Welcome to the
Baldwin Wallace University Network
End-User License Agreement/Terms of Service for Connecting to the BW Wireless Network
Statements of General Policy Baldwin Wallace University provides access to information technologies for the private, non-commercial educational, research, cultural, and recreational uses of its students, faculty, and staff. These same facilities are also used by the College in support of its business functions. Limited access to some of these facilities is also extended, through the World Wide Web, to people outside the College community to the extent that they can exchange e-mail with and view Web pages posted by members of the B-W community. When a conflict arises between these multiple uses, it must be realized that supporting the continued operation of the College in its primary mission - education, must come first. Thus, for a general-use facility, course-related work is the first priority, followed by research and general productivity work, and then by cultural or recreational use. Hence, there may be occasions when recreational users of the Internet may be required to relinquish computer lab stations to students needing those facilities for assignments or research. Baldwin Wallace University also believes that a primary function of colleges and universities is to foster the free investigation and discussion of ideas. Electronic media are rapidly assuming an important role in this endeavor, along with traditional print and broadcast media. The same policies and protections that have governed these established media should be extended as naturally as possible to their new companions. In meeting these goals, Baldwin-Wallace will restrict, control, and edit the content of electronic media as little as is consistent with all state and local laws and College policies. Opinions expressed by members of the B-W community in electronic form shall not be assumed to be those of the institution and responsibility for them lies with the originators. Privacy of Electronic Communications and Data Person-to-person communications, such as e-mail, are considered to be as private as phone conversations. Upload and download of information shall be given the same level of privacy. Neither the College nor its employees will attempt to monitor, read, or distribute the contents of such communications except when required to do so by law or a legal process served upon the College, or in extraordinary circumstances to protect the health and well-being of members of the community or the property or educational mission of the College. The contents of an individual's computer files are to be accorded the same confidentiality as the corresponding non-electronic material in College-owned storage facilities. Thus, a student's computer files should be considered the same as a resident student's papers in the student's dorm room. A faculty member's electronic grade books are to be considered as confidential as traditional paper grade books stored in the faculty member's office desk. However, users of information technology must realize that the College's IT staff may occasionally see the contents of e-mail or stored files in the process of maintaining the computer system. For example, a technician may be required to look at the contents of damaged files in the process of recovering data. Users should also realize that data stored on public or shared network drives or servers, as well as public computers, cannot be protected from view or access. Access to Off-Campus Information The College believes that the scholarly examination of ideas requires access to a very broad body of information and ideas. Any attempt to limit the availability of information to members of the B-W community must be undertaken only with good reason and the widest possible support. Therefore, unless there is a compelling financial reason or community feeling against doing so, the College will provide complete access to the facilities of the Internet, the World Wide Web, and other electronic media. It is realized that one aspect of the nature of these new media is that they are largely uncontrolled. The information found on the Web, for example, is not usually refereed, checked, or censored. The members of the B-W community will need to practice personal evaluation skills to choose what is appropriate from the information found there. Content