Technology Policy


These guidelines set forth standards for responsible and acceptable use of computing resources in AJU’s Residence Complex and Campus facilities. Authorized users of computer labs shall, by virtue of their use of computer resources, agree to be bound by these guidelines. These policies will be posted on the University’s Website.

  1. Authorized Users: AJU computer resources are an exclusive service for:
    1. Students, faculty, staff and residents of American Jewish University
    2. Library - University’s library users
    3. Registered guests in the Residence Hall Complex. Liability for the use of computing resources by a resident’s personal guests rests with the resident who hosts the guest.
  2. Computing Resources:
    "Computing Resources" include, but are not limited to: computer time; data processing or storage functions; computers; computer systems; servers, networks and their input and output and connecting devices; and any related programs, software and documentation; accessories (printers, mice, etc.); or the wireless system.
  3. General Policy:
    1. All computer users have the responsibility to use the university’s computer systems in an effective, efficient, ethical and lawful manner.
    2. The use of the university’s computer resources is a privilege, not a right. AJU may protect legitimate facilities users by imposing sanctions on users who abuse the privilege.
    3. Computer users shall:
      1. Respect the intended use of accounts established for their use.
      2. Respect the integrity of the university’s residence hall complex computer systems and network.
      3. Respect the privacy of other computer users.
      4. Respect the rules, regulations and procedures governing the use of residence hall complex computing resources.
    4. American Jewish University does not monitor online information on a regular basis and does not keep records of such information. This includes, but is not limited to: blogs, IMs, postings and websites. In special situations, the University may choose to do so.
      Standards of common sense and common decency must be applied in determining what uses are proper when using the public resources of the University.
  4. Data Storage, Security and Privacy:
    1. Close all applications before leaving the workstation (for example, signing off your e-mail account).
    2. Delete from the workstation all files containing private information (personal letters, bank account numbers, etc).
    3. Should you attempt to save files on a computer in the lab, the system is set to automatically delete the files. Users should save their data on personal storage devices.
      AJU has no liability for lost data. AJU has no liability for unauthorized access to private information that was saved on workstations. The maintenance, operation, and security of computing resources require responsible University personnel to monitor and access the system. To the extent possible in the electronic environment and in a public setting, a user's privacy will be preserved. Nevertheless, that privacy is subject to the Access to Public Records Act and other applicable state and federal laws, and the needs of the University to meet its administrative, business, and legal obligations.
  5. Food and Drinks:
    1. No food or drinks are allowed in the main campus computer lab
    2. In Lee and Rochlin computer labs: no food or drink is permitted in these rooms.
    3. In Keefer computer lab: no eating or drinking is permitted by the computers. No food or drinks is permitted on the computer desks.
  6. Printers and Printer Server:
    1. The user will provide printing paper.
    2. User will use new printing paper only. Re-using printing papers is forbidden.
    3. Printer troubleshooting will be done by Campus Technology Department staff only. In any case, users may not open the printer (for example: cartridge replacement, taking out stuck paper etc.)
    4. Users may not turn printers off.
    5. Access to printer servers is limited to system administrators
  7. Accessories:
    Accessories are any equipment that is not the computer itself (mice, keyboard, printer, chair, etc). Maintaining, replacing, and fixing computer accessories will be done by Campus Technology Department only.
    1. Users may not replace or change accessories among the computers
    2. Users may not use computer accessories outside of the computer labs (including chairs).
  8. Wireless Network:
    See Wireless Network Policy.
  9. Game Playing:
    Game playing is not permitted when other users are waiting for a workstation or if it disrupts the work of others.
  10. Conduct:
    The following provisions describe conduct prohibited under these guidelines:
    1. Altering system software or hardware configurations without authorization (including default homepages), or disrupting or interfering with the delivery or administration of computer resources;
    2. Attempting to access or accessing another's account, private files, or e-mail without the owner's permission;
    3. Installing, copying, distributing, or using software in violation of: copyright and/or software agreements; applicable state and federal laws;
    4. Using computing resources to engage in conduct that interferes with others' use of shared computer resources and/or the activities of other users, including studying, teaching, research, and University administration;
    5. Using computing resources for commercial or profit-making purposes without written authorization from the University;
    6. Failing to adhere to system policies, procedures, and protocols;
    7. Allowing access to computer resources by unauthorized users;
    8. Using computer resources for illegal activities. Criminal and illegal use may include obscenity, child pornography, threats, harassment, copyright infringement, defamation, theft, and unauthorized access;
    9. Access or attempts to gain access to university system computing facilities for any unauthorized purpose, including attempts to obtain, modify, or destroy information or degrade performance, is forbidden;
    10. Users shall not infringe on the intellectual property rights of others.
  11. Violation:
    Violation of these guidelines constitutes unacceptable use of computing resources, and may violate other University policies. Suspected or known violations should be reported to the Residence Life Office and violations will be processed by the appropriate University authorities. Violations may result in revocation of computing resource privileges or/and fines.
    1. Every violation is subject to an official complaint letter from the RLO.
    2. Three violations of these guidelines will result in revocation of computing resource privileges for a period of time decided by the head of the Campus Technology Department.
    3. Two violations (or more) of “Food and Drinks” policy will result in a fine of $20.
    4. Missing equipment or equipment that was replaced is subject to a fee: Mouse: $40; Speakers: $40; Keyboard: $50; Monitor: $280; Desktop: $1500; Printer: $800; Printer Cartridge: $300; LAN cable: $30; Router: $200; Omni directional Antenna: $200; Chair: $160.
    5. Any physical damage to computing resources is subject to a fine. The exact fine will be determined by the head of the Campus Technology Department.
    6. In case the responsibility for missing equipment and/or damaged equipment cannot be determined, the fine will be divided between the residents in the building where the computer lab is located.
  12. Contact Information:
    1. Questions regarding the Guidelines for the Acceptable Use of Computing Resources should be directed to Campus Technology Department or via e-mail to 
    2. Questions regarding Residence Hall Rules should be directed to the Residence Life Office or via e-mail to


