Information Technology

Computer-Network Guiding Principles

Computer use on PUC’s campus must be aligned with the school’s mission to promote a Christian education emphasizing service and personal integrity.  This document presents a set of guiding principles that influence the choices and specifics contained in PUC’s IT Use Policy.

  1. PUC is an educational institution, and the most important role of its IT system is to promote and support that purpose.  However, PUC is also home for resident students, and using the campus IT system for appropriate personal use is permitted. 
    • Academic and administrative uses have the highest priority.
    • Reasonable personal use is permitted. The campus bandwidth is shared among many users so you may not experience the same high-speed Internet connection as you might in a single dwelling.
    • The campus system cannot be used to host a commercial venture.
  2. One way to serve others is to share as a family.  In the context of Internet use on campus, this means one user will not monopolize bandwidth at the expense of the computing experience of others.  Often a simple choice can avoid an unnecessary use of bandwidth. 
    • Streaming audio or video content over the Internet uses a large amount of bandwidth, while listening to a CD or MP3 player or watching a DVD uses none. 
    • Watching video content over the Internet in a group of 5 people uses 1/5 the bandwidth that is used if all 5 persons watch individually.
  3. The Apostle Paul advises us to dwell on things that are noble and pure (Philippians 4:8).  Even though the Internet provides easy access to material that is just the opposite, we should avoid it.  It is not appropriate to use PUC’s IT system to
    • access pornographic material,
    • view or promote violent content, or
    • spread hateful or disrespectful messages about any person or group.
  4. Principles of personal integrity dictate that users will respect the rights and privacy of others by
    • not attempting to access another person’s computer files or passwords; and
    • not logging in as another person on the network to gain unauthorized access. 
  5. Principles of academic integrity tell us that the Internet should not be used
    • to purchase term papers or essays to be submitted as our own work, or
    • to plagiarize material found on Web sites.  Appropriate credit should always be given for the sources of information.
  6. Principles of integrity also demand that we respect the property rights of copyright owners and software vendors by
    • avoiding the illegal copying or sharing of software, music, or videos; and
    • avoiding using pirated software.
  7. Excessive or compulsive use of computer games can have a detrimental effect on our study habits, relationships, and health. 
    • Games without sex and violence can still be addictive time-wasters. 
    • The game-playing behavior of one person can influence another to become involved, to their detriment. 
    • Resources are available in the Counseling Center to help you cope with problems of addictive computer use. 
  8. Safety must be a concern for all. 
    • Keep your passwords private. 
    • Don’t respond to phishing scams that attempt to obtain your personal identifying information. 
    • Don’t send anything by email that you wouldn’t want to become public information.  Remember, information in an email is no more secure than a message written on a postcard.
    • Be cautious in the use of social networking sites (e.g., Facebook, Twitter).  Avoid posting information that shows you in a bad light.  Remember, once information is posted for one person to see, it can become available for everyone to see, far into the future.
  9. It is not ethical to use PUC’s IT system in a way that casts PUC in a negative light.
    • PUC supports the principles of free speech, but it is not ethical to use college resources to criticize the college. 

There is technology available to filter content, monitor usage, and manage bandwidth, and some of this is in use at PUC.  However, we encourage responsible and appropriate use of the IT system as the best solution to the problems listed above.