Use of Campus Facilities, Vehicles, and Computing Resources
- Access to and Use of Information Technology
- Who can Schedule Events
- Use of Kreig Hall
- Use of Edwards/Dillahunt Softball Field
- Health, Physical, Education, and Recreating Center (HYPERC) Field-Facility Use by Students and Guests
- Use of a University Vehicle - Motor Pool
Access To the Use of Information Technology Services (ITS)
Wittenberg's commitment to quality and technology reaches nearly every aspect of campus life. State-of-the-art equipment is in place, in process, or in the planning stage to ensure that Wittenberg students receive the best of new and traditional means of education. In support of that goal, networked classrooms with a Windows workstation, overhead projection system, DVD players, and external video ports are available for both instruction and student presentation. Video projects and presentations alike enable students in any discipline to present ideas creatively.
More than 1,000 networked Windows workstations and servers support instructional needs across campus. This network extends to all academic buildings with numerous computer lab locations and the residence halls. Standard software including Microsoft Office Professional Suite, programming, data analysis, geographic information systems, and specialized programs for individual classes are available in a variety of computer lab locations around campus.
Students tap into Wittenberg's extensive network, library, and Web services directly from any residence hall room with a personal computer, using wired and wireless access in selected common areas across campus, and available computer lab locations. The ITS Solution Center staff provides answers to questions concerning the network and other campus IT issues.
Wittenberg’s Web site contains updates on current happenings, visiting artists, speakers, athletic contests, and other campus events. Students use the WittLink Portal (accessible from the Web site) to plan class schedules, register for courses, update account information, view grades, change passwords, read or send e-mail, and build a portfolio for use after graduation. Many professors offer additional online academic support via the Web. These and other services are globally accessible from any standard Internet Service Provider via username and password. Students receive an e-mail address and message storage and space on the Windows network for data file storage.
The ITS Solution Center (Synod Hall room 13) is staffed from 8 AM - 6 PM, Monday through Friday during the school year. The Solution Center Outpost (Thomas Library, Main level) is staffed during the school year:
Monday- Thursday 6-10 pm
Friday 6-9 pm
Saturday 10 am - 4 pm
Sunday 3-9 pm
Please call (937) 525-3801, e-mail email@example.com or stop by the Solution Center or the Outpost for any information regarding the services available, to request a work order, or for any University computer related questions.
Services available to students include:
- Personal network drive storage space (H:\ drive on the network)
- Space for class work (assigned through professor)
WittLink Portal services http://www.my.wittenberg.edu :
- Find your username and set your password
- Reset your (forgotten) passwords
- Request mailing lists for campus organizations
- Change your personal information or privacy settings
- Student, faculty, and staff directory information
- View open courses and course descriptions
- Track information available from the offices of the Registrar, Student Accounts, and the Career Services Office (grades, schedule, etc.)
- Ability to grant parental access to specific academic information (schedule, degree audit, financial aid, grades, account balance.)
- Access to grant specific permission for Health Services to discuss current illnesses, chronic conditions, or other topics with parents
- Report a work order 24 hours hours/7 days a week using the WittLink Portal at www.my.wittenberg.edu
As part of Wittenberg’s ongoing commitment to technology, additional services are added yearly. Examples include:
- Email access from most smartphones and tablets like iPhones, Droids, and iPads.
- The ability to connect your personal network enabled laptop or PC yourself using our WittConnect service in various locations around campus including Residence Halls, Hollenbeck Hall (hallway study areas), and the new wing of the Barbara Deer Kuss Science Center.
- ACH (bank draft) available to make tuition payments securely over the Web through the WittLink Portal
- Wireless network is available in all academic buildings, residence halls and outdoors (main campus).
- VPN (Virtual Private Networking) is available to faculty, students, and staff to access Wittenberg network drives and resources through a non-Wittenberg Internet Service Provider .
Services available to studetns include: general computer help connecting to wired and wireless, virus removal, registering/resetting passwords, and printing.
Please note: The following policy exists as a part of the WittLink Portal system. Users are required to electronically sign the policy before using the Portal system.
ITS supports the educational mission and operational needs of the institution encourage community and contribute to open communication. Policies protect individual and institutional rights, and identify responsibilities associated with the privilege of access to institutional resources. By accepting the privilege of using University resources, the individual accepts the responsibility for learning the legal and policy restrictions on that use and agrees to abide by those regulations. The Wittenberg ITS is responsible for the integrity of computing systems and resources and for establishing guidelines for access and use of computing resources.
A user is responsible for all activity originating from his or her account and for ensuring that passwords or other security measures are not breached. A user who suspects that someone else has accessed his/her account must contact the ITS Solution Center immediately. Faculty and staff members are responsible and accountable for their immediate family member accounts. Family-members include spouses and dependent children as defined by the federal government for tax purposes.