This is a deployment guide for wireless networking at American Jewish University to ensure reliable, compatible, and secure operations. By virtue of using the wireless network, the user agrees to be bound by this policy. This policy will be posted on the University’s website

  1. AJU Campus Technology Department will be the sole provider of design, specification, installation, operation, maintenance, and management services for all wireless Access Points.
  2. Wireless network users may not install or operate WLAN (Wireless Local Area Network) Access Points on the university’s property.
  3. AJU is responsible for the Access Point and the wired network to which it is attached.
  4. Individual users will be responsible for all costs associated with purchase, installation, operation, and support of wireless adapters in client computers.
  5. Residence Life Complex: The wireless network was tested and designed to serve the dorm buildings only. Apartment residents who choose to use the network services, do so on their own responsibility. Reception rates in different dorm rooms will not be considered by the RLO when assigning rooms to residents.
  6. To ensure an efficient use of the wireless network, the University may block certain ports and protocols. This includes but is not limited to: certain online services, IM and file sharing.
  7. Network connections are a shared resource. Users should ensure their network use does not generate an inordinate amount of traffic or adversely affect others. While Web browsers and sending/receiving electronic mail seldom cause problems, users who use services such as file transfer protocol (ftp) sites should ensure their systems do not adversely affect the entire network.
    1. Wireless network users shall:
      1. Respect the integrity of the University computer systems and network.
      2. Respect the privacy of other computer users.
      3. Respect the rules, regulation and procedures governing in Wireless Network Policy.
    2. Unacceptable uses - you may not perform these activities:
      1. Examine, alter, or attempt to examine/alter another computer user's private files or electronic communications without authorization;
      2. harass or interfere with other University computer users;
      3. use software that overloads the network;
      4. connect unauthorized electronic equipment to the network;
      5. connect equipment to the network in an unauthorized fashion;
      6. knowingly transmit viruses.
    3. Non-Confidentiality:
      The University recognizes that users might believe computer files and e-mail messages are confidential; however, such files and messages are subject to the access by Computer Services of user’s files at systems maintenance times as well as when there is a report of suspected unlawful or improper activities. User's files are not confidential. The University reserves the right to review all information on any University server or network.
    4. Security and Privacy:
      It is important to notice that while using network services the information on the user’s computer is exposed to the rest of other network users. AJU will not be responsible for any damage for personal computer/files or for violation of privacy rights conducted by other users. Each user will be responsible to protect and secure his personal computer and data.
    5. The use of the university’s wireless network is a privilege, not a right. AJU may protect legitimate facilities users by imposing sanctions on users who abuse this privilege.
    6. Improper use of the wireless network or on purpose damage to the wireless network will result in temporary or permanent discontinuance of wireless network services by AJU. In this case, AJU will have no responsibility to compensate users for network adapters they purchased.


