Explanation of "Fair Share of Technical Resources"

As Referred To in the BVU Electronic Information Policy

In order to maintain network performance, security, and functionality, the University monitors traffic that travels across its network. This monitoring enables the University to find and correct problems to assure every user has a fair share of technical resources.

While maintaining the user’s reasonable right to privacy, monitoring can reveal information about a particular segment of the network or even an individual machine on the network. This information may include the amount of traffic being generated between two entities on the network, what kind of traffic is being generated, and length of activity. Once certain conditions are met, such as abnormally high amounts of traffic or certain types of traffic, the computer center will investigate further and perform an in-depth analysis of the situation. The computer center uses this information to identify bottlenecks and plan capacity throughout the network.

One aspect the computer center carefully monitors is the setup and use of non-authorized servers on its network. The computer center defines a server as any machine or device that provides files or services using the University network. The computer center will collect evidence of any such server and may terminate network services to that machine as they see appropriate Servers that transmit any information violating existing local, state, and/or federal laws are subject to the penalties imposed by those laws.

The computer center may also contact individuals who are using more than his or her fair share of technical resources. The computer center encourages the use of technology, which includes University network resources. Occasional downloading of large files off of the Internet is not considered an overuse of network resources. Continuous downloading of files or long-term periods of streaming video or audio may cause the network to become saturated. Conditions such as these will cause the computer center to inform the user that he or she is exceeding his or her fair share of technical resources.

Conduct which involves misuse of data networks is subject to University disciplinary action, including but not limited to revoking access privileges. This conduct includes, but is not limited to the following:

  1. Electronic monitoring of the network for the purpose of examining data other than that destined for the user.
  2. Violating the usage policies and regulations of the networks that Buena Vista University is a member of or has authority to use.
  3. Disrupting campus data networks or networks that the University is a member of or has authority to use.
  4. Connecting unauthorized devices to the campus network.
  5. Operating an unauthorized network server or network service. Examples include, but are not limited to: ftp, http, mp3, smtp, nntp.

2fix

 
© BUENA VISTA UNIVERSITY    610 W. 4TH STREET     STORM LAKE, IOWA 50588     800.383.9600    |    Contact Us     A-Z Index