Page 1 of 4

Network User Agreement

Approving University Official: Vice President of Finance and Administration

Responsible Office: Office of University Technology

Effective Date: Prior to December 31, 1995

Next review date: July 1, 2022

I. Policy Statement

Computing resources are provided for the use of faculty, students and staff for academic or

administrative purposes. The privilege of use is not transferable to another member of the

Drew community, to an outside individual, or to an outside organization. Misuse of computer

facilities is considered a serious judicial offense at Drew and carries sanctions for anyone found

in violation of the University’s policy.

As a member of the Drew community, there are rules and policies by which you must abide to

keep the network secure and available for all to use, and to maintain an atmosphere where all

are welcome. Your use of Drew’s networking services connects you to the entire Drew

community and to the world via the Internet, and therefore reflects on you and on the

institution.

Please take these responsibilities seriously and read this agreement carefully.

II. Purpose

This policy is intended to protect the University network and the community’s ability to fulfill

the University’s mission.

III. Audience

All members of Drew University community.

IV. Definitions

Network: The system of computers, servers and peripherals that enable the Drew campus to

interact with the rest of the internet.

uLogin Account: The account protected by your Drew username and password which gives you

access to various Drew services.

Page 2 of 4

V. Procedures

Use of the Drew University network indicates acceptance of the following:

1. The Drew network is to be used primarily for purposes of fulfilling the University’s

mission. It is intended to be used as a tool to enhance education and research and to

facilitate administrative work and is not available for unrestricted use for other

purposes. Use of the Drew network for other purposes will always be restricted in favor

of academic or administrative usage when the situation dictates.

2. The University provides the Drew network exclusively to you as a member of the Drew

community. Your network identity and uLogin account uniquely identify you, and are

not transferable to other members of the Drew community or to people outside of

Drew.

3. Protect your uLogin password or other credentials at all times and do not share them

with others. You will be held responsible for all activities which occur with your uLogin

account.

4. The Drew network is a shared resource. Therefore, network use or applications which

inhibit or interfere with the use of the network by others are not permitted. At times,

network administrators may ask you to restrict your use of the network or not to use

the network because of a temporary condition. You must comply with those requests.

Applications which use an unusually high proportion of network bandwidth for

extended periods of time, including, but not limited to, running servers or network

games, are not permitted and may be shut down, with the user contacted as soon as

possible.

5. There are University standards for network software and hardware that can be used on

the Drew network. Computers, network cards and software issued by Drew become the

standard. Use of hardware or network software other than the University standard

without permission may be restricted. Hardware or software that interferes with

network operation will be removed or disabled.

6. Users of the Drew network must comply with federal, state, and local laws and

ordinances including U.S. copyright law.

7. Users of the Drew network can expect that their data is confidential and secure.

Network administrators will access data on the system, either stored or in transit, only

to maintain network operation or security, and will adhere to the SAGE Code of Ethics

when doing so. Contents of personal files may be accessed by programs designed to do

heuristic searches for materials that could interfere with network operation or security.

Files may be individually searched for investigative purposes only when ordered by a

court of competent jurisdiction, or when there is an alleged violation of University

regulations and the search is authorized by a dean, vice president, president, or their

2

Page 3 of 4

designated representatives. Search and notification procedures in accordance with

University policies will be followed.

8. Drew network services and wiring may not be modified, tampered with or extended.

This applies to all network wiring, network jacks and hardware. If you cause damage by

modifying or tampering with network wiring, jacks or hardware, you will be held

financially responsible for such damage and may be subject to disciplinary procedures.

9. Malicious use of the network is strictly forbidden by University computer usage policies.

This includes but is not limited to: sending harassing or threatening messages;

attempting to forge messages, crack passwords, intercept data or circumvent server

security; sending bulk unsolicited email; or sending data intended to disrupt services.

10. Support of the Drew network is provided by University staff, student employees and

outside vendors. Drew’s goal is to provide 24 hour service to all users. In the event of

critical system failures (loss of an entire building, critical server, or large amount of

network infrastructure) we strive for a 2 hour response time, with an 8 hour resolution.

We will strive to resolve non-critical issues within 2 business days.

Network Guidelines and Policies

Drew’s network services are primarily made available for academic and work-related use for

faculty, staff, and students. The following policies and guidelines for these systems apply as a

supplement to the standard computer and network usage guidelines:

● Any software to be installed on the network for use by multiple users must be

submitted through documented standard procedures and in accordance with all

relevant licensing restrictions. Software will be metered to restrict access

according to the license agreements, and when possible software will be

installed in public areas of the server to provide the widest possible access to

these materials.

● Personal materials should be kept on your personal network (F: drive), your hard

drive, or on backup media such as thumb drives. Please refer to Storage Options

and Backing Up Your Data for more information.

Although system backups are performed, it is still the responsibility of the user to keep their

own backup copies in case of emergency. System backups are for the purpose of rebuilding the

system in case of system failure.

Other servers may not be established or maintained on the campus network without prior

consultation with University Technology. This is so we can be certain that network service and

security are maintained, and to maximize the benefit of such services to the University.

University Technology reserves the right to not allow servers on the network if the functionality

3