Print this page

Technology Acceptable Use Policy

Policy Number: IT-09

Effective: 11/19/2007

Last Revised: 07/17/2020

Responsible Executive: Executive Vice President & CFO

Contact Information: 765-677-2605

I. Scope

This policy applies to all users of computing resources owned or managed by Indiana Wesleyan University (IWU). Individuals covered by the policy include (but are not limited to) all employees, students, alumni, guests, volunteers, or agents of IWU, external individuals and organizations accessing network services via IWU's computing facilities.

Computing resources include all IWU owned, licensed, or managed hardware and software, and use of the university network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.

These policies apply to technology administered in individual departments, the resources administered by central administrative departments, personally owned computers and devices connected by wire or wireless to the campus network, and to off-campus computers that connect remotely to the IWU's network services.

II. Policy Statement

IWU’s computing resources must be used for purposes that are consistent with its Christ-centered educational mission and its non-profit status. Additionally, computing resources must be used in ways that are lawful and in ways that honor our licensing and contractual obligations with related parties.

This document establishes specific requirements for the use of all computing and network resources at Indiana Wesleyan University.

III. Reason for the Policy

The computing resources at IWU support the educational, instructional, and administrative activities of the University and the use of these resources is a privilege that is extended to members of the IWU community. As a user of these services and facilities, you have access to valuable University resources, to sensitive data, and to internal and external networks. Consequently, it is important for you to behave in a responsible, ethical, and legal manner.

IV. Procedures

A.  Acceptable Use

  • You may use only the computers, computer accounts, and computer files for which you have authorization.
  • All IWU devices come preloaded with a standardized suite of supported software.  The installation of unapproved third-party software on IWU devices is prohibited.
  • You may not use another individual's account, or attempt to capture or guess other users' passwords.
  • You are individually responsible for appropriate use of all resources assigned to you, including the computer, the network address or port, software, data usage and hardware. Therefore, you are accountable to the University for all use of such resources. As an authorized IWU user of resources, you may not enable unauthorized users to access the network by using an IWU computer or a personal computer that is connected to the IWU network.
  • The university is bound by its contractual and license agreements respecting certain third-party resources; you are expected to comply with all such agreements when using such resources.
  • You should make a reasonable effort to protect your passwords and to secure resources against unauthorized use or access.
  • You should use a unique password for your IWU account that is not used with any other service.
  • You must not attempt to access restricted portions of the network, an operating system, security software or other administrative applications without appropriate authorization by the system owner or administrator.
  • On the IWU network and/or computing systems, do not use tools that are normally used to assess security or to attack computer systems or networks (e.g., password 'crackers,' vulnerability scanners, network sniffers, etc.)
  • Storing personal files on IWU-provided storage solutions is strongly discouraged. In the event that personal storage using an IWU solution is unavoidable, you are directed to use Microsoft OneDrive for such storage. You are prohibited from storing personal files on IWU’s local file servers.  
  • You must comply with the policies and guidelines for any specific set of resources to which you have been granted access. When other policies are more restrictive than this policy, the more restrictive policy takes precedence.

B.  Adherence with Federal, State and Local Laws

As a user of IWU’s computing and network resources you must:

  • Abide by all federal, state, and local laws.
  • Abide by all applicable copyright laws and licenses. IWU has entered into legal agreements or contracts for many of our software and network resources which require each individual using them to comply with those agreements.
  • Observe the copyright law as it applies to music, videos, games, images, texts and other media in both personal use and in production of electronic information.
  • Do not use, copy, or distribute copyrighted works (including but not limited to Web page graphics, sound files, film clips, trademarks, software and logos) unless you have a legal right to use, copy, distribute, or otherwise exploit the copyrighted work. Doing so may provide the basis for disciplinary action, civil litigation and criminal prosecution.

