Information Security

The following is intended to ensure that all members of the University computing community can be afforded privacy in his/her work; that no one will be unwillingly subjected to abusive behavior of others using the system; that the resources available to the community are not consumed by only a few individuals; and that electronic vandalism does not destroy computer resources. It should be understood clearly that the following points are illustrative and not all-inclusive.

  1. Only authorized persons defined as students, faculty, staff and members of Hampton University sanctioned programs, may use Hampton University's computing facilities and equipment (computers, printers, networks, software, etc.) for legitimate purposes relating to teaching, coursework, research, and administration at Hampton University.
  2. Members of an academic community are entitled to privacy of their work. It is a violation of University policy for an individual faculty, staff or student to obtain a password that belongs to someone else or to access another user’s files or e-mail account on the network. These violations are forms of theft and will not be tolerated.
  3. Any faculty, staff or student may not access any file that is not their own unless that file has been made publicly accessible. This access prohibits the reading, writing, and editing of directories and passwords belonging to others. This prohibition includes, but is not limited to, files left on a floppy or hard disk, misplaced or discarded listings on storage media, etc.
  4. Posting a message under someone else's name is prohibited.
  5. Taking advantage of another person who inadvertently leaves a computer without logging out is no different than entering an unlocked room and stealing, reading a personal letter, or destroying property.
  6. Using HUNet to annoy or harass is prohibited. This applies to the use of phonemail, electronic mail, conferencing, news group bulletin boards and message facilities. This includes but is not limited to flooding individuals or news groups with large volumes of electronic mail designed to disrupt and/or annoy.
  7. The Virginia Code, Section 18.2-372 & 374 sets forth the definition of obscene material. The code also states that the distribution, production or sale of obscene items is illegal, and punishable by law. Federal law also criminalizes the transportation of such materials in interstate commerce.
    Hampton University must comply with these laws and will enforce them among all students, faculty, staff and visitors. Furthermore, the placement of pornographic and obscene material on a Hampton University computer or server is a violation of University policy. Violators will be subject to the disciplinary action of expulsion and/or termination.
  8. Knowingly engaging in any activity that might damage the operating systems or the data stored on any computer, removing or modifying the system files, or disrupting services is a violation of University Policy.
  9. Knowingly distributing a virus or any attack on the network resources or any individual computer is a violation of University Policy.
  10. Disseminating chain letters and other "spreading schemes" is an inappropriate use of the network. Users participating in such activities may have their e-mail privileges restricted or revoked.
  11. The Virginia Code 18.2-152.5, states, a person is guilty of the crime of computer invasion when he uses a computer network and intentionally examines without authority any employment, salary, credit or any other financial or personal information relating to any other person. "Examination"under this section requires that offenders review the information relating to any other person after the time at which the offender knows or should know that he is without authority to view the information displayed.
    Hampton University must comply with these laws and will enforce them among all students, faculty, staff and visitors.
  12. Attempting to circumvent the action of system software written to implement protection mechanisms is prohibited. Protection mechanisms include but are not limited to the establishment of accounts, passwords, disk quotas, and time and space limitations. Any attempt to get around the protection mechanisms established by the University is a violation of the disciplinary code. If you find that some action on your part has placed you in violation of the mechanisms, you must report the incident to the Director of the ATM and/or the Dean of Men or Dean of Women.
  13. Unauthorized copying of software purchased by the University constitutes a violation of copyright laws. Such behavior is a violation of University Policy and the United States laws.
  14. The University's systems or networks cannot be used for personal gain; for example, selling access to your user id or to university systems or networks, or by performing work for profit with university resources in a manner not authorized by the University.