Information Technology TechStop Counter

Acceptable Use

  1. Help Pages
  2. IT Service Counter
  3. Procedures
  4. Contact Us
  5. AV Services
  6. Buying/Selling
  7. CedarNet Accounts
  8. Cell Phone Plans
  9. Computer Labs
  10. Employment
  11. General Information
  12. Guest Network Access
  13. IT Blog
  14. Mailing Groups (PDF)
  15. Mobile Apps
  16. New Computers
  17. Technology FAQ
  18. Wireless Access

Cedarville University provides students with access to network and computing resources as an integral part of the educational environment. Students using these resources should do so responsibly and consistent with the University mission and objectives. The University reserves the right to define and enforce appropriate regulations to ensure that the use of these resources is consistent with the University mission. Enforcement of these regulations may involve (at the University's discretion) monitoring of stored disk files and electronic transmissions (electronic mail, Web-site accesses, etc.). Use of the network and computing facilities implies consent to these regulations and monitoring activities.

Network Security

  • Students are expected to take reasonable precautions to guard the privacy of their passwords. Students are responsible for any use of their accounts.
  • Residential students are responsible for any computer use or network access that occurs in their residence hall rooms (including email or instant messages sent from their rooms).

We recommend that you:

  • Don’t leave any computer unattended while you are logged on.
  • Change your password as necessary and avoid passwords that would be easy for others to guess.
  • Be very careful about delegating access to your Google Mail account.

Access to Pornographic or Obscene Websites

Within the Christian community, use of online pornography is a serious threat. Students are prohibited from accessing pornographic or obscene websites or creating links to such sites. We regularly conduct scans of all Internet activity to ensure that members of the Cedarville community are not using University computers or the University network to access this type of material. Repeated violations of viewing or accessing pornography can result in probation, suspension, or dismissal.

Use of Copyrighted Material

Inappropriate transfers of copyrighted material to or from one of our computers, or via the University network, violate our commitment to honesty and integrity. Such transfers violate state and federal law and are strictly forbidden. Examples of prohibited transfers/downloads include:

  • downloading copyrighted music without permission from an authorized distributor
  • making personal copies of software that is licensed to the University
  • copying another person’s files without his or her permission
  • installing software on a computer without first obtaining an appropriate license

Browsing and Unauthorized Use or Access

Students are expected to respect the privacy and property of others. Therefore, unauthorized browsing of data, files, or directories that belong to the University or to others is prohibited. It is also inappropriate to interfere with someone else’s legitimate computer use by corrupting his or her files or by introducing deviant software (worms, viruses, etc.). To protect the rights of all users, we strictly prohibit the possession of programs designed to breach security or gain unauthorized access.

Respecting Others with Email and Network Communications

Students are asked to demonstrate respect and kindness to others through all forms of online communications. Emails, instant messages, and all online postings should be consistent with the ideals of our Cedarville Covenant. Messages that harass, offend, or annoy others are inappropriate. Chain letters and “spamming” are also prohibited. Students should not send out unsolicited email to groups of more than 25 recipients unless it represents an official announcement from an approved student organization.

Use of Online Classified Advertisements

The University provides an online “classified ad” service for things like selling books or finding a ride home for the weekend. Students are asked to use this free service for all personal high-volume notices (more than 25 recipients). Students should avoid sending other types of unsolicited email to large groups unless it is an official notice related to a University event, program, or student organization.

Stewardship of Equipment and Supplies

Students are expected to treat all equipment with appropriate care. All repairs or modifications to University-owned equipment must be done by information technology staff. Students are not allowed to open the cases for any campus-owned computer. Food is not allowed in public computing labs. However, beverages in covered containers are permitted.

Students are also asked to be good stewards of all computer-related resources. Students are granted a generous print quota at the start of each semester for black and white laser printing. Laser printers are available in the Centennial Library, open-access computer labs, computer classrooms and CedarPrint stations. Multiple copies of papers, campaign signs, or announcements should be made on photocopy machines rather than on computer printers. Students should not remove supplies from the labs for their own private use.

Personally-Owned Computers and Devices

Each residence hall room is equipped with a port for connecting personally-owned computers to the University network. Complete guidelines for personally-owned computers and devices are available on the TechStop website. Following is a summary of the personally-owned computers and devices guidelines.

Minimum Software Requirements

Students should install current anti-virus software on any computer that will be attached to the campus network. (Cedarville University recommends Microsoft Security Essentials for student systems. A link to download the software is available on the TechStop website.)  Personally-owned systems should also be patched with the most recent operating system updates (see for Windows-based systems).

Support Issues

The TechStop website contains step-by-step instructions for the most common setup needs. If you experience error messages or suitable help is not available on the website, please submit an Information Technology request. Some fee-based troubleshooting and repair is available through Information Technology TechStop assistance. Network cables are available for purchase in the University bookstore.

Security Issues

Self provided switches are permitted; however, wired and/or wireless routers are not allowed. All devices attached to the network must meet Ethernet or Wi-Fi standards.

Some devices connected to the network must be registered. The owner of any device will be held responsible for all traffic passing through that device.

Reliability Issues

The University reserves the right to isolate or disconnect any device from the network that appears to be causing network problems or appears to be infected with malicious software (e.g., a virus).

The University reserves the right to analyze network traffic from any or all devices connected to the network. Any sensitive information should only be shared through a secure connection.

The University reserves the right to prohibit devices that cause interference with wireless networking equipment.

Legal Issues

Logging onto CedarNet using a Novell Netware Client is prohibited on computers not provided by the University. Only the computers owned by Cedarville University may legally access commercial software available on CedarNet. Do not connect to CedarNet using a Netware Client on your personal device. You may access your H: drive by following the instructions on the “H:/J:/S:/T: Drive Access” section of the computer help website.

Some software available on the “Downloads” page of the TechStop website is only legal for installation on computers owned by students, faculty, or staff of Cedarville University. Sharing these programs with those outside the University family is illegal.

The University will not be held responsible for damage to devices owned by individuals in the event of power surges or other electrical issues. It is the responsibility of the individual student to provide adequate surge protection for his or her devices.

Penalties for Computer Violations

  • unauthorized copying, transferring, or allowing or facilitating the transfer of copyrighted material
  • unauthorized attempts to access or browse data, files, or directories that belong to the University or others
  • unauthorized use of another person’s account
  • interfering with someone else’s legitimate computer use by corrupting files or introducing deviant software such as worms or viruses
  • possession of programs designed to gain unauthorized access or steal passwords
  • accessing, possessing, or distributing pornographic or obscene material (this includes establishing links to webpages of this nature)

Immediate Dismissal

  • breaking or attempting to break computer security
  • unauthorized attempts to access or browse data, files, or directories that belong to the University or others
  • unauthorized use of another person’s account
  • unauthorized alteration of any electronic data or information files