of Publicly-Available Material Baldwin-Wallace will monitor the official B-W home pages and not the pages of individual students, faculty, or staff. The content of materials posted on electronic facilities at B-W is, therefore, the responsibility of the person posting them, not of the College. It should be noted that some speech (e.g. obscenity, libel) is NOT protected by the First Amendment and that some uses of information (e.g. plagiarism) and some Web activities (e.g. spamming, posting extremely high-activity pages) degrade the performance of the entire system, thus conflicting with the purpose of the facilities. Infractions of the law will be reported to the appropriate authorities and activities that interfere with the mission of the College may result in restricted or discontinued access to the facilities. Members of the B-W community must also realize the nature of some electronic media (a Web site, for instance) is essentially public and that the audience for their electronic communications may well extend beyond the academic community, and they must keep this in mind when regulating the content of their communications. The following disclaimer must be included at the bottom of each faculty, staff, and student home page posted on the B-W Website: The contents of this page are the responsibility of the author and do not necessarily reflect the policies of Baldwin Wallace University. Commercial Use of the Facilities The facilities of the College are not to be used for the direct benefit of non-College organizations or businesses without the express written permission of an officer of the College. This includes the outside business interests of students, faculty, and staff. Members of the B-W community may not offer items or services for sale via B-W-owned Web pages unless all profits from the sales go to a College-sponsored organization. Misuse of the Shared Electronic Facilities Members of the B-W community are expected to refrain from activities which interfere with the proper functioning of the College's computer systems or infringes on the rights of other members to make use of the shared information technology resources. Such activities include, for example: 1. Unauthorized attempt to modify computer equipment or peripherals owned by B-W. 2. Unauthorized attempt to add, delete, or modify software such as operating systems, compilers, utility routines, graphics, games, etc. owned by B-W. 3. Attempted or actual use of accounts, files, or passwords without proper authorization from the owner. 4. Reading, copying, modifying, or deleting private files, including those of students, faculty, staff, or the College's administrative or academic files without proper authorization. 5. Using hardware or software owned by the College to communicate excessive, offensive, or obscene messages to others. 6. Attempting to crash the B-W servers, intranet, or public electronic networks. 7. Violating intellectual property rights or copyrights in data or programs. 8. Destruction, damage, or theft of equipment, software, or data belonging to the College. 9. Giving unauthorized persons access to B-W facilities by divulging passwords. 10. Establishing an individual wireless network on campus or connecting any device (other than a computer) to the network without authorization from the IT Department. 11. Using any B-W computer to duplicate any licensed or copyrighted software (whether owned by the College or not). Disciplinary Procedures - Student Misuse Suspected misuse of the facilities should be reported to the Director of Information Technology (or a member of the IT Staff), who is authorized to determine if there has been a violation of policy or law. Student Consultants, working in the B-W Computer Center, are authorized to monitor and report any violations that occur in the labs. Pending the outcome of the inquiry, access to the shared technology resources may immediately be restricted or suspended. In some cases, limited or monitored access will be provided to the facilities needed for college-related activities such as classes. Except in extraordinary circumstances, the situation will be discussed with the person suspected to have caused the violation to see if a resolution can be made. If not, the matter will be turned over to the appropriate College or public authority. If the misuse seems to involve violations