Skip to Main Content
Navigated to SH Use of Technology.

USE OF TECHNOLOGY GUIDE


Access to technology resources at the university is a privilege and must be treated as such by all users. Like any other campus resources, abuse of these privileges can be a cause for campus student conduct procedures and/or legal action. Furthermore, the university reserves the right to extend, limit, or restrict technology privileges and access to information resources. When a student leaves Chaminade University, unless authorization for continued access is obtained in advance or specifically listed below, all university technology privileges will be suspended immediately.

See the Chaminade University Policy Manual II, Section 2.9.1 – 2.9.6.3.4 for details of the university policy concerning the use of technology. Additionally, Section 2.9 specifically prohibits the use of video technology in restrooms, locker rooms, or other situations which would normally be considered public or where users of the facility ma reasonably expect privacy.

Use of Technology to Harass

No student may, under any circumstances, use technology to harass any other person. Examples of harassment by technology include:

  1. Using technology to annoy, harass, terrify, intimidate, threaten, offend, or bother another person by conveying obscene language, pictures, other materials, or threats of bodily harm.

  2. Using technology to contact another person repeatedly to harass or bother, whether or not any actual message is communicated, and/or where no purpose of legitimate communication exists, and where the recipient has expressed a desire for the communication to cease.

  3. Using technology to contact another person repeatedly regarding a matter for which one does not have a legitimate right to communicate, once the recipient has provided reasonable notice that the recipient desires such communication to cease (such as debt collection).

  4. Using technology to disrupt or damage the academic, research, administrative, or related pursuits of another.

  5. Using technology to invade the privacy, academic or otherwise, of another or the threatened invasion of the privacy of another.