| MERCER UNIVERSITY | 
Purpose
    To establish policies and procedures for the use of University-owned and  -operated information technology resources. 
Mercer  University is dedicated to the missions of teaching, education, research, and  public service. In support of these missions, Mercer University provides access  to electronic information resources, including networks, software, and  equipment, to its students, faculty, and staff.
      
      The  Mercer University Information Technology Policy (the "Policy")  contains Mercer’s philosophy and requirements governing the use of its  information technology resources by students, faculty, staff, and others who  have been given authorization, either explicitly or implicitly, to access those  resources. Mercer University expects each member of the community to use  Mercer’s information technology resources, including connections to resources  external to Mercer that are made possible by Mercer University's information  technology resources, responsibly, ethically, and in compliance with the  Policy, relevant laws, and all contractual obligations to third parties. The  use of Mercer University's information technology resources is a privilege. If  a member of the Mercer community fails to comply with this policy or relevant  laws and contractual obligations, that member's privilege to access and use  Mercer's information technology resources may be revoked. The use of Mercer  University's information technology resources to send communications to Mercer  or non-Mercer persons or entities typically identifies the sender as belonging  to the Mercer University community. Each member of the community should,  therefore, recognize that any such communication might reflect on how Mercer  University is perceived by the Mercer community and the public at large. 
      
      By  adopting the Policy, Mercer University recognizes that all members of the  Mercer community are bound not only by the Policy, but also by local, state,  and federal laws relating to electronic media, copyrights, privacy, and  security. Other Mercer University policies that relate to this Policy and also  apply to Mercer University students, faculty, and staff (collectively, the  "community") can be found in the Mercer University Student, Faculty,  and Employee Handbooks. Each member of the Mercer University community is  expected to be familiar with this and all other relevant policies. 
      
      Freedom  of Expression & Misconduct
      Freedom of expression and an open environment within which to pursue  scholarly inquiry and to share information are encouraged, supported, and  protected at Mercer University. Censorship is not compatible with the goals of  Mercer University. While Mercer may limit the use of some computers or  resources to specific research or teaching missions, freedom of expression will  generally be protected. While Mercer University rejects censorship, behavior  that constitutes misconduct will not be protected. Such behavior includes, but  is not limited to, the use of Mercer University's information technology  resources in connection with child pornography, harassment of any kind,  copyright infringement, theft, unauthorized access, and other violations of the  law.
      
      To  comply with federal regulations governing tax-exempt organizations, Mercer  University technology resources may not be used for mass and unsolicited  communications used in connection with lobbying (except official Mercer  University activities authorized by the Office of the President) or political  campaigns. In addition, such resources should not be used for private business  or commercial activities, except where such activities are otherwise permitted  under applicable Mercer University policies. It must be understood that most  software licenses purchased by the University stipulate that all use must be  for educational or institutional administrative purposes only. 
      
      Privacy
      Users should respect the rights of others to privacy and intellectual  property rights and refrain from unauthorized access or copying. State and  federal law and Mercer University policy prohibits unauthorized access to  computer and telephone systems. No one should use aliases, nicknames, pointers,  or other electronic means to capture information intended for others without  permission of the intended recipient. Attempts to gain unauthorized access to  machines or computer records, to decrypt encrypted materials, to monitor other  individuals' computer or network use, to attempt to obtain their passwords, or  to obtain privileges or information to which the user is not entitled are  prohibited. Passwords are private, personal information, which should not be  written down, posted or otherwise shared with others. Attempts to use another  person’s password or to hack another person’s password are a violation of  University Policy, and will be dealt with accordingly. Any attempt to make use  of another person’s password or to access another person’s account or  information may result in immediate termination of access to Mercer’s computer  and network resources as well as judicial or criminal prosecution as defined by  the appropriate existing law or policy.
      
      If  an account holder allows public access to files via file sharing, it is  presumed that the account holder does not intend to keep those files private  from other users. (See “Security” for warnings regarding file sharing.)
      
      Information  Technology systems support staff, systems operators, supervisors, and  designated University officials may access information resources to locate and  protect business information, maintain system and network resources, ensure  system and network security, provide technical support, comply with legal  requirements, or administer Mercer University policies. Information Technology  personnel are not authorized to access or make use of any user's  password-protected data without specific authorization from the user or  direction from University Legal Counsel, Internal Audit, Human Resources, or  Mercer Police. Attempts to do so will result in immediate termination of  employment and could result in criminal prosecution. 
      