C.  Other Inappropriate Activities

Use IWU's computing facilities and services for those activities that are consistent with the educational, research and public service mission of the University. Other prohibited activities include:

  • Use of IWU's computing services and facilities for political purposes
  • Use of IWU's computing services and facilities for personal economic gain
  • The Indiana Wesleyan University name, seal, logo, telephone numbers or address are reserved for official university business and may not be used for any other purpose including electronically (fax, Internet, etc.) in advertising or for non-university sponsored events without explicit written permission.

D.  Privacy and Personal Rights

  • All users of the university's network and computing resources are expected to respect the privacy and personal rights of others.
  • Be professional and respectful when using computing systems to communicate with others; the use of computing resources to libel, slander, or harass any other person is not allowed and could lead to university discipline as well as legal action by those who are the recipient of these actions.
  • IWU reserves the right to access and review any information, IWU owned or issued hardware, or data transmitted across its network.
  • Access to files on University-owned equipment or information will only be approved by specific personnel when there is a valid reason to access those files. Authority to access user files can only come from the Executive Director of Human Resources and University Legal Counsel in conjunction with requests and/or approvals from unit Cabinet members of Indiana Wesleyan University. External law enforcement agencies may request access to files through valid subpoenas and other legally binding requests. All such requests must be approved by University Legal Counsel. Information obtained in this manner may be admissible in legal proceedings.

E.  Internet, Email Usage & Monitoring

  • The IWU Community Lifestyle Statement applies to all student and employee activities which includes the use of the internet. Inappropriate use of the internet to access sites such as pornography, gambling, illegal downloads of content, and hate speech is outside of legitimate academic research and is therefore prohibited.
  • Employees using Internet or email resources and equipment should take into consideration stewardship of resources and appropriateness of activity as it relates to his or her responsibilities to IWU. While students may use Internet resources while on Indiana Wesleyan property for entertainment purposes as part of their residential life experience, employees should limit usage to work related activity.
  • IWU reserves the right to conduct electronic monitoring of an employee or group of employees if there is probable cause that this policy is being violated. Electronic monitoring is defined by the State of Indiana as the collection, storage, analysis, and reporting of information concerning an employee’s activities by any of the following means:  
    • Computer (employer owned computer hardware)
    • Electronic observation and supervision
    • Remote telephone surveillance
    • Telephone call accounting
    • Other forms of visual, auditory, or computer-based surveillance conducted by any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or part by wire, radio, or an electromagnetic, a photo-electronic, or a photo-optical system.
  • The IWU email system exists to enhance the communication abilities of the Indiana Wesleyan University community. It should be used for purposes that enhance communication and reflect our desire to be Christ-like.
  • Accounts will be terminated for inappropriate use.
  • Employees are prohibited from forwarding their IWU email to a personal account. In addition, IWU business should not be conducted via personal or third-party email accounts.
  • Proxy access of employee email accounts can be granted by supervisors with limited permissions.

F.  IWU Provided Wireless Network Usage

  • The use of any device with wireless capabilities is strictly prohibited anywhere on campus unless approved by IT Network Services and the Information Security Officer.
  • Students can connect a non-wireless enabled router to an IWU port located within their respective housing suite location.
  • In order to maximize the reliability of the network for all users, wireless routers which are discovered, whether causing problems on the network or not, may be disabled/removed from the network until such time as the device is approved by IT Network Services and the Information Security Officer, and properly configured and connected to the network.

G.  User Compliance

  • When you use University computing services, and accept any University issued system access, you agree to comply with this and all other technology related policies. You have the responsibility to keep up-to-date on changes in the computing environment via the University Policy Warehouse and/or guidelines outlined in the University knowledge base.

V. Sanctions

In the event it is determined via internal monitoring or notification from an outside agency that an employee may be in violation of the policy or local, state or federal laws, notification will be made to the appropriate Executive Council member for resolution. The University may take one or more of the following actions:

  1. Verbal or written warning.
  2. Limitation of technology privileges.
  3. Termination of employment.

Students found to be in violation of any part of the policy may be subject to disciplinary action as determined by the Vice President for Student Development.