The Electronic Mail Policy clarifies the applicability of law and of other University policies to electronic mail (e-mail), and also sets forth new policies uniquely applicable to e-mail. The University recognizes that principles of academic freedom, freedom of speech, privacy, and confidentiality hold important implications for e-mail and e-mail services. This policy addresses these principles within the context of and subject to the limitations imposed by the University's legal and policy obligations.

All students are required to have and regularly check AJU e-mail accounts. Students may set up university e-mail through the library or campus technology department. Malicious use of e-mail is prohibited and may be considered an Honor Code violation and/or harassment.

E-mail is an efficient and environmentally sound method of communication. Students will be held accountable for all information in e-mails sent by university officials.

The purpose of the Electronic Mail Policy is to assure that the AJU community will use e-mail in an ethical and considerate manner. Acceptable use of e-mail is based on common sense, common decency, and civility applied to the electronic communications environment. This policy applies to all students, faculty, staff, and individuals employed at American Jewish University. The policy applies to the use of all University’s e-mail groups (everyone, CAS, faculty etc.) and the use of printed e-mail addresses provided by the University. Violations of this policy will result in loss of e-mail privileges at the University, disciplinary action, or legal action where applicable.

  1. AJU e-mail service is for the exclusive use of the currently enrolled student, faculty member, staff member, or approved affiliate of American Jewish University requesting the service (the user). The user is responsible for all use of their registered service.
  2. Authorized users of AJU e-mail services shall, by virtue of their use of such services, agree to be bound by the AJU e-mail policy. The AJU e-mail policy will be posted on the Web and the e-mail system manager will electronically communicate the URLs for these policies to each e-mail account, at least annually. However, any failure to communicate will not affect the application of such policies to all users of AJU e-mail services as provided in the AJU e-mail policy.
  3. If the user withdraws from American Jewish University, or if the user's employment is terminated, Academic Computing Services will disable and eventually delete his or her AJU e-mail service.
  4. The user is responsible for making backup copies of any data he or she wishes to protect. No file restores will be performed except for recovery after central computing system hardware or software failure.
  5. E-mails to everyone@aju.eduare filtered by the system administrator based on his/her discretion. Examples for blocked e-mails are: political materials, harassment, abusive or offensive material to or about others, etc.
  6. E-mailing to AJU’s lists (faculty, CAS etc.) is possible for users in the list and only from AJU’s e-mail system (for example: to e-mail CAS@aju.eduthe user has to be listed in CAS and e-mail from AJU e-mail system.)
  7. The University does not routinely monitor or screen e-mail. However, complete confidentiality or privacy of e-mail cannot be guaranteed. Confidentiality cannot be guaranteed because of the nature of the medium, the need for authorized staff to maintain e-mail systems, and the University's accountability as a public institution, as well as in instances involving the health or safety of people or property; violations of University codes of conduct, regulations, policies, or law; or other legal responsibilities or obligations of the University.

Unacceptable uses include, but are not limited to, the following:

  1. Using e-mail for any purpose that violates federal or state laws.
  2. Sending patently inappropriate content. Inappropriate content may include, but is not limited to: harassment, obscenity, intimidating statements or threats, abusive or offensive material to or about others, child pornography, theft.
  3. Transmission of spam email, chain letters, broadcast announcements, general advertisement postings, or any other message via email to a group of persons not requesting the message except when conducting official university business.
  4. Giving the impression that the user is representing, giving opinions, or otherwise making statements on behalf of the University or any unit of the University (including student bodies) unless expressly authorized to do so. Where appropriate, the following explicit disclaimer shall be included: "The opinions or statements expressed herein are my own and should not be taken as a position, opinion, or endorsement of any unit of the University.”
  5. Misrepresenting your identity or using someone else's identity.
  6. Using e-mail for candidate or party fund-raising, advertisements, commercial notices or inquiries such as "Items for Sale" or "Apartments for Rent". Every commercial activity via e-mail must be approved by appropriate supervisory University personnel consistent with applicable policy.
  7. Consciously causing congestion or damage to the network by such things as the propagation of "chain letters," "broadcasting," “bomb letters,” or e-mail suspected as a virus carrier.