Johns Hopkins Information Technology Use Policies

SciServer is part of the Johns Hopkins University. Users of the SciServer system must comply with all Johns Hopkins Information Technology Use Policies, including but not limited to the following. 

User Policies: Use of IT Resources

Acceptable Use
Acceptable use of IT Resources is use that is consistent with Johns Hopkins’ missions of education, research, service, and patient care, and is legal, ethical, and honest. Acceptable use must respect intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and freedom from intimidation, harassment, and annoyance. Further, it must show consideration in the consumption and utilization of IT Resources, and it must not jeopardize Johns Hopkins’ not-for-profit status. Incidental personal use of IT Resources is permitted if consistent with applicable JH and divisional policy, and if such use is reasonable, not excessive, and does not impair work performance or productivity.
Unacceptable Use
Unacceptable use of IT Resources includes, but is not limited to: 

  1. Unauthorized access to or unauthorized use of JH IT Resources.
  2. Use of IT Resources in violation of any applicable law.
  3. Harassing others by sending annoying, abusive, profane, threatening, defamatory, offensive, or unnecessarily repetitive messages or web-site postings, or by sending messages or web-site postings that appear to come from someone other than the sender.
  4. Any activity designed to hinder another person’s or institution’s use of its own information technology resources.
  5. Privacy violations (e.g., disclosure or misuse of private information of others).
  6. Installation of inappropriate software or hardware on IT Resources (e.g., network or password “sniffing” software, offensive applications, and malicious software).
  7. Any use of copyrighted materials in violation of copyright laws or of vendor licensing agreements (e.g. illegal downloading and/or sharing of media files or computer software).
  8. Intentional, non-incidental acquisition, storage, and/or display of sexually explicit images, except for acknowledged, legitimate medical, scholarly, educational, or forensic purposes. Exposure and/or display of such material may be offensive, constitute sexual harassment or create a hostile work environment.
  9. Security breaches, intentional or otherwise, including, as examples, improper disclosure of a password, use of another user’s account, or negligent management of a server resulting in its unauthorized use or compromise.
  10. Commercial use of IT Resources for business purposes not related to Johns Hopkins.
  11. Use (e.g. e-mail, social media, blogs), without specific authorization, to imply JH support (as opposed to personal support) for any position or proposition.
  12. Use to engage in activities, including for example certain political activities, prohibited to tax exempt 501 (c) (3) organizations or that otherwise may result in a hostile work environment.