      Local  area networks and local resources, including personal computers, workstations,  file servers, printers, and similar devices shall be subject to the same rights  to privacy and confidentiality afforded centralized computer systems regardless  of whether those local resources are connected to any of Mercer University's  central information technology networks.
      
      Intellectual  Property
      Mercer University expects all members of the community to be aware of how  intellectual property laws, regulations, and policies apply to the electronic  environment and to respect the property of others. For further information,  please see the Mercer University Copyright Policy, the Mercer University Policy  and Guidelines on Copyrighted Materials, the Mercer University Patent Policy,  the Mercer University Academic Honor Principle, and the Mercer University  Faculty, Staff, and Student Handbooks. 
      
      No  member of the community shall use another's content or property in a way that  violates copyright law or infringes upon the rights held by others. The  unauthorized duplication or use of any electronic material that is licensed or  protected by copyright may constitute violations of civil and criminal law and  is prohibited by this policy.
      
      Members  of the University community should recognize that placing individual work in  the electronic public domain may result in widespread distribution of that work  and could jeopardize their rights to that work. You should assume that works  communicated through the network are subject to copyright unless there is a  specific disclaimer to the contrary.
      
      Internet  Access
      Mercer University maintains computer facilities and Internet access for its  primary missions of teaching, education, research, and public service.  Excessive use of the Internet for other purposes places an unreasonable burden  on the Mercer network and interferes with access for legitimate use. Using the  University network for occasional access to the Internet for personal purposes  is not specifically prohibited. However, the Department of Information  Technology is charged with the responsibility of ensuring recreational use does  not interfere with legitimate educational and administrative access. When  necessary, Information Technology staff will restrict activities as required to  ensure all authorized users have adequate access to the Internet. 
      
      Violations  of Internet use include, but are not limited to, accessing, downloading,  uploading, saving, receiving, or sending material that includes sexually  explicit content or other material using vulgar, sexist, racist, threatening,  violent, or defamatory language. 
      
      Users  should make economical and wise use of computer and network resources. Users  should report suspected unauthorized use of resources to the Department of  Information Technology. Theft, failure to observe copyright laws, and/or  tampering with any computer system or network device will place violators in  jeopardy of losing privileges as well as possible criminal prosecution. Each  incident will be handled on a case-by-case basis and may be referred to  University Legal Counsel or other appropriate authority.
      
      Peer-to-Peer  File Sharing
       
      Prohibition  against Unauthorized Distribution of Copyrighted Material
      Mercer University strictly prohibits any form of copyright infringement  including the illegal uploading and downloading of copyrighted works through  peer-to-peer (P2P) file sharing.  Copyright infringement is the act of  exercising, without permission or legal authority, one or more of the exclusive  rights granted to the copyright owner under section 106 of the Copyright Act  (Title 17 of the United States Code). These rights include the right to  reproduce or distribute a copyrighted work. In the file-sharing context,  downloading or uploading substantial parts of a copyrighted work without  authority constitutes an infringement.
      
      Penalties  for copyright infringement include civil and criminal penalties. In general,  anyone found liable for civil copyright infringement may be ordered to pay  either actual damages or “statutory” damages affixed at not less than $750 and  not more than $30,000 per work infringed. For “willful” infringement, a court  may award up to $150,000 per work infringed. A court can, in its discretion,  also assess costs and attorneys’ fees. For details, see Title 17, United States  Code, Section 504, 505.
      
      Willful  copyright infringement can also result in criminal penalties, including  imprisonment of up to five years and fines of up to $250,000 per offense.
      
      For  more information, please see the Web site of the U. S. Copyright Office at www.copyright.gov,  especially the FAQ’s at www.copyright.gov/help/faq. 
      
      In addition to the civil and  criminal penalties outlined above, students, faculty, staff, and visitors who  engage in illegal downloading or unauthorized distribution of copyrighted  materials using the University’s information technology systems will be  referred to the Office of Judicial Education or other appropriate authority.
      
