Sanctions
Information Technology Policy

Individuals or groups who act in a manner contrary to existing policy and accepted standards for computer use are subject to the sanctions and disciplinary measures normally applied to misconduct or lawbreaking. Computing policy violations are handled by established University channels.

In the first instance, such matters will be addressed by the appropriate IT administrators. Whenever it becomes necessary to enforce University rules or policies, an authorized IT administrator may prohibit network connections by certain computers (even departmental and personal ones); require adequate identification of computers and users on the network; undertake audits of software or information on shared systems where policy violations are suspected; take steps to secure compromised computers that are connected to the network; or deny access to computers, the network, and institutional software and databases. Users are expected to cooperate with investigations either of technical problems or of possible unauthorized or irresponsible use as defined in these guidelines; failure to do so may be grounds for suspension or termination of access privileges. 

If the infringement is not settled in discussion with the computing administrator, a matter involving students will be referred to the Dean of Students. A matter involving faculty will be referred to the department chair or dean; and a matter involving an employee will be referred to the immediate supervisor, the manager of the unit, or an official in Human Resources. In addition, certain kinds of abuse may entail civil or criminal action as well.

Listed below are examples of infractions against the University of St. Francis’ technology use policy. This is not meant to be a comprehensive list but rather a sampling of possible infractions.

Common sense and good judgment should always applied to the use of technology.

  1. Attempts to annoy or inconvenience any user of the system:
    Examples:
    1. Purposely consuming large enough shares of system resources to affect other users
    2. Destructive control codes in files, in file names, or anywhere other users could be affected (virus)
    3. Sending control codes to clear another user’s screen, lock the keyboard, etc.
    4. “Stuffing” another user’s mail file
    5. Sending false or unauthorized “systems messages”
    6. Sending obscene mail
    7. Creating false or unauthorized login sequences which record the passwords other users enter
    8. Having a false or unauthorized login which gathers the passwords of those attempting to change their own password

  2. Attempting to circumvent restrictions or resource limits established by Information Services

  3. Purposely rendering the systems unusable to a significant number of users
    Examples:
    1. “Crashing” the system
    2. Removing or altering files which are necessary for the proper functioning of generally used programs
    3. Removing, altering, or reading information belonging to another user of the system without the user’s permission
    4. Logging on as a user other than yourself, and/or falsely representing yourself to be that user in communication to others
    5. Allowing another user to use your login if that user’s own login is removed for disciplinary reasons
    6. Violating the legal rights of others
    7. Logging on as a user, other than yourself
    8. Committing any violation referred to in the moral and ethical standards section of this policy
Notices and Alerts

Please refresh your browser to receive the most up-to-date alerts.


Upcoming Scheduled Outages:



DoIT Home
About DoIT
Contact DoIT
Information TechnologyUniversity of St. Francis • Joliet, IL 60435 • [815] 740-3432