Users may not:
- share passwords,
- attempt to circumvent security measures,
- interfere with the ability of others to use the network,
- use university IT resources for harassing communication, and
- use IT or networking resources to operate a business unrelated to the mission of the university.
- abide by the provisions of copyright law. Wittenberg's information for the Digital Millennium Copyright
- Act can be found at http://www.wittenberg.edu/web/dmca.html. and
- comply with federal, Ohio, and other applicable laws; applicable university rules and policies; and
- applicable contracts and licenses.
All staff is expected to use good judgment in determining the appropriate amount of time spent in accessing the Web and using other IT applications. Establishing and enforcing guidelines for at-work personal/recreational use of Wittenberg IT resources is the responsibility of each supervisor, within the general provision that there be zero impact on the employee's work performance.
Users who violate this policy may be denied access to university IT resources and may be subject to other penalties and disciplinary action, both within and outside of the university.
Use of hardware/software
University owned or leased computer hardware, software, and software licenses are the property of Wittenberg University. With the exception of intellectual property, data stored on university property is the property of Wittenberg University.
Legitimate use of a computer or network system is based on the requirements of a user's position, not on the knowledge of the user or whatever is technically possible. Although some limitations are built into computer operating systems and networks, those limitations are not the sole restrictions on what is permissible.
The University owns licenses to a number of proprietary programs. Users may not redistribute or reverse engineer software outside of the license terms with the software suppliers. Copyright protection also applies to many resources found on the Internet, including but not limited to images, audio and video files, and electronic versions of print materials. The use and redistribution of any software or other copyrighted materials without permission is strictly prohibited.
Protection of confidential information
Once an individual is granted access to data, he or she is responsible as a custodian of that data. Data custodians are held accountable for maintaining the security and confidentiality of those records to which they are granted access.
Additionally, all faculty, staff and students must comply with the Family Educational Rights and Privacy Act (FERPA) guidelines regarding the release of student information.
Access to and use of data
Material that is damaging to the university, in violation of copyright laws, in violation of university contractual
agreements, or otherwise contrary to university standards may not be downloaded or posted to university computers or transported across university networks. Violations include, but are not limited to:
- Accessing, or attempting to access, data or information without proper authorization regardless of the
- means by which this access is attempted or accomplished;
- Download copyrighted programs
- Giving another person access to data or information to which they are not authorized;
- Obtaining, possessing, using, or attempting to use passwords or other information about someone else's
- Forging, fraudulently altering, or willfully falsifying computer files/data identified as university records;
- Using electronic resources to hoard, damage, or otherwise interfere with administrative or academic
- resources accessible electronically;
- Using electronic resources to steal another individual's work or otherwise misrepresent one's own work;
- Interfering with the work of another user;
- Supplying or attempting to supply false or misleading information or identification in order to access
- another user's account,
- Deliberate, unauthorized attempts to access, use, or manipulate University computers, computer facilities, networks, systems, programs or data.
Users may not change, copy, delete, read or otherwise modify university leased or purchased software except where permitted.
Right to privacy
Though users can expect the University to respect their privacy, the privacy rights of individuals using university owned equipment have some limits. In particular, Wittenberg reserves the right to monitor volume of traffic, investigate potential policy abuses, and take steps necessary to suppress viruses and other damaging programs. ITS personnel will not access programs, files or data without permission from one of the following:
- The creator/ custodian of the materials,
- The Dean of Students or President if the creator/custodian is a student or prospective student, or
- The appropriate Vice President, Provost, or President if the owner is a member of the faculty, staff, alumni, parent, or family member of the faculty or staff.
Computer files are a form of property and the contents of a file will be treated as physical property. Users are expected to respect the privacy and restrictions placed upon information stored or transmitted across computers and network systems, even when that data or information is not adequately secured.
You should also be aware that your privacy is also impacted by other federal legislation. For more information on this you can review the following site: http://www.acenet.edu/washington/anti_terror/2001/2001_anti_terror.pdf
Safeguarding of security passwords, user identity, and system access
Investigating or reading another user's files is considered the same as reading papers on someone's desk - a violation of the person's privacy. Reading protected files without authorization by the custodian of the file, by whatever mechanism, is prohibited.
Nevertheless, please be aware that from time to time, especially when you are away from your desk, your supervisor or another employee may need to access your computer or files. You should not expect information left on your computer or in your files to be unconditionally private.
Students, faculty and staff should report violations of this policy, potential loopholes in computer systems security, and cooperate with the Wittenberg Network Manager in the investigation of suspected policy violations. These issues should be reported to the ITS Solution Center (firstname.lastname@example.org) or by calling (937) 525-3801.
