Honors Symposium Technology Release Form

    Permission for Access to Harding University Computer Resources for Students
    Acknowledgment of Responsibilities and Consequences, Acknowledgment of Rules,
    Release of Liability and Indemnification

    Full HU Information Systems and Technology Policies are posted at
    https://www.harding.edu/ist/useofist

    Permission for Access to Harding University Computer Resources. In consideration of the undersigned student participating in the Honors Symposium at Harding University, the parent or guardian of the undersigned STUDENT (STUDENT or you) grants permission to Harding University to grant access to the university computer resources for students (computer resources) to STUDENT according to its computer use policies and procedures and the rules outlined in this instrument.

    Acknowledgment of Responsibilities and Consequences. The undersigned parent or guardian of STUDENT, acknowledges that he or she has fully discussed with STUDENT the responsibilities and consequences of having access to the computer resources. The STUDENT has indicated to me he or she fully understands his or her responsibilities of having access to the computer resources and the consequences for failing to comply with the rules.

    Acknowledgment of Rules. In addition to the standard of conduct for students and the policies and rules of the Office of Information Services of Harding University, listed below are the most important and most misunderstood rules about using the computer resources. These rules apply to any student using such resources. Learn these rules so that you don’t get into trouble. Please read these rules carefully.

    1. You may not use any University-provided computer resources to access pornography, gambling, wagering, vulgarity, profanity, racially or ethnically offensive language or offensive symbols.
    2. The computing resources exist to complement the educational mission of the University and must be used appropriately. You have the obligation to ensure you are utilizing the computing resources (including all University equipment, networks, user accounts, Ethernet connections) in accordance with University policy and applicable laws and rules outlined in this instrument.
    3. If you have a question about whether a specific use of computing or networking resources is legal or appropriate, send e-mail to symposium@harding.edu and ask before you begin to use it for that purpose.
    4. You are the only person who can use a computing resource the University has provided specifically for your use.
    5. You may not be paid, or otherwise profit, from the use of the computing resources or from any output produced using it. Further, you may not promote any commercial activity using the computer resources. For example: You may not post advertisements; you may not post “chain letters”.
    6.Use computer resources appropriately. Do not interfere with the activities of others or use a disproportionate share of computer resources. Send messages only to those who may be interested in the content. Examples of inappropriate use of computer resources are shown below. These actions frequently result in complaints and subsequent disciplinary action.
    • Sending a message at random to a large number of news groups or recipients (known as "spamming the network"). 
    • Attempting to inconvenience someone by sending a large number of messages (commonly referred to as a "mail bomb"). 
    • Deliberately causing any denial of services, including flooding or lCMP attacks ("ping attacks"). 
    • Excessively controlling a chat channel by such actions as kicking off or blocking other
    Never try to circumvent login procedures on the computer resources or otherwise gain access where you are not allowed. This is not acceptable under any circumstances and can result in serious consequences, including disciplinary action by the Office of the Dean of Student Services or the Provost's Office.

    Release of Liability. In consideration of being permitted to participate in the Honors Symposium at Harding University, STUDENT, by and through his or her parent or guardian, and the parent or guardian, in full recognition and appreciation of the risks to which STUDENT may be exposed during access to the computer resources, do hereby agree to assume all risks, and responsibilities surrounding my participation in using such computer resources and any independent activities undertaken adjunct thereto.

    Indemnification. STUDENT, by and through his or her parent or guardian do for STUDENT'S heirs and personal representatives, hereby defend, hold harmless, indemnify and release and forever discharge, Harding University, Inc., and all its trustees, officers, agents and employees from and against any and all claims, demands and actions, or causes of action, which may result from STUDENT'S access to the computer resources described in this instrument. STUDENT'S parent or guardian do for their respective heirs and personal representatives hereby defend, hold harmless, indemnify and release and forever discharge, Harding University, Inc., and all its trustees, officers, agents and employees from and against any and all claims, demands and actions, or causes of action, which may result from STUDENT'S access to the computer resources described in this instrument.  
    Student's Birthdate
    Student's Birthdate
    Student Address
    Student Address