Interfering with the Electronic Rights and Activities of Others

Printer-friendly version
Policy Code: 
1216
Approval Authority: 
Chancellor
Policy Type: 
University Policy
Policy Owner: 
Academic Affairs
Responsible Office: 
Information Technology Services - 828.251.6404

I. Policy Statement

A. Electronic computing and communication resources are limited resources designed to facilitate the instruction, learning, dissemination of scholarly information, and research activities of the campus community. They should not be used wastefully, or to impede, interfere with, restrict, cause harm to, or impair the rights or activities of other users. Specifically, users may not infringe or encroach on the availability or use of electronic computing and communication resources by others. Such activities would include, but not be limited to:

1. Hoarding or excessive use of electronic and communication resources, in such ways that they interfere with reasonable access to resources by other users.

2. Tampering with, damaging, or disrupting, the normal operations of computers, networks, and facilities, including activities such as "denial of service" (DoS) attacks against another network host or individual user, other related attacks on accounts;

3. Creating or maintaining web pages or web applications that are accessed to an excessive degree. Such web pages and applications can be a drain on computer resources and, except where significant to the University's mission, may require the University to ask that they be moved to a private Internet provider;

4. Running inefficient programs on the network or shared computers when efficient ones are available. Systems, applications, and software should employ sound engineering and best practices to ensure that the use does  not overload University computing equipment or systems, or otherwise harm or negatively impact the system's performance;

5. Running or installing on any computer system or network, or giving to another user, a program designed or likely to damage or to place excessive load on a computer system or network. This includes but is not limited to programs known as computer viruses, Trojan horses, worms, or similar damaging programs;

6. Performing an act which will interfere with the normal operation of computers, peripherals, or networks.

II. Scope

Applies to UNC Asheville faculty, staff, students, volunteers, interns, and guests requiring access to electronic resources.

II. Violations of Policy

Violation of this policy may constitute misconduct and accordingly employees are subject to disciplinary action, up to and including suspension without pay and dismissal, in accordance with the pertinent employment policies for SHRA, EHRA non-faculty, and faculty.

Sanctions for violation of this policy may include suspension or revocation of access privileges in addition to any other sanction permitted under the Student Code of Community Standards.