Shenandoah University IT Policy

Mission Statement & Purpose

This policy supports Shenandoah University’s mission statement, promotes responsible use of technology, further enhances academic learning through technology and establishes rules and guidelines for the proper use of University technology. 

In order to keep up with changes in technology and/or state and federal laws, the University reserves the right to interpret, revise, or delete any of the provisions of these policies, with or without notice, as the University deems appropriate, in its discretion.

All members of the Shenandoah University community who use the University’s computing and network resources must use them in an efficient, ethical and lawful manner.  The University provides computers, accounts, software, and network equipment for use by the University, and members of the University community must use them for purposes which are consistent with the business and mission of the University.

Just as certain privileges are given to each member of the campus community, each member is held accountable for their actions as a condition of continued membership in the Shenandoah community.  For more information, please refer to your applicable handbook.

Acceptable Use and Prohibited Conduct

Online Harassment and Cyber Stalking

Online Harassment

No member of the Shenandoah University community may, under any circumstances, use Shenandoah University’s network or computing services to libel, slander or harass any other person or entity.  Online harassment includes, but is not limited to, the following examples:

If a user receives e-mail or online message that he/she considers harassment, the user should:

Cyber stalking

Cyber stalking is an escalation of online harassment in which an individual “tracks” another via the Internet. 

If you are being cyber stalked, tell the person harassing you in straightforward terms, “Leave me alone. Stop harassing me. Do not contact me again.” Log off the application immediately, and if possible stay logged off for at least 24 hours. Do not reply to anything further. Utilize any blocking features the application may have to block the person cyber stalking you.  Save, print and keep all e-mail messages including all full headers, in a separate folder. If you are being cyber stalked, contact Shenandoah University’s Department of Public Safety at (540) 678-4444. If you ever feel you are in a physical danger from a stalker, immediately contact DPS and/or Winchester Police Department at (540)662-4131 or 911.

Copyright Policy

All members of the Shenandoah University community must comply with federal copyright law (U.S. Code Title 17).Copyright infringement is defined as unauthorized possession or sharing of copyrighted materials, including but not limited to music, movies, computer software and games, videos or any other media which requires a license to possess. Sharing of copyrighted material without permission is a violation of the Digital Millennium Copyright Act (DMCA) and this policy. Both the entertainment and software industries actively monitor the Internet for possible copyright infringements with legal action becoming more common. The law requires the University to respond expeditiously when notified that a user is violating copyright law.

Examples of copyright infringement include, but are not limited to sharing files through:

If the University receives a valid subpoena, it is obligated to turn over any electronic information we have regarding specific instances of data transmitted via our networks.

For further information:

Faculty refer to the Faculty Handbook.

Contact the University Library for more information.

Access to Specific Systems and University Information

Digital Communications & Data Retention

The purpose of this policy is to ensure the proper use of Shenandoah University’s email, voicemail and other electronic communication systems by all members of the community. 

All e-mail communication goes through a secure connection to Google's servers. All official e-mail communications directed to Shenandoah University students, faculty and staff members is exclusively sent to SU-assigned e-mail accounts to ensure timely and accurate delivery of information. 

E-Mail and Voicemail Appropriate Use

In using Shenandoah University’s e-mail and voicemail systems, the following procedures and cautions shall be followed by all users:

All SU e-mail accounts are also subject to Google’s Acceptable Use Policy,

http://www.google.com/a/help/intl/en/admins/use_policy.html.

E-Mail Backup

Shenandoah University does not keep backups of e-mail; all e-mail messages are stored on Google servers.

Data Purging and Record Retention

Individuals are responsible for saving e-mail messages as they are required by law, guided by their supervisor or instructors or as they deem appropriate. 

E-mail messages are subject to Google’s purge policies, which may change from time to time without notice. Google currently provides the following guidelines for purging folders: Trash – 30 days; Spam - 30 days.

Users who have actual knowledge of matters in which it can be reasonably anticipated that a court action will be filed, a subpoena has been served or notice of same has been given, or records are sought pursuant to an audit, a government investigation or in similar circumstances must preserve University records, including e-mails or instant messages.

Upon departure from the University (graduation, resignation, etc.), all user data in Google Workplace for Education apps will be subject to deletion after a specified amount of time, which will be communicated to the user upon their departure.

Network Security Policy

Addressing and Domain Services

University Network Equipment

Network Security

Enforcement

Monitoring and Auditing

Internet Traffic Priority

Shenandoah University maintains a private network and is not an Internet service provider.

Access to the Internet via the University's network is primarily for academic purposes and is supported for that purpose. The University retains the right to adjust network settings to give higher priority to academic and University business traffic over all other traffic. 

Software Request and Support

IT maintains and supports software that is licensed for campus-wide use.  Individual specialized departmental software must be budgeted, purchased and maintained by the individual department.  All new software requests must be reviewed and approved by the software evaluation committee.

Faculty software requests should be submitted to the Information and Technology Committee for review and approval.

In accordance with university policy, IT should be notified prior to contacting vendors or scheduling demos with new or existing software vendors. 

New Employee Training

Employees should remember that they carry the University’s reputation and name in all that they do.  As such, they should conduct themselves accordingly when using the University’s IT resources.

New employees (staff, faculty, adjunct faculty) are required to complete IT training within the first two weeks of hire. This training is to ensure the security of the University. Should a new hire not complete IT training within this time frame, the employee's account will be temporarily disabled until training has been completed.