Skip to Main Content

Policies

This page provides an overview of library policies.

Internet Use

Rolfing Library upholds the technology policy defined by Trinity International University. Unacceptable use is described as

Any actions that compromise the integrity of the University, data facilities, networks, services, or resources are strictly prohibited. Examples of unacceptable uses include, but are not limited to the following:

  1. Using the resources for any purpose that violates federal or state laws;
  2. Using someone else’s identity and password for access to University resources, logging others into the network to access University resources, or using the network to make unauthorized access to other networks. Forgery or other misrepresentation of identity via electronic or other form of communication will be subject to disciplinary action. Prosecution under State and Federal laws may also apply. This includes the use of a network (IP) address not specifically assigned to the individual, or use of a forged or false identity in sending e-mail;
  3. Using the resources and misrepresenting your identity or affiliation;
  4. Using the resources for computer tampering or unauthorized alteration of data, identification, or credentials;
  5. Using the resources to transmit, use or serve unauthorized and/or illegally acquired software, media (audio files/video files);
  6. Using the resources for unauthorized browsing or exploring, or making other unauthorized attempts to view data, files or directories belonging to the University or to other users;
  7. Violating copyrights of documents or media;
  8. Using the resources and introducing deviant software (viruses, worms, etc.) into the University network and systems;
  9. Using the resources to access or distribute defamatory, abusive, obscene, sexually oriented, pornographic, threatening, racially offensive or illegal material;
  10. Using the resources for misuse of social media, message boards, or any web based community;
  11. Using the resources in a manner that requires the University network security to be compromised;
  12. Attempting to evade, disable, or obtain passwords or other security provisions of systems on the network;
  13. Using the resources for any activity that interferes or inhibits the use of the network or University systems by others;
  14. Intercepting or tampering with network packets;
  15. Using excessive data storage or network bandwidth in activities such as the "broadcasting" inappropriate messages to lists or individuals or generally transferring unusually large or numerous files or messages;
  16. Tampering with sound systems, lighting systems, or video cameras. Access is limited to trained and authorized personnel;
  17. Tampering, modifying, or extending cabling and wiring. This applies to network cabling, hardware, and in-room jacks. Use of non-University network switches, hubs, or wireless networking technology on the University network is prohibited;
  18. Using the resources for commercial, sales, and/or advertising purposes;
  19. Using the resources for political activities.