Just like protecting yourself and personal belongings, keeping your digital "life" safe and secure should be one of your utmost concerns. You should keep your usernames and passwords a secret (do not share them under any circumstances). SU Technology staff will never ask for your online credentials, nor will any other Schreiner University employee. Consider any request for usernames and/or passwords (via e-mail or by phone) an attempt to exploit your personal account.
Keep an updated anti-virus and anti-malware program on your computerBack up important documents (in several places)Keep your computer up to dateWatch for scams or phishing attemptsBe wary of downloading files from unknown websites
Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.
Schreiner University provides a high speed network and other information technology resources to help you accomplish your educational and instructional goals. When you access our network or when you sign on using your Schreiner ID/user name and password, you agree to comply with the University's Responsible Computing Policy and with the Student Code of Conduct. Both policies include a section on copyright compliance and are included in the Student Handbook (pages 24 & 37) and are posted on University's website. (http://www.schreiner.edu/handbook/) These policies prohibit the use of University resources for unauthorized duplication, use, or distribution of copyrighted materials, including music and video files. The University considers unauthorized peer-to-peer file sharing of copyrighted content (such as but not limited to music, videos, text-based documents) to be an inappropriate use of its network resources. Moreover, such activity is illegal under the Digital Millennium Copyright Act (DMCA) and exposes you to serious civil and criminal penalties.
For information about copyright and file sharing laws and policies, as well as legal options for downloading music and video, visit: Logan Library's Copyright Resources.
Other questions about this message should be directed to
Candice Scott, Library and Information Services, 830-792-7318 (email@example.com)
Phishing is an attempt to route the receiver of an email message to web document (webpage) where you will be instructed to enter your username and password, or in some cases your personal information. Internet scammers are very talented in reproducing popular webpages to look like the real thing (this can include bank websites, email websites, and social media websites). It is in your best interest to be vigilant and inspect the webpage and URL closely before entering any sensitive information. Generally you are not sent email from an individual or company you don't already have an existing relationship with and be instructed to enter sensitive information.
Please see Schreiner University's Compliance with the Higher Education Opportunity Act (HEOA)
Protect Your Information
One of the worst things that can happen to a college student is to lose important courework or data before a project or assignment is due. At Schreiner University you will be issued a network drive to store documents, but you are encouraged to keep a local copy or copies of the information on your computer as well as backing up your data on a seperate drive (flash drive, USB drive, or external hard drive). These days there are many free cloud drives and back-up programs that enable you to store a multitude of file types and documents that can be accessed via the internet from various devices. Ensure that you agree to the terms of cloud storage applications before placing your documents there. The best way to safeguard your work is on multiple physical drives that you own and control.
Spam is unwanted or unsolicited material that travels via email (commonly spam includes advertising or marketing in some fashion or another). Schreiner University has measures in place to reduce and block much of the spam that is aimed at our users and network. However, it us your responsibility to evaluate messages and files that are sent you. The best indicator that you have been sent spam is to examine closely the contact name and email address of the sender (or in many cases the URL that you are directed to). If you suspect the message is spam do not open the email, simply delete the message. If the same message is sent to you repeatedly, block the sender or contact the Help Desk.
Computer viruses implant instructions in other programs or storage devices, and can attack, scramble, or erase computer data. The danger of computer viruses lies in their ability to replicate themselves and spread from system to system. Few computing systems are immune to infection.
Please see the Network page about our wireless network.
Who to Contact for Help or Issues
Please visit our Help page for who to contact for technical or computer problems.