Policies and Guidelines

Academic Computing Lab Services

As a user of the Brigham Young University-Hawaii Campus Computer Lab, you have certain rights and responsibilities. This list is subject to revision at any time it is your responsibility to abide by the most current list.

Your rights as a user of the ACLS:

  • A clean and comfortable environment in which to study.
  • Access to functional equipment.
  • Friendly and knowledgeable service.

Your responsibilities as a user of the ACLS:

  • Adhere to the BYU-H Honor and Dress Codes
  • Honor the Rights and Privacy of other users.
  • Use only those accounts which are assigned to you, and protect your account(s)
    from use by others.
  • When the lab is full, non-academic users will be asked to yield their computer
    to waiting academic users.
  • Immediately comply with requests from lab assistants.

The following are NOT allowed in the ACLS:

  • Abuse or harassment of other persons and lab employees.
  • Abuse or unauthorized usage of lab equipment.
  • Food, beverages, gum, or possession of open food containers in the Lab.
  • Possessing, printing, or showing on the screen offensive materials. Including
    pornographic and ALL other forms of offensive materials.
  • Software Piracy (the illegal copying of software).
  • Using and/or installing personal software on lab computers.
  • Wasting lab resources: including printing more than once, using lab resources
    for personal profit, or using lab resources for other than academic work during peak
  • Game playing, except during authorized club activities.

Possible sanctions for violators include:

  • Dismissal from the Academic Computing Lab.
  • Suspension of Lab and/or Network privileges.
  • Referral to the BYU-H Standards Office.

Acceptable Use Policy

Computing/Network Policies and Guidelines

Several BYU-Hawaii policies, Internet guidelines, and state and federal laws govern acceptable use of your network account. You must agree to abide by them to obtain and maintain an account. This document is provided to help you understand the obligations associated with the use of your account.

Authorized Users:

Brigham Young University-Hawaii owns, operates, and maintains a private campus computing network that is not for public use. Network access is restricted to authorized faculty, staff, and students.

Appropriate Use:

BYU-H imposes certain responsibilities and obligations upon users of the campus network.

Users MUST:

  • Use their accounts in an ethical manner and in accordance with the guidelines found
    in the BYU-Hawaii Honor Code.
  • Protect individual accounts and passwords from unauthorized use. (Individual accounts
    and passwords may not be shared with anyone else.)
  • Access only data and files that are owned by the patron, or data and files to which the
    patron has been given explicit authorized access.
  • Use copyrighted material in accordance with copyright law and abide by the provisions
    of any applicable license agreements.

Users must NOT:

  • Use another person's files, system, software or data without permission.
  • Use computer programs to decode passwords or access control information.
  • Attempt to circumvent or subvert system security measures.
  • Knowingly engage in any activity that causes harm to systems or to any information stored
    thereon, such as creating or propagating viruses, disrupting services, or damaging
  • Use BYU-H systems for political purposes (e.g., using electronic mail to circulate advertising
    for political candidates).
  • Make or use illegal copies of copyrighted software, or store or transmit such copies on
    University systems.
  • Use electronic mail or message services to harass, intimidate, or otherwise annoy another
    person (e.g. broadcasting unsolicited messages or sending unwanted mail after being asked
    to stop).
  • Waste computing resources (e.g. excessive printing, or intentionally placing a program in
    an endless loop, etc.).
  • Use the network in a manner not authorized by BYU-H to gain commercial or personal profit
    or advantage (e.g. selling lists of names, addresses, telephone numbers or other information
    generated from University files).
  • Engage in any other activity that does not comply with the "Honor Code" or with the
    principles of The Church of Jesus Christ of Latter-day Saints, (e.g. use the network to
    view, store, or transfer pornography, etc.).


BYU-H considers any violation of Appropriate Use to be a serious offense. BYU-H reserves the right to copy and/or examine any files or information that resides on the network or on BYU-H property that is related to inappropriate use. Violators are subject to disciplinary actions as prescribed by University Policy and may also be prosecuted under applicable local, state, or federal civil or criminal law.