future students
current students
alumnae
parents
faculty
ursuline college
Ursuline Athletics @Ursulinearrows   Junior Rachael Albright was UC's top performer. She took eighth of 147 participants at the Orange and Black Classic.
Apply for Ursuline Login

By completing this application you are stating that you have read and will follow the College's Acceptable Use Policy as stated here:


General Principles

Access to computer systems and networks owned or operated by Ursuline College imposes certain responsibilities and obligations granted only to current Ursuline College students and employees and is subject to college policies, and local, state, and federal laws. Acceptable use always is ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals' rights to privacy and to freedom from intimidation and harassment.


Guidelines

In making acceptable use of resources you must:
  • use resources only for authorized purposes
  • protect your userid and system from unauthorized use. You are responsible for all activities on your userid or that originate from your system
  • access only information that is your own, that is publicly available, or to which you have been given authorized access
  • use only legal versions of copyrighted software, movies, music, games, and the like in compliance with vendor or publisher license requirements
  • be considerate in your use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, degrading services, or wasting computer time, connect time, disk space, printer paper, manuals, or other resources
In making acceptable use of resources you must not:
  • use another person's userid and/or password with or without permission
  • use another person's system, files, or data without permission
  • use computer programs to decode passwords or access control information
  • attempt to circumvent or subvert system or network security measures
  • engage in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files or making unauthorized modifications to college data
  • use college systems for commercial or partisan political purposes, such as using electronic mail to circulate advertising for products or for political candidates
  • make or use illegal copies of copyrighted software, movies, music, games, and the like, store such copies on college systems, or transmit them over college networks
  • use mail or messaging services to harass or intimidate another person, for example, by broadcasting unsolicited messages, by repeatedly sending unwanted mail, or by using someone else's name or userid
  • waste computing resources or network resources, for example, by intentionally placing a program in an endless loop, printing excessive amounts of paper, or by sending chain letters or unsolicited mass mailings
  • use the college's systems or networks for personal gain; for example, by selling access to your userid or to college systems or networks, or by performing work for profit with college resources in a manner not authorized by the college
  • engage in any other activity that does not comply with the General Principles presented above


Enforcement

The college considers any violation of acceptable use principles or guidelines to be a serious offense and reserves the right to copy and examine any files or information resident on college systems allegedly related to unacceptable use, and to protect its network from systems and events that threaten or degrade operations. Violators are subject to disciplinary action as prescribed in the Code of Conduct, the College Student Handbook and College Employee Handbook. Offenders also may be prosecuted under laws including (but not limited to) the Communications Act of 1934 (amended), the Family Educational Rights and Privacy Act of 1974, the Computer Fraud and Abuse Act of 1986, The Computer Virus Eradication Act of 1989, Interstate Transportation of Stolen Property and the Electronic Communications Privacy Act. Access to the text of these laws is available through the Besse Library Reference Department.


Information Disclaimer

Individuals using computer systems owned by Ursuline College do so subject to applicable laws and College policies. Ursuline College disclaims any responsibility and/or warranties for information and materials residing on non-college systems or available over publicly accessible networks. Such materials do not necessarily reflect the attitudes, opinions or values of Ursuline College, its faculty, staff, or students. These guidelines should not be construed as a limit on any individual's right under the constitutions of the United States or the State of Ohio.


NOTE: New Students, you must have actually registered for class before you are eligible to apply for your login.




Personal Information




Status




For Students










For Faculty & Staff







Comments