Technology Policies

The general goal of these policies is to remind the University community to use technology responsibly.

Acceptable Use

Please note that while the following are examples of acceptable and unacceptable behaviors on the network, we do not attempt to cover every possible use. 

  • Use resources only for authorized purposes.
  • Protect your user id and system from unauthorized use. You are responsible for all activities on your userid or that originate from your system. Your userid and password act together as your electronic signature.
  • Access only information that is your own, that is publicly available, or to which you have been given authorized access.
  • Use only legal versions of copyrighted software in compliance with vendor license requirements.
  • Be considerate in your use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, degrading services, or wasting computer time, connection time, disk space, printer paper, manuals, or other resources.
  • Use another person's system, files, or data without permission (note that permission from an individual user may not be sufficient - some systems may require additional authority).
  • Give your password to another person. Contact the Information Technology Help Desk if you need assistance with giving other people authority to access your files or e-mail.  (IT Help Desk E-Mail)
  • Use computer programs to decode passwords or access-control information.
  • Attempt to circumvent or subvert system or network security measures.
  • Engage in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, worms, or "Trojan horse" programs; disrupting services; damaging files; or making unauthorized modifications to university data.
  • Make or use illegal copies of copyrighted software, store such copies on university systems, or transmit them over University networks.
  • Use mail or messaging services to harass or intimidate another person, for example, by broadcasting unsolicited messages, by repeatedly sending unwanted mail, or by using someone else's name or userid.
  • Waste shared computing or network resources, for example, by intentionally placing a program in an endless loop, printing excessive amounts of paper, or by sending chain letters or unsolicited mass mailings.
  • Use the University's systems or networks for commercial purposes, for example, by selling access to your userid or by performing work for profit with University resources in a manner not authorized by the university.

Computer Labs

Dominican provides a number of computers for use by students, staff and faculty in the Computer Labs. Use of computers in these labs follow all of the general policies with these additional caveats

  • Do not attempt to fix a computer problem. If a problem exists, contact the Information Technology Department.
  • You may not download or install software on the computers.
  • Keep a backup of all your work.
  • Ask for assistance from an IT or Library staff member if a diskette becomes jammed in a disk drive.
  • Do not disconnect any hardware for any reason. If a need arises, notify an IT staff member immediately.
  • Some software programs are installed only on specific computers. If you cannot find a particular software program, please refer to the Dominican Lab Home Page to see which, if any, software program is installed.
  • If a virus is found on a computer or floppy disk, notify the IT Help Desk immediately.
  • Do not change printer settings. If you have special printing requirements, notify a TLC staff member.
  • Do not load your own paper or envelopes into the printer. If you need to print on special material, notify a TLC or library staff member for assistance.
  • Transparency and/or adhesive-label printing is prohibited.
  • Do not attempt to clear paper jams. Notify the IT Help Desk or Library staff member for assistance if a paper jam occurs.
  • If paper, toner, or ink is not available, notify the Library Circulation Desk..
  • Recycle all white printer paper in the designated blue recycling bin in the Lab. Please note that recycling bins are not receptacles for trash disposal or other types of paper, including ruled or colored paper.

Users of Dominican computers may often wish to temporarily store their data on Dominican computers. This practice is permitted with the following constraints:

  • Data on Dominican computers (PCs and workstations) is not backed up.
  • Other users, or Dominican IT, may periodically clean the hard drive and delete all data.
  • Every semester the lab computers will be reformatted and wiped clean so that all data is removed.
  • Dominican holds no responsibility for any data temporarily stored on a Dominican lab computer.

Email

Email is a mechanism for official communication within Dominican University of California. Therefore all students at Dominican University of California are required to have a Dominican student email account set up and working.

Peer-to-Peer

Because there are academic applications for peer-to-peer (p2p) file-sharing applications, Dominican does not ban them from its network at this time. However, if you participate in this kind of file-sharing activity, there are three things you should know:

In an environment where we share network resources, disproportionate use of those resources is not fair to the community. P2P applications rank consistently as the second through fifth highest bandwidth consumers at Dominican. That means other network activities such as academic research and file transfers may be severely compromised as a direct result of P2P activity.

If you're caught violating Federal copyright laws, you will be held liable. We will cooperate with the police and other agencies when required. If you're unsure whether a shared file is copyrighted or not, assume it is.

P2p applications copy files from unknown sources to your computer, setting you up as an easy target for hacking or computer viruses. If you use a p2p application and you don't use anti-virus software, you are operating in an unsafe computing environment. Also, an increasing number of p2p applications are installing spyware. Spyware collects personal data about you and sends it to third parties. Some spyware causes computer problems such as blocked Internet connections.

Security and Privacy

The University cherishes freedom of expression, the diversity of values and perspectives inherent in an academic institution, the right to acknowledgment, and the value of privacy for all members of the Dominican community.  

At the same time, the University may find it necessary to access and disclose information from computer and network users' accounts to the extent required by law, to uphold contractual obligations or other applicable University policies, or to diagnose and correct technical problems. For this reason, the ultimate privacy of messages and files cannot be ensured. In addition, system failures may lead to loss of data, so users should not assume that their messages and files are secure.

Neither the University nor its agents restrict the content of material transported across its networks. While the University does not position itself as a censor, it reserves the right to limit access to its networks or to remove material stored or posted on University computers when applicable University policies, contractual obligations, or state or federal laws are violated. Alleged violations will receive the same academic due process as any other alleged violation of university policy, contractual obligations, or state or federal laws.

Additionally, Dominican reserves the right to restrict access to specific sites, services and software that may adversely impact the performance of the network.

Student Residence Hall Network

  • Total bandwidth for the student network varies between 6 Mbps and 12 Mbps depending on time of day.
  • Peer-to-peer bandwidth is severely limited during the day to ensure high transfer rates for regular traffic.
  • Peer-to-peer bandwidth is unregulated in the morning between 1-7 a.m. 

Due to the adverse impact of music downloading on network performance (in addition to the legal issues), the Student Senate has made the decision to block music downloading except between 1-7 a.m.

  • Additionally, music downloading will also be disabled during the week before finals and during finals.
  • Due to the dynamic nature of Kazaa and some of the other peer-to-peer software programs we have had to greatly restrict the communication ports available. 
  • If you attempt to access data types that are restricted you will see an Access Denied message.
  • If you are being restricted from accessing information that is needed by your studies, please submit a problem to the IT Help Desk.  Please make sure to specify the exact URL that you are trying to access.
  • Dominican Radio is not considered music downloading and has no restrictions on its use.

One of the big problems with the student network is that a large number of student PCs are infected with one of the now famous viruses or worms. These infected machines attempt to infect all the other student PCs on the network and adversely impact network performance by attempting to infect other PCs. Pease take the time to read our guidelines on how to secure your PC so that your PC does not cause problems for others.

If we can identify a PC that is infected and is causing network problems, we will send a message to the individual PC asking the person to shut off the PC and call IT for help to remove the virus.  If the person does not respond to our notifications we will disable Internet access for that PC.  If you think that your PC may have had Internet access disabled, click here to see the list of PCs whose Internet access has been disabled.

Downloadable Files