      Institutional  Plans to Combat the Unauthorized Distribution of Copyrighted Material
      Mercer University has developed and implemented a number of measures to  effectively combat the unauthorized distribution of copyrighted material. These  measures include the following:
- On an annual basis, enrolled students are notified by email of the institutional policies and sanctions related to the unauthorized distribution of copyrighted material. This notice includes the exact electronic address at which this information is posted, and a statement that the University will provide a paper copy of this information on request.
- In order to use Mercer computing resources, all members of the University community endorse the Information Technology Access and Use Policy which includes a section on copyright compliance. The Policy is included in numerous University publications, and links to the Policy are included in numerous departmental Web sites.
- Mercer Information Technology periodically briefs members of Student Government about copyright, illegal file sharing, and related issues.
- Mercer Information Technology leverages network equipment and software systems such as firewalls, intrusion detection devices, and bandwidth managers to block inbound and outbound P2P traffic.
- Mercer provides a timely response to all notices of copyright infringement under the Digital Millennium Copyright Act.
Alternatives  to Illegal File Sharing
    There are a number of organizations that provide links to Web sites  offering legal alternatives for viewing music, movies, and other copyrighted  materials online.  Some examples include: 
- EDUCAUSE Legal Sources of Online Content (https://www.educause.edu/legalcontent)
- CampusDownloading Legal Sites (https://www.campusdownloading.com/legal.htm)
- Recording Industry of America (RIAA) Legal Music Sites (https://www.riaa.com/toolsforparents.php?content_selector=legal_music_sites)
- Music United (https://musicunited.org/6_legalsites.aspx)
- Motion Picture Association of America (https://www.mpaa.org/contentprotection/get-movies-tv-shows)
Reviewing  Effectiveness
      Beginning in 2011-12 and periodically thereafter, the Department of  Information Technology will utilize relevant assessment criteria to determine  the effectiveness of technology-based deterrents and other measures designed to  combat the unauthorized distribution of copyrighted material. Reliable  indications of effectiveness may include “before and after” comparisons of  bandwidth used for peer-to-peer applications, low recidivism rates, and  reductions (either in absolute or relative numbers) in the number of legitimate  electronic infringement notices received from copyright holders. 
      
      Rights  and Privileges
      The names of students, faculty, and staff are entered into an electronic  database of names along with associated items of information. An entry in the  Mercer University Name Directory, administered by Information Technology,  grants access to network services that originate at Mercer University and  requires user authentication. Students have the right to request, through the  Registrar’s Office, that their information not be made available to anyone  inside or outside the University. If a student has requested that their  information not be published, their name and e-mail address will be published  in Mercer’s internal address books to facilitate communication; however, this  information will not be accessible from off campus. Faculty and staff work  contact information will be made available to Mercer and non-Mercer users  except as required by law. Faculty and staff may request that their personal  contact information not be published or made available.
      
      Having  an account is a privilege, not a right or entitlement. An individual is  assigned an account for use while conducting activities related to the mission  of Mercer University. The holder of an account may not share access information  that would enable use of an account with anyone including colleagues at Mercer  University, family members, or any other individual. Any account may be revoked  temporarily or permanently if a user of University information technology  resources violates public law or University policy. 
  
  Security
  Personal computers and workstations are intended for use as  "clients" that request computing services rather than  "servers" that provide computing services. Providing services to  other users, such as other Mercer network users or the Internet at large,  potentially consumes excessive amounts of network bandwidth and compromises  network security. Without explicit, written authorization from the Department  of Information Technology, computers shall not be configured to operate as  servers, including but not limited to: file, print, mail, web, chat, media  streaming, name, time, directory, quote, network management, or proxy servers.  Any computer ostensibly configured as a client but running special software  that provides services to other users is regarded as being a server and deemed  to be in violation of this policy. University information technology support  personnel may restrict, limit, or disable specific application traffic to  ensure that other mission-critical network traffic is not affected or disrupted  in any way. 
      
      No  user shall attempt to access any service or resource to which they have not  been explicitly authorized access by the appropriate University authority. All  network access ports are provided for use with a single computer system. No  router, wireless access point, hub, or other network device may be installed in  any Mercer facility without prior review and written approval from the  Department of Information Technology. Users of the University network shall not  perform any activity which disrupts network or server resources, impedes or  prevents network or server access by others, or attempt to access private data  of others. Examples include, but are not limited to, port scanning software,  packet sniffers, mail bombing, ping flooding, SMURF attacks, and/or SYN  flooding. Users found to be in violation of this policy will be denied access  without prior notice.
      
      Any  user of the University network who disrupts or obstructs, whether intentionally  or inadvertently, teaching, research, administration, or other University  activities will be subject to disciplinary sanctions as outlined in existing  University policy.
      
