University Information Technologies

The Office of Information Technologies (UNIT) maintains a variety of policies governing the use of University computing and communication resources. Every member of the University community is bound by these policies and is expected to be thoroughly familiar with them. Persons found in violation of these policies will be subject to the full range of disciplinary sanctions, up to and including expulsion. In order to retain necessary flexibility in administration of policies, the University reserves the right to interpret, revise, or delete any of the provisions of these policies, as the University deems appropriate in its discretion. All changes in policy are approved by appropriate governing bodies of the University prior to publication.

Complete copies of all University Information Technology policies are available in the Villanova Policy Library to include, but not limited to: copyright infringement and illegal file sharing; email policy; use of computing and information resources; and web policy.

  1. Misuse of IT systems may include but is not limited to:
    • Unauthorized entry into a voice/email mailbox.
    • Unauthorized use of another individual's username or password.
    • Sharing of University-provided username or password with other faculty, staff, students or individuals.
    • Use of University telephone/email/Internet to send abusive, harassing or obscene messages
    • Use of browsers or programs to hide or change your network address in an attempt to create privacy while connected to the University network or resource.
    • Use of personal routers (wired or wireless).
    • Probing or scanning the University network or attempting to cause a denial of service.
    • Consumption of a disproportionate amount of network bandwidth.
    • Attempting to connect to systems where access has not been authorized.
    • Accessing personal information of others without authorization.
  2. Students are responsible to maintain the security of their personal computers including updating the device with security patches and updating installed software to mitigate vulnerabilities.