Authentication and Authorization
Each user is assigned their own username and password required to access the Carson-Newman network and resources. The use of this username and password combination authenticate you as an authorized user of the Carson-Newman network and systems. This account is to be kept confidential and not shared with anyone. Usernames and passwords are not to be written down or recorded in any manner where it is not secure (e.g. posted on the monitor, on the desk, under the keyboard, etc.) Violation of this policy will result in the affected account(s) being suspended. Your password will expire every six months by which time you will need to select a new password. You will receive e-mails beginning 21 days before password expiration and a notice at log in time beginning 14 days before password expiration (Mac computers will not receive the log in notice). You cannot use a previous password and they must be a minimum of 6 alphanumeric characters in length. Carson-Newman will NEVER e-mail, asking for your password!
Students are asked to make sure you log off all Carson-Newman computers each time you leave the system, even for a "few moments". Personal computers should be shut down and locked whenever not in use.
Employees are asked to turn their computers off when they leave for the end of the day. The maintenance window is from 3am until 7am each morning. During this time, it is fine for computers to be used, however, they may run a little slower at times and you may be prompted to save your files and requested / forced to reboot.
No information considered confidential is to be saved to the local drive of any Carson-Newman computer, but only to approved network locations such as drive m: and shared network drives where available and appropriate. All computer-related disposals must be handled through I.T. to ensure the secure removal of software / information and to ensure equipment is disposed of safely and properly.
|| From the Carson-Newman Information Technology Policy
D. Copyright and other Legal Issues
- It is your ethical and legal responsibility to comply with all laws, including copyright laws, as you use the college computer system. Information Technology is not responsible for preventing or detecting illegally installed software or other copyright violations on your computer or the computer assigned to you.
- Software packages installed on the network are governed by the copyright laws and agreements held by C-N. You may NOT copy software installed on the C-N network by Information Technology without written permission from Information Technology. The unauthorized installation or duplication of materials or software which is licensed or protected by copyright is prohibited.
- Peer to Peer (P2P) file sharing (Kaaza, Kazaa, Napster, Gnutella, LimeWire, etc.) is a recreational use which consumes computer resources and is frequently in violation of copyright laws. P2P is not permitted on the C-N network.
- Tunneling or other processes that attempt to circumvent standard methods of data transfer are not permitted.
- Personal wireless access points are not allowed. Network hubs or other types of network devices not approved by Information Technology are not allowed. No type of packet capturing software is allowed. Servers (hardware or software), including, but not limited to, web, FTP, and file, are not allowed. If you wish to create your own personal web page, contact Information Technology for additional information. File and printer sharing is not permitted on personal computers without permission of Information Technology. Tampering with any college owned network device or attempts to gain access to networking equipment or any computer not belonging to you, whether college-owned or student-owned, is strictly prohibited.
E. Disciplinary Sanctions
- Violations or suspected violations of Carson-Newman's computer use policy or other applicable rules will be investigated by the Director of Information Technology or other individuals as appropriate. An investigation may include examining any information stored on any C-N computing system. The college reserves the right to take immediate actions deemed necessary to safeguard the security of the system and/or the accounts and files stored thereon.
- Any person who misuses the computer system or college-owned computer equipment will normally be denied access to and use of the system and its resources. Other disciplinary sanctions which may be imposed include, among others:
The university will cooperate with civil authorities in the investigation and prosecution of crimes involving campus computer systems.
- loss of a computer account and/or network/Internet access
- probation or suspension
- expulsion (for students) or termination of employment
- legal prosecution for the imposition of civil or criminal penalties.
Information Technology Services Help Desk
Room 300, FITE Administration Building
email: email@example.com | phone: 865-471-3506