      In  order to ensure the security of Mercer’s networks and the systems attached to  those networks, Information Technology has implemented security devices which  will ensure that the University network is adequately protected from malicious  traffic to/from student, faculty, and staff systems. These devices will block traffic  identified as viruses, worms, and exploits.
  
  E-mail
  In general, use of University electronic mail services is governed by  policies that apply to the use of all University facilities. In particular, the  use of University electronic mail services is encouraged subject to the  following conditions:
  
  Purpose - Electronic mail services are to be provided by University organizational  units in support of the teaching, research, and public service mission of the  University, and the administrative functions that support this mission.
  Users - Users of University electronic mail services are to be limited  primarily to University students, faculty, and staff for purposes that support  the mission of the University.
  Non-Competition - University electronic mail services shall not be  provided in competition with commercial services to individuals or  organizations outside the University.
  Restrictions - University electronic mail services may not be used for:  unlawful activities; commercial purposes not under the auspices of the  University; personal financial gain (see applicable academic & personnel  policies); or uses that violate other University policies or guidelines. The  latter include, but are not limited to, policies and guidelines regarding  intellectual property, or regarding sexual or other forms of harassment.
  Representation - Electronic mail users shall not give the impression  they are representing, giving opinions, or otherwise making statements on  behalf of the University or any unit of the University unless appropriately  authorized to do so. Where appropriate, an explicit disclaimer shall be  included unless it is clear from the context that the author is not  representing the University. An appropriate disclaimer is: "These  statements are my own, not those of Mercer University." 
      
      Mercer  University prohibits the use of University’s electronic communications  resources for any purpose that could unnecessarily strain or compromise these  resources. Mercer University also prohibits electronic communications that  interfere with the use of these resources by other employees. Toward this end,  University resources may not be used to: 
  
  Perpetuate  chain e-mail letters or their equivalents - This includes letters that  require the recipient to forward an e-mail to a specified number of addresses  in order to achieve some monetary, philosophical, political, superstitious, or  other goal. E-mails that are part of a multilevel marketing or pyramid-selling  scheme, sometimes known as "Ponzi schemes," are generally illegal and  are specifically forbidden under this policy.
  Create and/or send "spam" - Spam is defined as any unsolicited  electronic communication that is sent to any number of recipients who did not  specifically request or express an interest in the material advertised in the  communication.
  Send or encourage "letter bombs" - Letter bombs are extremely  large or numerous e-mail messages that are intended to annoy, interfere with,  or deny e-mail use by one or more recipients.
  Practice any activity designed to deny the availability of electronic  communications resources - Also called "denial of service  attacks," these activities deny or limit services through mail bombing,  malicious executables such as viruses, threatening a virus, or opening a large  number of mail connections to a mail host or SMTP relay without authorization  or permission. 
  
  Wireless  Network Access & Usage
  Mercer University’s wireless network infrastructure has been installed to  provide a connectivity option for general network access across all Mercer  facilities. The primary mission of the wireless networks is to provide general  network access for currently enrolled students. The University must maintain  administrative control of the radio frequency spectrum that wireless devices  use as their base transport mechanism. Other devices exist that also use the  same frequency band and can cause interference on the wireless network. These  devices include, but are not limited to, other wireless networking devices,  cordless telephones, cameras, keyboards, mice, audio speakers, ad-hoc  (peer-to-peer) networks and computers or other devices equipped with a wireless  card and software to act as an access point. Information Technology staff will  work with the campus community to determine if use of such devices can be  accommodated without causing interference to the wireless networks.
      
      Wireless network usage is bound  by the same policies governing the use of Mercer University’s wired network.  Priority for use of Mercer’s wireless networks is managed in the following  order: (1) currently enrolled students, (2) current employees, (3) visiting  guests. In order to ensure adequate security, all systems and devices intended  for use on the University’s wireless networks must complete an authentication  process. Wireless devices which do not authenticate will not be allowed access.  Currently enrolled students and current employees will connect to the MU-Secure  wireless network authenticating with their network account.  Visiting  guests will connect to the MU-Guest wireless network authenticating by entering  their email address thereby agreeing to abide by the access and use policy. 
      
      Mercer University’s wireless  network infrastructure is provided as a secondary connection option. Use of the  University’s wireless network for mission critical functions is not recommended  or supported.
 
                        
 
  



 
	
                            
	
                   
                    