|
|
|
|
Internet Use Policy
This document outlines the Policy for use of the
Internet at The Research Foundation of SUNY/State University College
at Buffalo.
PURPOSE: This document establishes the policy on the use of the
Internet by the Research Foundation of SUNY/State University College
at Buffalo users.
ACCESS: All computers attached to the RF network
have unlimited access to the Internet.
USAGE: Use of the Internet is allowed and encouraged
for the purpose of the advancement of the business and goals of
the Research Foundation. Email, World Wide Web, FTP, and
any other part of the Internet may be used for this purpose.
RESTRICTIONS: The following is a list of unacceptable
Internet usage.
- Unsolicited Mass Emailing (spamming) – No
email should be sent to large mailing lists unless each recipient
gives express consent.
- Access to Adult Oriented material – Access
to such material is prohibited at all times at RF.
- Access to Non-Business related Material –
Material of this nature, with the exception of the limitations
above, may be accessed during a users lunch hour, or during non-business
hours.
- All internet relay chat (Instant messaging) and file swapping (Napster, Grokster, etc.) services are strictly prohibited.
- Gaming Services – Game Services such as (but
not limited to) Heat or Mplayer are totally prohibited.
- All file downloads must be virus scanned before opening.
- Accessing, posting or sharing any racist, sexist,
threatening, obscene or otherwise objectionable material (i.e.,
visual, textual, or auditory) is strictly prohibited.
- The Internet should not be used for any personal
monetary interests or gain.
- The Internet should not be used for political purposes.
- Employees should not subscribe to mailing lists
or mail services strictly for personal use and should not participate
in electronic discussion groups (i.e., list server, Usenet, news
groups, chat rooms) for personal purposes.
- Employees must not intentionally use the Internet
facilities to disable, impair, or overload the performance of
any computer system or network, or to circumvent any system intended
to protect the privacy or security of another user.
SANCTIONS FOR VIOLATING THE POLICY: Employees who
violate this policy will have their Internet access privileges
terminated.
MONITORING: the Research Foundation Reserves the
right to implement software and/or hardware to monitor the use
of the Internet to enforce this policy.
RESOURCES: If there are any questions about this
policy, questionable web sites, or acceptable use, please contact
Guy Cameron,
at Ext. 203, or in person.
|