of local, state, or federal law, the appropriate authorities will be informed. If the problem is a violation of College policy or if misuse of the system is reducing the effectiveness of the facilities, the problem will be handled by the appropriate college entity. For specific details of the judicial review and grievance procedures for student violators, please refer to the Student handbook. Disciplinary Procedures - Faculty or Staff Misuse Suspected misuse of the provided technologies (e.g., storing illegal files or using the resources for non-B-W enterprise) will initiate immediate action. This may include suspension or termination of network access, deletion of illegal files, or similar measures as deemed appropriate by an officer of the College. For specific details of subsequent review and grievance procedures, faculty members should refer to the Faculty Handbook and staff members to the Employee Handbook. Copyright 2009 Cloudpath Networks Inc. All Rights Reserved. The XpressConnect software is Copyright 2009 Cloudpath Networks Inc. All rights reserved. This software may not, in whole or in any part, be copied, reproduced, transmitted, translated (into any language, natural or computer), stored in a retrieval system, reduced to any electronic medium or machine readable format, or by any other form or means without prior consent, in writing, from Cloudpath Networks Inc. You are granted a limited license to use this software. The software may be used or copied only in accordance with the terms of that license, which is described in the following paragraphs. TRADEMARKS: XPRESSCONNECT IS A TRADEMARK OF CLOUDPATH NETWORKS INC.. LICENSE: "THE SOFTWARE" SHALL BE TAKEN TO MEAN THE SOFTWARE CONTAINED IN THIS PACKAGE AND ANY SUBEQUENT VERSIONS OR UPGRADES RECEIVED AS A RESULT OF HAVING PURCHASED AND/OR DOWNLOADED THIS PACKAGE. "BUYER" SHALL BE TAKEN AS THE ORIGINAL PURCHASER AND/OR DOWNLOADER OF THE SOFTWARE. BUYER HAS THE NON-EXCLUSIVE RIGHT TO USE THE SOFTWARE ONLY ON A SINGLE COMPUTER. BUYER MAY NOT ELECTRONICALLY TRANSFER THE PROGRAM FROM ONE COMPUTER TO ANOTHER OVER ANY TYPE OF NETWORK. BUYER MAY NOT DISTRIBUTE COPIES OF THE SOFTWARE OR THE ACCOMPANYING DOCUMENTATION TO OTHERS EITHER FOR A FEE OR WITHOUT CHARGE. BUYER MAY NOT MODIFY OR TRANSLATE THE PROGRAM OR DOCUMENTATION. USER MAY NOT DISASSEMBLE THE PROGRAM OR ALLOW IT TO BE DISASSEMBLED INTO ITS CONTITUENT SOURCE CODE. BUYER'S USE OF THE SOFTWARE INDICATES HIS/HER ACCEPTANCE OF THESE TERMS AND CONDITIONS. IF BUYER DOES NOT AGREE TO THESE CONDITIONS, RETURN THE DISTRIBUTION MEDIA, DOCUMENTATION, AND ASSOCIATED MATERIALS TO THE VENDOR FROM WHOM THE SOFTWARE WAS PURCHASED AND/OR DOWNLOADED, AND ERASE THE SOFTWARE FROM ANY AND ALL STORAGE DEVICES UPON WHICH IT MAY HAVE BEEN INSTALLED. THIS LICENSE AGREEMENT SHALL BE GOVERNED BY THE LAWS OF THE UNITED STATES OF AMERICA, STATE OF COLORADO AND SHALL INURE TO THE BENEFIT OF CLOUDPATH NETWORKS INC OR ITS ASSIGNS. DISCLAIMER / LIMITATION OF LIABILITY: BUYER ACKNOWLEDGES THAT THE SOFTWARE MAY NOT BE FREE FROM DEFECTS AND MAY NOT SATISFY ALL OF BUYER'S NEEDS. CLOUDPATH NETWORKS INC WARRANTS ALL MEDIA ON WHICH THE SOFTWARE IS DISTRIBUTED FOR 60 DAYS TO BE FREE FROM DEFECTS IN MATERIALS AND WORKMANSHIP UNDER NORMAL USE. THE SOFTWARE AND ANY ACCOMPANYING WRITTEN MATERIALS ARE LICENSED "AS IS". BUYER'S EXCLUSIVE REMEDY DURING THE WARRANTY PERIOD SHALL CONSIST OF REPLACEMENT OF DISTRIBUTION MEDIA IF DETERMINED TO BE FAULTY. IN NO EVENT WILL CLOUDPATH NETWORKS INC BE LIABLE FOR DIRECT, INDIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGE OR DAMAGES RESULTING FROM LOSS OF USE, OR LOSS OF ANTICIPATED PROFITS RESULTING FROM ANY DEFECT IN THE PROGRAM, EVEN IF IT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SOME LAWS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF IMPLIED WARRANTIES OR LIABILITIES FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATIONS OR EXCLUSION MAY NOT APPLY.v SPECIFIC RESTRICTIONS: IN ACCORDANCE WITH THE COMPUTER SOFTWARE RENTAL ACT OF 1990, THIS SOFTWARE MAY NOT BE RENTED, LENT OR LEASED. THE SOFTWARE AND ACCOMPANYING DOCUMENTATION MAY NOT BE PROVIDED BY A "BACKUP SERVICE" OR ANY OTHER VENDOR WHICH DOES NOT PROVIDE AN ORIGINAL PACKAGE AS COMPOSED BY CLOUDPATH NETWORKS INC, INCLUDING BUT NOT LIMITED TO ALL ORIGINAL DISTRIBUTION MEDIA, DOCUMENTATION, REGISTRATION CARDS, AND INSERTIONS.