Summer Academic Institute at Harding University
Permission for Access to Harding University Computer Resources for Students
Acknowledgment of Responsibilities and Consequences, Acknowledgment of Rules,
Release of Liability and Indemnification
Full HU Information Systems and Technology Policies are posted at
https://www.harding.edu/ist/useofist
Permission for Access to Harding University Computer Resources. In consideration of the
undersigned student participating in the Summer Academic Institute at Harding University, the
parent or guardian of the undersigned STUDENT (STUDENT or you) grants permission to Harding
University to grant access to the university computer resources for students (computer resources)
to STUDENT according to its computer use policies and procedures and the rules outlined in this
instrument.
Acknowledgment of Responsibilities and Consequences. The undersigned parent or guardian
of STUDENT, acknowledges that he or she has fully discussed with STUDENT the responsibilities
and consequences of having access of the computer resources. The STUDENT has indicated to me
he or she fully understands his or her responsibilities of having access to the computer resources
and the consequences for failing to comply with the rules.
Acknowledgment of Rules. In addition to the standard of conduct for students and the policies
and rules of the Office of Information Services of Harding University, listed below are the most
important and most misunderstood rules about using the computer resources. These rules apply
to any student using such resources. Learn these rules so that you don’t get into trouble. Please
read these rules carefully.
1. You may not use any University-provided computer resources to access pornography,
gambling, wagering, vulgarity, profanity, racially or ethnically offensive language or offensive
symbols.
2. The computing resources exist to complement the educational mission of the University and
must be used appropriately. You have the obligation to ensure you are utilizing the computing
resources (including all University equipment, networks, user accounts, Ethernet connections) in
accordance with University policy and applicable laws and rules outlined in this instrument.
3. If you have a question about whether a specific use of computing or networking resources is
legal or appropriate, send e-mail to sai@harding.edu and ask before you begin to use it for that
purpose.
4. You are the only person who can use a computing resource the University has provided
specifically for your use.
5. You may not be paid, or otherwise profit, from the use of the computing resources or from
any output produced using it. Further, you may not promote any commercial activity using the
computer resources. For example:
You may not post advertisements You may not post “chain letters”
6. Use computer resources appropriately. Do not interfere with the activities of others or use a
disproportionate share of computer resources. Send messages only to those who may be
interested in the content. Examples of inappropriate use of computer resources are shown below.
These actions frequently result in complaints and subsequent disciplinary action.
Summer Academic Institute Release - Page 1 of 2 (over)
Sending a message at random to a large number of news groups or recipients (known as
“spamming the network”).
Attempting to inconvenience someone by sending a large number of messages
(commonly referred to as a “mail bomb”).
Deliberately causing any denial of services, including flooding or ICMP attacks (“ping
attacks”).
Excessively controlling a chat channel by such actions as kicking off or blocking other
users.
7. Never try to circumvent login procedures on the computer resources or otherwise gain access
where you are not allowed. This is not acceptable under any circumstances and can result in
serious consequences, including disciplinary action by the Office of the Dean of Student Services
or the Provost’s Office.
Release of Liability. In consideration of being permitted to participate in the Summer
Academic Institute at Harding University, STUDENT, by and through his or her parent or guardian,
and the parent or guardian, in full recognition and appreciation of the risks to which STUDENT
may be exposed during access to the computer resources, do hereby agree to assume all risks,
and responsibilities surrounding my participation in using such computer resources and any
independent activities undertaken adjunct thereto.
Indemnification. STUDENT, by and through his or her parent or guardian do for
STUDENT’S heirs and personal representatives, hereby defend, hold harmless, indemnify and
release and forever discharge, Harding University, Inc., and all its trustees, officers, agents and
employees from and against any and all claims, demands and actions, or causes of action, which
may result from STUDENT’S access to the computer resources described in this instrument.
STUDENT’S parent or guardian do for their respective heirs and personal representatives hereby
defend, hold harmless, indemnify and release and forever discharge, Harding University, Inc.,
and all its trustees, officers, agents and employees from and against any and all claims, demands
and actions, or causes of action, which may result from STUDENT’S access to the computer
resources described in this instrument.
________________________________ ____________________________________
Signature of STUDENT over age 18 SSN or Harding ID of STUDENT
________________________________ ____________________________________
Printed name of STUDENT Address
____________________________________
City, State, Zip code
_________________________________ ____________________________________
Signature of Parent or Guardian Date of Signing
of STUDENT, if STUDENT is under
18 years of age
Summer Academic Institute Release - Page 2 of 2
click to sign
signature
click to edit
click to sign
signature
click to edit
Chrome Web Store
It looks like you haven't installed the Fill Chrome Extension Add to Chrome