Summer Academic Institute at Harding University
Permission for Access to Harding University Computer Resources for Students
Acknowledgment of Responsibilities and Consequences, Acknowledgment of Rules,
Release of Liability and Indemnification
Full HU Information Systems and Technology Policies are posted at
Permission for Access to Harding University Computer Resources. In consideration of the
undersigned student participating in the Summer Academic Institute at Harding University, the
parent or guardian of the undersigned STUDENT (STUDENT or you) grants permission to Harding
University to grant access to the university computer resources for students (computer resources)
to STUDENT according to its computer use policies and procedures and the rules outlined in this
Acknowledgment of Responsibilities and Consequences. The undersigned parent or guardian
of STUDENT, acknowledges that he or she has fully discussed with STUDENT the responsibilities
and consequences of having access of the computer resources. The STUDENT has indicated to me
he or she fully understands his or her responsibilities of having access to the computer resources
and the consequences for failing to comply with the rules.
Acknowledgment of Rules. In addition to the standard of conduct for students and the policies
and rules of the Office of Information Services of Harding University, listed below are the most
important and most misunderstood rules about using the computer resources. These rules apply
to any student using such resources. Learn these rules so that you don’t get into trouble. Please
read these rules carefully.
1. You may not use any University-provided computer resources to access pornography,
gambling, wagering, vulgarity, profanity, racially or ethnically offensive language or offensive
2. The computing resources exist to complement the educational mission of the University and
must be used appropriately. You have the obligation to ensure you are utilizing the computing
resources (including all University equipment, networks, user accounts, Ethernet connections) in
accordance with University policy and applicable laws and rules outlined in this instrument.
3. If you have a question about whether a specific use of computing or networking resources is
legal or appropriate, send e-mail to email@example.com and ask before you begin to use it for that
4. You are the only person who can use a computing resource the University has provided
specifically for your use.
5. You may not be paid, or otherwise profit, from the use of the computing resources or from
any output produced using it. Further, you may not promote any commercial activity using the
computer resources. For example:
You may not post advertisements You may not post “chain letters”
6. Use computer resources appropriately. Do not interfere with the activities of others or use a
disproportionate share of computer resources. Send messages only to those who may be
interested in the content. Examples of inappropriate use of computer resources are shown below.
These actions frequently result in complaints and subsequent disciplinary action.
Summer Academic Institute Release - Page 1 of 2 (over)