ITS Acceptable Use Policy

All students are responsible for reviewing the policies and procedure that govern the use of technology at Franciscan University.  The “ITS Acceptable Use Policy for Students” is available on MyFranciscan on the “ITS Help” tab under the “Policies” heading. 

Franciscan University of Steubenville assumes NO responsibility for costs associated with loss or damage to a student’s personal computer, software, data and its associated peripheral equipment.

Franciscan University of Steubenville urges all students to follow these policies and to conduct themselves within the framework of the University’s Mission Statement.

Internet and Email Safety

Students shall take full responsibility for every message they transmit through the University’s computers and network facilities. No one shall use the University’s network to transmit fraudulent, defamatory, harassing, obscene, indecent, abusive, lewd, threatening, or otherwise immoral messages or images, or any communications prohibited by law or any communication which violate the Code of Student Conduct, University practice, University policy, or the spirit of the University's mission.

Viewing, accessing, printing, or distributing indecent, obscene, or pornographic materials using University equipment, network, or internet access is strictly prohibited.

Students enrolled at Franciscan University of Steubenville are to practice safe internet browsing and email behavior that will lower the risk associated with viruses, worms, spyware, copyright infringement, etc. Internet browsing and email behavior will also be regulated and monitored to ensure compliance.

The use of social networking (Facebook, Twitter, etc.) is permitted of students on the University’s network; however, students must be vigilant and exercise safe browsing practices when using these sites as they are often prime targets for malware (viruses, spyware, trojans, etc). Quick tips include never clicking on suspicious links or offers that seem too good to be true, never sharing personal information without verifying the identity of the party requesting it, and the use of common sense.

Students shall not attempt to read, alter, or delete anyone’s email other than their own.

Students shall never open up attached email items that appear to be related to spam. Students should alert the Information Technology Services (ITS) in the event they receive a suspicious email that appears to be spam.

Spam messages are generally from email addresses that you would not recognize. Spam messages also typically offer something to get your attention that is too good to be true. If something sounds too good to be true, it generally is. If you believe a message is spam, never respond to it.

Occasionally you may receive emails from outside companies or other universities that request information about your email account. Often they ask for the following:

First and Last Name

Full Login Email



Current Password

Although the email may appear to be official and appear to come from a legitimate site, in most circumstances it is fraudulent. This kind of spam is known as “phishing.” It’s a method used to gain access to your email account(s) to acquire personal and financial information about you. Never give out this kind of information to anyone. This not only applies to your Franciscan email account, but also to any personal email accounts you use.

If you do receive an email such as this, delete it. Do not reply or forward it to anyone.  Do not click on any link that it directs you to. If you have provided this kind of information from your Franciscan email account, please contact the Help Desk.

Students shall not share personally identifiable information about other students unless authorized explicitly by the owner of that information or the ITS.

Students shall not use file sharing or peer-to-peer programs to illegally download or retrieve or share files. Please review the addendum to the Higher Education Opportunity Act of 2008 (HEOA).

Students shall not copy or install software that is in violation of any copyright laws.  If there is any question all students are urged to call the ITS.

PC Security and Safety

Students should ensure that their computers are configured with the hardware and software specifications recommended by the ITS.

Students shall never use Franciscan University's administrative network/computer resources without proper authorization. Students are prohibited from connecting their computers to the University's administrative network. Students are only permitted to access the internet using the Residential Network (RESNet). Students shall not misrepresent his or her identity or relationship to the University for the purpose of obtaining or using computer, server or network privileges and/or services.

Students shall never knowingly endanger, or attempt to endanger, the security of any University computer, server or network facility, nor willfully interfere with others’ authorized computer usage.

Students shall never use the University’s communication facilities to harass, attempt unauthorized use, nor to interfere with others’ legitimate use, of any computer, server or network facility anywhere.

Permission to physically connect or attempt to connect a computer or network device (router, switch, access point, etc.) to any of the University’s networks must be done in conjunction with the University’s Information Technology Services (ITS). Students are permitted to connect one computer to the student residential network in accordance with ITS policy. Acceptable devices that are supported by the University are as follows:


Due to the proliferation of the different personal and mobile devices, the University is not always in the position to support newer devices. The following devices can be connected to the network but are not supported by the University:

Smart Phones


Tablet PCs

e-readers (Kindles, Nooks, etc.)

Printers and print sharing devices that use either Bluetooth or InfraRed only

The following devices are prohibited from being connected to the University’s network:

Gaming consoles

Sling boxes


Servers (DNS, FTP, File, Web, Data Base, email, etc.)


Access points

Students shall place confidential information onto University systems at their own risk. The University cannot guarantee the privacy of computer files, electronic mail, or other information by computer, whose confidentiality is not otherwise mandated by law.

Students shall not use University computers for unauthorized games, chat rooms, or other recreational sites for personal interest. Students are prohibited from installing personal software on University-owned PCs. Faculty-assigned games and chat rooms to teach particular concepts can be used with prior coordinated authorization from the Manager of User Support Services and the faculty member.

Students shall never share any passwords with another individual inside or outside of the University. In addition, students shall never write down their passwords.

Students shall select passwords that are strong in nature. Strong passwords have the following characteristics:

Are at least eight characters long.

Do not contain your user name, real name, or school name.

Do not contain a complete dictionary word.

Are significantly different from previous passwords. Passwords that increment (Password1, Password2, Password3 ...) are not strong.

Contain characters from each of the following four groups: uppercase letters, lowercase letters, numerals, and symbols.

Are changed at least every 90 days.

Students shall never attempt to modify or disrupt the configuration or operation of University software or hardware. This includes automatic system updates, anti-virus scans, personal firewall settings, or any other process initiated by the ITS.

Students are to have anti-malware (anti-spyware and anti-virus) application systems installed on their systems.

The anti-malware application system is to receive updated virus and malware definitions and application updates on a regular basis or as soon as they come available from the vendor. The anti-malware application system is to be configured to fully scan the student’s computer on a regular basis for known malware.

Network Security and Safety

Students may not modify or tamper with any University-owned network wiring, wall faceplates, or network devices. Students who do not follow this policy will be properly disciplined by the Student Affairs Office and be assessed a fee based on time and materials for the repair of any damage to University resources.

Students are prohibited from setting up their computers to be used as DHCP, DNS, File Sharing, WEB or FTP servers. Computers cannot be set up to act as a bridge, a router, or a gateway.

Students are prohibited from attaching more than one computer at a time to the network.

Students are prohibited from setting up an additional network in their rooms by attaching a wireless access point, a hub, switch or router to the network.

Peer-to-peer file sharing software, such as, but not limited to, Kazaa, Morpheus, Gnutella, etc. is prohibited. This software should be disabled or uninstalled. If a student is found to be using this software, the Office of Information Technology (OIT) will document the use, and then shut down that student’s port. If students find that their port is inactive, they must call the Help Desk (740.283.4357) to report the problem. If OIT determines that the port was shut off due to an infraction based upon OIT’s polices the student will be instructed on how to resolve the problem. Once the problem is resolved to OIT’s satisfaction, the port will be enabled. Repeat offenders will be reported to Student Life and subsequently permanently disconnected from the network.

Under no circumstances will students be permitted to use their network connection or computing privileges for commercial purposes. Students may not advertise any commercial products. Students found to be using their connection for commercial use will be disconnected from the network and subject to discipline under appropriate University policies.

Addendum to The Higher Education Opportunity Act Regarding Copyright Infringement and File Sharing

The Higher Education Opportunity Act of 2008 (HEOA) added provisions to the Higher Education Act of 1965 (HEA), as amended, requiring institutions to take steps to combat the unauthorized distribution of copyrighted materials through illegal downloading or peer-to-peer distribution of intellectual property. These requirements were effective upon enactment of the HEOA, August 14, 2008. On October 29, 2009, the Department published final regulations implementing the statutory requirements (74 FR 55902). These regulations are effective July 1, 2010.

Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.

Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or "statutory" damages affixed at not less than $750 and not more than $30,000 per work infringed. For "willful" infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys' fees. For details, see Title 17, United States Code, Sections 504, 505.

Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense.

All damages and penalties will be taken against those individuals who engage in illegal downloading or unauthorized distribution of copyrighted materials using the University's network. Franciscan University of Steubenville will not assume any responsibility regarding damage and penalties for individuals who engage in illegal downloading or unauthorized distribution of copyrighted materials using the University's network.

For more information, please see the Web site of the U.S. Copyright Office at, especially their FAQ's at