ACU Web Publishing Guide: Glossary (part 3 of 3)
| Part 1
| Part 2
| Part 3 | exam
privacy of e-mail
"Don't assume privacy. Be aware that e-mail can be archived
and, under certain circumstances may not be secure. On-line services
and e-mail companies protect the confidentiality of their subscriber's
e-mail, but some companies' internal mail systems are not secure.
There are companies that consider employee e-mail to be company
property and therefore subject to scrutiny. Regardless of
the system you use, e-mail - like conventional mail and phone
records - can be subpoenaed by a court in some situations. Even if
the mail has been deleted, there may still be a backup tape" (Lawrence
J. Magid, "Internet Etiquette").
Self-discipline of speech on the Internet is a matter of
ethical, moral and spiritual maturity. Don't let anyone look down
on you because you are young, but set an example for the believers
in speech, in life, in love, in faith and in purity (1 Timothy 4:12).
publicity, right of
Impersonation of celebrities, use of the entire act of an
entertainer, or use of a persona created by an entertainer without
consent is unlawful.
Questions about ethical or legal use of computing facilities
should be directed to Information Services
or the user's academic department.
Freelancers and the writer's organizations are negotiating
with database services to preserve royalty payments for electronic
duplication of magazine articles and books for authors who retain
Users will respect the reputation of the university and
all persons who are the subjects of messages created by the users.
Do nothing out of selfish ambition or vain conceit, but in humility
consider others better than yourselves. Each of you should look not
only to your own interests, but also to the interests of others (Philippians
From time to time these policies will be revised. Electronic
copies will be posted at http://www.acu.edu/technology/cio/policy.html
, and the latest official copy is available from Information Services.
"Avoid sarcasm, unless you're sure it will work, and think
very carefully before using e-mail to express anger. With e-mail,
once it's sent, it's gone" (Lawrence J. Magid, "Internet Etiquette").
Users must not search for, access, or copy directories,
programs, files, disks or data that does not belong to them unless
they have written authorization.
Online stalking is being defined as repeatedly making online
contact with an unwilling subject. Connecticut has enacted a law
making online stalking a crime, and other states are considering
Succinctness is characteristic of good Internet usage. Consider
the recipient's time.
The university owns information systems for the use of its
faculty, administration, staff and students and includes computers,
computer accounts, microcomputers, printers, networks, software,
electronic mail, video, telephones, telephone long distance and voice
"Exercise good taste. An e-mail account is not a license
to abuse or insult people. Be respectful" (Lawrence J. Magid, "Internet
Torts are civil wrongs or damages of persons or private
property, such as libel and invasion of privacy.
transfer of data
Programs, subroutines and data may not be taken to other
computer sites without written permission unless in the public domain.
Unfair competition is a legal doctrine that imposes civil
penalties upon a party who uses someone else's journalistic work
without adding significant, independent investigation. See "
University-supported computing includes instructional, research
and administrative activities and must not be used for commercial
purposes or monetary gain.
Net Usage Glossary
Users are expected to be familiar with the material in this
Net Usage Glossary.
"Don't cry 'wolf.' Avoid 'Urgent' or 'Priority' unless it
really is. Words in all capital letters are considered shouting
and can be difficult to read. Use them sparingly" (Lawrence J. Magid,
World Wide Web
Academic departments will have responsibility for content
orientation, monitoring and usage.
| Part 1
| Part 2
| Part 3 | exam
Last modified 8/29/99
Questions to James Langford,