The policy applies to all computer and computer communication facilities owned, leased, operated, or contracted by the University. This includes, but is not limited to, tablets, personal computers, laptops, smart phones, computer networks, computer peripherals, and software, whether used for academic, administration, research or other purposes. This also includes use of University data or access to computer systems by personal devices such as computers, tablets, and smart phones by faculty, staff, students and guests. The policy extends to any use of University facilities to access computers elsewhere.
Wake Forest University provides each of its students and faculty with an email account. Outside of the classroom, email is an important means of communication between faculty, staff, and students. It is the responsibility of the student to regularly monitor his or her Wake Forest email account for University communications.
Basic Principles. The University’s computing resources are for administrative, instructional, educational, and research use by the students, faculty, staff, vendors and contractors of Wake Forest University. Ethical standards which apply to other University activities (Honor Code, Social Regulations and Policies, and all local, state, and federal laws) apply equally to use of University computing resources.
As in all aspects of University life, users of the University’s computing resources should act honorably and in a manner consistent with ordinary ethical obligations. Cheating, stealing, making false or deceiving statements, plagiarism, vandalism, and harassment are just as wrong in the context of computing resources as they are in all other domains.
Use of campus resources is restricted to authorized users. For the purposes of this policy, an “authorized user” is defined as an individual who has been assigned a login ID and authentication credentials such as a password for use of computing resources. Authorized users are responsible for the proper use of the accounts assigned to them under their login ID and authentication credentials. Users are also responsible for reporting any activities which they believe to be in violation of this policy, just as students are responsible for reporting Honor Code violations.
Use of these resources must be done:
- In a manner consistent with the terms under which they were granted access
- In a way that respects the rights and privacy of other users; so as not to interfere with or violate the normal, appropriate use of these resources; and
- In a responsible manner and consistent with University policies and the workplace and educational environment.
For faculty, staff, vendors, contractors, and other non-students, limited personal use of University issued computing resources is authorized so long as it does not impact University computers, network, or interfere with work related activities and is not prohibited by this or other policies.
For students, personal activity is allowed as long as it does not interfere with other University computers or network bandwidth and is not prohibited by this or other policies.
Systems Monitoring. This statement serves as notice to all users of campus computing resources that regular monitoring of system activities occurs and users should have no expectation of privacy while on the WFU network or computer systems. Only people engaged in supporting University computing resources are authorized to perform monitoring of systems and only for systems under their control.
Policy Violations. Suspected violation of this policy will be handled through the appropriate University process or office, such as administrative procedures, The Honor and Ethics Council, the Graduate Council, Dean’s office, or Human Resources.
Violation of this policy may result in one or more of the following, in addition to any other actions deemed appropriate by the applicable authority:
- Suspension of one’s ability to perform interactive logins on relevant machines on campus.
- Suspension of one’s ability to use the University’s computing resources.
- Suspension of one’s ability to send or receive email.
- Increased monitoring of further computer activity (beyond normal systems monitoring).
Locating Computing Policy Information and Policy Updates. The above summary is based on the “Policy on Ethical and Responsible Use of Computing Resources”. These policies may be updated, shortened, or expanded from time to time.
Full policies can be reviewed online.