Acceptable Use of Computers, Networks, Telecommunications, and Information Systems Technology Policy
Policy:
Computers, networks, telecommunications, and other information systems technology are essential resources for accomplishing the mission of the University. It is the responsibility of all University’s computer, network, and information systems technology users to use these resources in an effective, efficient, and responsible manner.
Procedure:
- Limited Resources
Information technology resources are both limited and expensive. Although the amount of usage may vary among users, all users should avoid excessive usage of these resources, especially when it impacts upon the usage of others. All members of the University community are responsible for protecting the University's resources.
- No user should permit anyone else to use her or his computer account for any reason. Users are responsible for all activity relating to their accounts.
- No one who is provided with information technology access for their work as a student, faculty member, or staff member of the University should use this access for work not specifically authorized. This includes, but is not limited to, unauthorized commercial use, use in support of an organization or effort external to the University, use for personal financial gain, or excessive personal use. These restrictions do not fully apply to those students, faculty and staff who obtain personal computing resources through the University via a lease/purchase arrangement.
- The University will make every effort to provide computers and information technology services to meet demands; however, there are reasonable upper limits on computer usage. