- Academic Honesty
- Accommodating Students with Disabilities
- Alcohol and Controlled Substances Policy
- Anti-Discrimination and Complaint Procedures Policy
- Campus Emergency Notification
- Commencement Walking Policy
- Conditions of Computer Use
- Conduct Policies and Procedures
- Conduct Records of Students
- Deadly Weapons and Fireworks
- Debt Collection
- Drug-Free Workplace
- Educational Training in Responsible Conduct of Research
- Family Educational Rights and Privacy
- Financial Responsibility of Students
- Fund-Raising and Sales Policy
- Fundraising Activities Policy
- Grade Appeals
- Hazing Activities
- Health Insurance Policy
- Identity Theft Policy
- Idling Vehicles
- Institutional Review of Research Involving Human Participants
- Intellectual Property Policy
- Key Policy and Procedures
- Photography / Video for Publicity
- Protection of Children
- Recognition of Student Organizations
- Responsibility for Confidential Student Records
- Safety Procedures
- Severe Weather Policy
- Sexual Misconduct and Complaint Procedures Policy
- Smoke Free
- Statement of Responsibility Re Confidentiality of Student Records
- Student Academic Grievance
- Student Health Records Policy
- Transportation of Students and Employees
- Undergraduate Excused Absences for University Events
- Violent Acts and Threats
- Web Pages
- computer network support of instructional, research, and service activities;
- computer network support of administrative activities;
- voice and data network design and maintenance, desk-top computer repairs and installations.
Conditions of Computer Use
Computer systems are provided by Marywood University in support of University goals and objectives. They are provided for public use by members of the University community in computer labs and drop-in areas, in classrooms and conference rooms for instructional and program support, and to members of the faculty, staff and administration for use in pursuance of their roles at the University. University computing systems are connected to Marywood’s local area network and to the Internet by wired and wireless systems. Individuals may connect their personal computing devices to the Marywood network at various access points across campus.
Students, faculty, staff and administrators are provided with password protected accounts to access e-mail, Marywood’s network, and various information systems and services (in- house and third-party) related to their roles at the University. Many web-based services can be accessed both on and off campus.
The conditions for use of these computer systems are formed by the "spiritual and ethical values" expressed in the Mission Statement and Core Values of the University. They underscore responsible, moral, legal, and secure use of campus-wide information systems.
Responsibility extends to all use of University computer and network resources, as well as to the use and distribution of information.
Access to Marywood’s computer systems is a privilege, not a right. When individuals use the University's computer system, they become responsible for adhering to University policy and to state and federal laws governing individual privacy rights and confidentiality.
The following list of conditions and responsibilities is not all-inclusive:
Access to computers
Marywood University administrators, faculty members, staff, and students may use the computers in all public computing facilities for research work and classroom assignments.
Marywood students have priority in the use of computers in public facilities and in unscheduled computer labs. Anyone who is not currently an enrolled student or an employee may use the public facilities only at the discretion of University staff.
• Marywood University does not assume any liability for data
loss. Those who use its computers do so at their own risk.
• Use of administrative computers is restricted to the
personnel who are authorized to use them.
• Use of University-owned or operated computers for personal
gain or profit is not permitted.
• The civil rights of others must be respected. Programs,
transactions, data or other processes that harass other
people may not be used.
• Pornographic or other materials that violate Marywood’s
Mission Statement and Core Values may not be opened
or downloaded using University systems.
• Users should avoid unnecessary printing and long file/data
• Food and drink are not permitted in computer labs, drop-in
areas, near computers and equipment.
• Users should not damage or alter equipment physically or
• Users should not move equipment (e.g., computers or
printers) from their installed locations without authorization
from the Office of Information Technology.
Access to information sources/databases and installed software packages
Individuals may use the University network to connect to information sources and databases provided by Marywood (e.g., library databases) or on the Internet. University-owned computers have installed software in accordance with the purpose or primary audience served by those computers. Employees will be provided with applications appropriate to their jobs. Laboratory computers will have software used by adjacent academic departments.
• Users are required to honor intellectual property right of
others by avoiding copyright infringement.
• The policies and procedures of external networks, databases
and information sources must be respected.
• Software must be used in full accord with license agreements
and with national and international laws. Use of
unauthorized copies of software is not permitted. Users may
not damage or alter installed software.
• Users may not load unauthorized software onto University
Instructional uses of technology and computer labs
Classes are, at times, scheduled in computer labs. Many classrooms are equipped with computer systems. Other facilities, such as the broadcast studio, are technologically oriented. Instructors may require some level of computer use in or out of the classroom.
• Students must abide by an instructor’s requirements for
computer use, including participation in online course
systems, discussion forums, etc.
• Students must honor an instructor’s right to allow or disallow
the use of computers or communication devices while the
room is in use for instructional purposes.
• Faculty members have the right to limit access to enrolled
members of a specific class for the scheduled class time.
Use of password protected accounts/privileged information
Students, faculty, staff and administrators are provided with password protected accounts to access e-mail, Marywood’s network, and various information systems related to their roles at the University.
• Users are responsible to secure their usernames and
passwords. Rights to individual accounts are not
transferrable; users should only access their own accounts.
Passwords should be treated as confidential Marywood
• Users should respect the privacy of other users. They
should not attempt to access others’ accounts or to
bypass any security system to access privileged information.
• Users should not develop or use mechanisms to infiltrate
Marywood systems, to alter interfaces, tamper with data, or
alter University records.
• Users should not send inappropriate or sexually harassing
messages or graphics by e-mail, social media or other
• Employees of the University with access to privileged
information should access and use that information only
in relation to their professional roles.
Marywood University reserves the right to monitor and record any action performed on its computer systems and to investigate suspected violations of this policy. The University reserves the right to examine Marywood-owned computers and their contents and to report suspected criminal activities to civil authorities. Institutional disciplinary charges may be filed in addition to civil actions. User accounts and access to services may be suspended during an investigation.
Security for information stored on Marywood’s administrative system is provided by the Office of Information Technology in accordance with its Campus Information Technology Security Policy.
The University does not guarantee privacy of e-mail messages and other user activity done using its computer systems.
Contact the Office of Information Technology with questions about