Computer Usage Policies
HomeStudentsTechnology Resources › Computer Usage Policies FaceBookTwitterYouTube
Law Students and authorized patrons are provided use of Law School computer resources, inclusive of University provided Internet access. While using these resources, individuals must adhere to the Drake University Policy Concerning Community, Diversity, Freedom of Expression, and Harassment, as well as state and federal laws concerning the Internet.

The following is a list of rules and policies established by Drake University Law School to govern the use of network user accounts and equipment.


User Accounts & Workstation Access

  1. Use of all Law School owned computer equipment is limited to current Drake University Law School students, faculty, staff, and authorized patrons. Use by all other persons is strictly prohibited. Student access is restricted to computer lab and other sanctioned facilities only. Visitors must only use designated workstations. Anyone found accessing faculty/staff equipment or logging into equipment using someone else's ID and password may be subject to account deactivation or other disciplinary action.
  2. Users shall not examine or attempt to modify file protection or system or user security.
  3. Users must not attempt unauthorized disassembly, relocation, modification, or repair to any equipment belonging to, or under the control of Drake University Law School.
  4. Users' computer accounts and passwords should be kept confidential and shall not be shared with unauthorized users.
  5. User accounts for those students who have graduated will be removed from the system 30 days prior to the start of the next Fall term. User accounts for non-returning students will be removed at the same time.
  6. Users shall not attempt to bypass standard procedures. This includes, but is not limited to, unauthorized use of an account, use of an account for a purpose for which it was not intended, or attempts to discover another person's password.
  7. Users shall not place personal or unauthorized copies of software on Drake University Law School equipment.
  8. Users may not distribute a computer worm, virus, or other deceptive procedure that interferes with normal computer operation. This would include chain e-mails, spam, or flames.

Document Storage & Server Access

  1. Students are encouraged to store documents on the Law School's Student File Server. Students are provided their own server-side document storage facility, secured to prevent access by unauthorized accounts.
  2. Document storage is to be used for Law School purposes only. Downloading programs, music files, any non-educational contents, or inappropriate materials into one's folder is strictly prohibited. Storing illegal material may be grounds for an honor code violation and/or other disciplinary action.
  3. Students are restricted to 1GB of storage on the server. Once that allotment has been reached, the student will be blocked from saving any additional content. At that point they are encouraged to delete anything no longer necessary.
  4. Other users' data should be treated as their private property. Users may not attempt to access or make use of any other user's data without the appropriate authorization. Any attempt to copy, rename, modify or view another person's work is strictly forbidden.
  5. Drake Law School reserves the right to access user's data and programs for appropriate management purposes, such as making backups, to ensure system integrity, and to review reported abuses to the computer network. Users are reminded that materials on Law School owned equipment are not private and Law School personnel may, from time to time, examine materials to make certain they meet with Law School policies. Materials found to be in violation of these policies are subject to deletion at any time.
  6. Student documents stored on the server following graduation are considered Law School property and will be deleted 30 days prior to the beginning of the next Fall term. Users are urged to copy or remove their files from the server before their graduation. Students who have not graduated, but do not enroll for the following Fall term, will be considered non-returning students. Documents belonging to non-returning students will be deleted 30 days prior to the start of the Fall term. This policy will not affect students who were enrolled in a Fall semester, do not enroll in the following Spring semester, but re-enroll for the Fall term thereafter.

Network Connectivity & Usage

  1. Users shall refrain from using data streaming software for non-academic use.  Unauthorized use of the Drake University network for radio and/or other audio or video streaming is strongly discouraged and is grounds for account or network deactivation.
  2. Users are not to attempt to compromise network security in any manner.  Sharing or stealing IP address information is strictly forbidden and will result in total loss of network access.  Users are not to attempt stuffed routing, stuffed masquerading, IP spoofing, or other deceptive networking tricks.
  3. Users shall not attempt to intercept or interfere with the transmission of the University's wireless network.  This includes, but is not limited to, the use of wireless phones or other devices operating in the 2.4 or 5GHz spectrum.  Users are not to configure their computers as wireless base stations, access points, or bridges.  Computers with wireless cards may only operate as end workstations.
  4. The 2.4 and 5GHz spectrums are to be considered institutional resources and will be governed by these Computer Usage Policies.  Users interfering with wireless network communications will be asked to cease transmissions and leave the premises before resuming services.

If a complaint is received regarding your behavior and/or use of Law School equipment, you will be notified.  Depending on the nature of the complaint, your access may be temporarily suspended until a resolution can be reached.  The Drake University Law School reserves the right to remove access to computing resources, in whole or in part, of students who have violated these policies.

 
Last Modified: 8/1/2014 1:36:00 PM by David Hanson