Users who have valid accounts may only use computer and network resources that they are specifically authorized to use. Users shall use accounts for authorized purposes and are responsible for safeguarding their computer account. Users should not allow other person(s) to use their account. Passwords should be changed often to ensure that private and secure files are kept secure. Computer accounts may not be transferred or used by other individuals including family and friends.
E-mail and Worldwide Web applications
Wittenberg maintains electronic mail, web, and other systems to facilitate university business. Although e-mail correspondence can take on a more informal tone, all messages composed, sent, or received on the electronic mail system should be considered official university correspondence and could be subpoenaed by a court of law.
The university expects e-mail messages to be treated as confidential by other employees and accessed only by the intended recipient. Employees should not attempt to gain access to another employee's messages without permission. Communications via e-mail are subject to all university standards and policies that govern other forms of communication.
University email, web and other electronic services may not be used for commercial and/or private gain.
Any user's account, software, and hardware, is a possible target for vandalism. Attempted or detected alteration of user system software, data or other files, as well as equipment or resource disruption or destruction, is considered vandalism.
Any user of IT and networking resources can be denied full or partial access to computing and networking resources if he or she violates this policy. Generally, denial of service will be justified by well-documented violations of policy and warnings. ITS may terminate or restrict any person's access to its resources, without prior notice, if such action is necessary to maintain availability, security, and integrity of operations for other users of the resources, or in the case of serious policy violations.ITS will notify the user and the appropriate Vice President or Provost when access has been restricted or terminated.
Appeals will be handled through existing processes. (Student violations will be referred through the student conduct or academic misconduct system as outlined in the Student Handbook. Faculty and staff violations will be referred through conduct processes outlined in the Faculty Manual and the Administrative and Hourly Staff manuals.) Where directly applicable the Student Handbook, and the Administrative and Hourly Staff manuals take precedence over this policy:
-The student handbook:
-The hourly and administrative staff manuals:
Any user of IT and networking resources is subject to disciplinary action up to and including termination of employment or expulsion from school for serious violations of this policy. Examples of serious violations include, but are not limited to, violations of the law (child pornography, FERPA), software piracy, and unauthorized access to and/or modification of data (academic records, financial, payroll, donor information). FERPA information: http://www.wittenberg.edu/students/ferpa.html. Should it become necessary to deny faculty, staff, or current student access to IT or networking resources, a notice will be sent to them within 24 hours by mail. Should it become necessary to deny any other individual access to IT or networking resources, a notice will be sent to them within 48 hours by mail.
Statement regarding SPAM and abusive E-mail
To support users’ ability to read mail from anywhere through various web browsers and e-mail programs, Wittenberg chooses to retain messages on a central mail server. As a result, most SPAM software is not compatible with this service, many are cost-prohibitive, and many solutions block desired messages as SPAM. Currently Wittenberg performs checks on incoming mail including:
- Checking each message for known viruses and quarantining infected messages
- Assessing e-mail addresses presented by users to the Computing Center as abusive
- Evaluating messages according to a weighted system of typical SPAM indicators in order to tag messages as possible SPAM for users’ convenience.
Wittenberg does not block entire domains or any message from an address unless it is specifically requested by a Wittenberg user and meets criteria as abusive. While this system is not comprehensive or perfect, it does allow the greatest measure of personal freedom and choice in the use of a Wittenberg e-mail address for users while blocking repetitive abuse of those addresses by outside sources. To report abusive e-mail, forward the message with header information to email@example.com.
- Any modification of the network will not be permitted.
- Our pursuits are academic, and the University must abide by applicable legal and copyright law. You may not use your network connection to act as a server or to use software for copyright infringement.
- You will not be permitted to forge or misrepresent your identity or your network address. Only registered, approved devices may be used on the network.
- Excessive use of network resources hampering use by others is also not acceptable.
- The ITS Solution Center student staff members will not perform repairs or upgrades on personally owned computers. Our help is limited to getting your computer back on Wittenberg’s network. No program, virus software, or device can prevent all viruses, Trojans, bots, etc. There will be times where the software corruption on the computer may be beyond our purview to correct. In those cases, we will refer you to your manufacturer’s technical support or another third party for additional repair or assistance.
- You are responsible for your behavior on the network and on the Internet.
- Penalties for failure to comply with the University's usage guidelines can include: immediate suspension of network service, suspension of computer use privileges, and pursuit of disciplinary procedures outlined in the Student, Faculty, and Staff Handbooks.
- We reserve the right to take appropriate action and/or suspend users who attempt to circumvent network security or post excessive network activity.
- All users are expected to follow the Access and Use IT resources policy. View the full policy from the top here.
