Network Usage Policy

The following code of computing practice applies to everyone who uses the Johnson network or Johnson computer systems. Disciplinary action for violating the code is governed by provisions in the Student Handbook, the Faculty and Administration Guidebook, the Staff Handbook, and the Tennessee Personal and Commercial Computer Act, sections 39-14-601 through 39-14-606 (available here). The Tennessee Code prohibits fraudulent and malicious use of computing systems and resources.

1. Only authorized users are granted access to any of the Johnson computing systems. An authorized user is any member of the administration, staff, faculty, or student body who has been assigned a user account consisting of a valid user ID and password. Family members of people in one of the above groups who are assigned user accounts by Campus IT are also authorized to use the Johnson computing systems. You are REQUIRED to change your initially issued password upon receipt following the directions posted online. You must change your password at some frequency to further protect access to your account. Passwords must meet minimum constraints for password strength including the following:

  • minimum 8 characters in length
  • must include at least 1 lower case letter
  • must include at least 1 upper case letter
  • must include at least 1 number
  • must include at least 1 symbol
  • may not be any form of your name or username

2. You must use only the computer account which has been authorized for your use. You may not use another person's account. If you have trouble using your account or if you need more than one account, contact Campus IT.

3. You are responsible for the use of your computer account. You should take precautions against others obtaining access to your computing resources. Do not make your account available to others for any purpose.

4. Although Johnson University does not make a practice of monitoring email, the University reserves the right to retrieve the contents from Johnson owned computers such as email messages for legitimate reasons, as to find lost messages, to comply with investigations of wrongful acts, to respond to subpoenas, to stop the spread of viruses, or to recover from system failure. Additionally, pornography, gambling, and violation of copyright laws are stumbling blocks for many Christians. In order to protect members of the Johnson community, the University blocks sites which the administration has deemed inappropriate for Christians.

5. The following practices are unacceptable:

  • Attempting to circumvent the restrictions associated with your computer account.
  • Attempting to access files for which you do not have authorization or attempting to monitor others' network traffic without authorization.
  • Copying files or data belonging to Johnson without authorization. Written authorization from the Dean of Students must be obtained before one can copy programs belonging to Johnson.
  • Using the network to illegally transfer copyrighted material or to permit others to illegally transfer copyrighted material. It is Johnson's policy to honor copyright restrictions and software licenses. Only software that has been legally obtained may be used on Johnson computers.
  • Modifying system configurations on Johnson-owned computers. Only Campus IT can perform or authorize such changes. Campus IT may remove personally owned hardware or software from Johnson computers if they believe that it interferes with the computers' operation.
  • Using the network to harass others. This includes, but is not limited to, the use of anonymous or forged email, spam, and other unsolicited messages. Port scanning of systems (campus or Internet) is prohibited and considered harassment.
  • Using the network to post vulgar, profane, libelous, false, or malicious statements on Web blogs, discussion groups, or other online forums hosted on either Johnson or off-campus servers.

6. To minimize the impact of your work on the work of others, do nothing that will prevent others' use of the facilities or deprive them of resources.

The use of peer-to-peer (P2P) file-sharing networks, such as Ares or Limewire, is prohibited. Such networks are used on a widespread basis to transfer pornography and to illegally transfer copyrighted material, and the use of such networks places an undue burden on the Johnson network. If you have any questions or concerns about this policy, please contact Campus IT.

7. Students are responsible for making backups of their files and email account data.

8. Student workers should use departmentally assigned accounts when logging on to Johnson staff computers. Students should not log on using their Student ID accounts.

9. Except as authorized, in writing or by email, by Johnson, users are not to use the Johnson network for compensated outside work, the benefit of organizations not related to the University (except in connection with scholarly, creative or community service activities), or commercial or personal advertising.

10. Anyone who maliciously attempts to hinder the operation of or gain unauthorized access to the Johnson network or any computers on the network will be subject to disciplinary action, up to and including prosecution in a court of law, suspension from the student body, or termination from employment.

11. Campus IT has the responsibility to protect fair access to network and Internet resources by all users and to implement, publicize, and enforce policy consistent with these rights. Accordingly, Campus IT may remove any user, service, or program from the network (without notice) that impedes with fair access pending an investigation and decision, or satisfactory resolution.