Each user is assigned their own username and password required to access the Carson-Newman network and resources. The use of this username and password combination authenticate you as an authorized user of the Carson-Newman network and systems. This account is to be kept confidential and not shared with anyone. Usernames and passwords are not to be written down or recorded in any manner where it is not secure (e.g. posted on the monitor, on the desk, under the keyboard, etc.) Violation of this policy will result in the affected account(s) being suspended. Your password will expire every six months by which time you will need to select a new password. You will receive e-mails beginning 21 days before password expiration and a notice at log in time beginning 14 days before password expiration (Mac computers will not receive the log in notice). You cannot use a previous password and they must be a minimum of 6 alphanumeric characters in length. Carson-Newman will NEVER e-mail, asking for your password!
No information considered confidential is to be saved to the local drive of any Carson-Newman computer, but only to approved network locations such as drive m: and shared network drives where available and appropriate. All computer-related disposals must be handled through I.T. to ensure the secure removal of software / information and to ensure equipment is disposed of safely and properly.
U.S. Government Copyright InformationDigital Millennium Copy Right Act of 1998Recording Industry Association of America FAQs on File SharingMotion Picture Association of America Copyright Information
From the Carson-Newman Information Technology Policy
D. Copyright and other Legal Issues
It is your ethical and legal responsibility to comply with all laws, including copyright laws, as you use the college computer system. Information Technology is not responsible for preventing or detecting illegally installed software or other copyright violations on your computer or the computer assigned to you.Software packages installed on the network are governed by the copyright laws and agreements held by C-N. You may NOT copy software installed on the C-N network by Information Technology without written permission from Information Technology. The unauthorized installation or duplication of materials or software which is licensed or protected by copyright is prohibited.Peer to Peer (P2P) file sharing (Kaaza, Kazaa, Napster, Gnutella, LimeWire, etc.) is a recreational use which consumes computer resources and is frequently in violation of copyright laws. P2P is not permitted on the C-N network. Tunneling or other processes that attempt to circumvent standard methods of data transfer are not permitted.Personal wireless access points are not allowed. Network hubs or other types of network devices not approved by Information Technology are not allowed. No type of packet capturing software is allowed. Servers (hardware or software), including, but not limited to, web, FTP, and file, are not allowed. If you wish to create your own personal web page, contact Information Technology for additional information. File and printer sharing is not permitted on personal computers without permission of Information Technology. Tampering with any university-owned network device or attempts to gain access to networking equipment or any computer not belonging to you, whether university-owned or student-owned, is strictly prohibited.
Violations or suspected violations of Carson-Newman's computer use policy or other applicable rules will be investigated by the Director of Information Technology or other individuals as appropriate. An investigation may include examining any information stored on any C-N computing system. The University reserves the right to take immediate actions deemed necessary to safeguard the security of the system and/or the accounts and files stored thereon. Any person who misuses the computer system or university-owned computer equipment will normally be denied access to and use of the system and its resources. Other disciplinary sanctions which may be imposed include, among others termination of employment legal prosecution for the imposition of civil or criminal penalties.
The University will cooperate with civil authorities in the investigation and prosecution of crimes involving campus computer systems.
Information Technology Services Help Desk
Room 300, FITE Administration Building
email: firstname.lastname@example.org | phone: 865-471-3506