Network users are responsible for installing and maintaining anti-virus, anti-spyware, or other required programs on his/her personal computer, including keeping the anti-virus list up-to-date. The university’s anti-virus program does protect personal computers and is available to you free of charge. Download a copy http://www.wittenberg.edu/software. Neither Wittenberg University nor its designated agents may be held responsible for any damage to the student’s computer and/or loss of data due to a virus, trojan, worm, etc. or efforts to repair or reconnect your computer to the network.
Note about malware: Some malicious programs are becoming more prevalent on the Web. There is no protection currently available from these programs. In some cases the only known fix to eliminate these from the computer completely is to delete and reload the software and/or operating system. We urge users to practice “safe” computing.
The Digital Millennium Copyright Act at Wittenberg Statement
Wittenberg University complies with the provisions of the Digital Millennium Copyright Act (DMCA). If you have a concern regarding the use of copyrighted material on any site on the wittenberg.edu network, please contact the agent designated to respond to reports alleging copyright infringement.
The designated agent for the Wittenberg University campus to receive notification of claimed infringement under Title II
of the DMCA is:
Chief Information Officer
Phone: (937) 525-3811
Fax: (937) 327-7372
Post Office Box 720
Springfield, OH 45501-0720
The DMCA specifies that all infringement claims must be in writing (either electronic mail or paper letter) and must include the following:
- A physical or electronic signature of the copyright holder or a person authorized to act on his or her behalf;
- A description of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site;
- A description of the material that is claimed to be infringing or to be the subject of infringing activity, and information reasonably sufficient to permit the service provider to locate the material;
- Information reasonably sufficient to permit the service provider to contact you, such as an address,
- telephone number, and, if available, an electronic mail address;
- A statement that the you have a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law; and
- A statement that the information in the notification is accurate, and under penalty of perjury, that you are authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
- Digital Millennium Copyright Act Summary from the US Copyright Office (PDF document)
Any officially registered student organization, faculty, or staff group can schedule events through the stated procedure. Student groups receive official University recognition from the Office of Student Involvement via Student Senate. See the Office of Student Involvement for clarification and assistance with registration as well as with program planning.
The HPERC fields and facilities are for student recreation, intramural and club sports, and intercollegiate athletics. All Wittenberg students may use the HPERC during open recreation times. To use the facilities they must show their Wittenberg I.D. cards.
Scheduling of the field and facilities is the responsibility of the Director of Operations and Facilities. The possession and use of alcoholic beverages by spectators and activity participants are strictly prohibited. Initial responsibility for the enforcement of this policy rests with the club officer and intramural representatives. Organizations, clubs, and individual students jeopardize their use of the fields and facilities if found to be in violation of this policy.
The HPER Center has a no guest policy all other athletic facilities may have guest participants.
Shoes with non-marking soles must be worn at all times when using the HPERC facilities.
- 4 gymnasium modules
- 2 fitness centers
- (1) cardio intensive center
- (2) strength intensive center
- 5 racquetball courts, 1 squash court
- 1 swimming pool, 25 yards x 25 meters
- (2 diving boards)
- 12 outdoor tennis courts
- 1 outdoor all-weather track (no bicycles, skateboards, pets, or chewing gum allowed—tennis shoes required)
- 1 stadium—turf field (no bicycles, skateboards, pets, or chewing gum allowed—tennis or turf shoes required)
- Zimmerman Field—football, soccer, lacrosse
- Bill Edwards Field—rugby, intramurals, practice field
- Betty Dillahunt Field – softball, practice field
For more information concerning the scheduling and use of the HPERC fields and facilities, contact HPERC at 327-6469.
- All applicants must complete the authorization form, sign the Policies and Procedures acknowledgement form and submit a copy of their valid driver's license. Once this paperwork is received by our office, a Bureau of Motor Vehicles check of the applicant's driving record will be run through the university's insurance carrier. The insurance carrier will reply with "approved" or "not approved" which will confirm or deny the applicant's authorization to drive a motor pool vehicle. Any person who drives a university vehicle must sign an acknowledgement form verifying the receipt, and accepting the conditions, rules and regulations for driving a university vehicle. This process may take up to 10 days so please be sure to plan ahead.
Please Note: To be eligible to drive a 12 passenger van, drivers
MUST be 20 years or older.
- Drivers may not drive more than 10 hours in a 24-hour period and must include at least one 30-minute rest stop in any trip or trip segment that exceeds six hours. Drive time is limited to a maximum of 16 hours of continuous travel after which a layover of at least eight hours is required.
Drivers are required to keep a cell phone in the car for emergency purposes. Do not use the phone while
driving unless it is absolutely necessary. Cell phones are available by request at the Transportation Office.
- The Transportation Office reserves the right to cancel use of a university vehicle as a result of severe or adverse weather conditions.