly initiating interactive electronic communications or email exchanges, overuse or interactive network utilities, etc.).
  • Use of computing facilities for private business purposes unrelated to the mission of the University or campus life.
  • Academic dishonesty (plagiarism, cheating).
  • Violation of software license agreements.
  • Violation of network usage policies and regulations.
  • Violation of others’ right to privacy.

Collegial Usage

Individuals using The University of the Arts computing resources can facilitate computing in the University environment in many ways. Respecting the diversity of the user community demands the practice of responsible computing. This should include:

  • Regular deletion of unneeded files from one’s accounts on shared servers.
  • Refraining from overuse of connection time on public access machines, information storage space, printing facilities, or processing capacity.
  • Refraining from overuse of interactive network utilities.
  • Refraining from overuse of network-shared bandwidth.

Sanctions

The University of the Arts treats the abuse of computing facilities, equipment, software, data, networks, or privileges seriously. Unauthorized access to electronic communications and files is strictly forbidden. Use of computing resources is to be conducted in keeping with the guidelines established in the following official publications of the University: this Catalog, the Faculty and Student Handbooks, and the Academic Integrity Policy. Sanctions adjudicated by The University of the Arts will be resolved in the manner stated in the appropriate handbooks and policies applicable to the status of the individual user. Illegal acts involving The University of the Arts computing resources may also be subject to prosecution under local, state, and federal laws.

 

  ^TOP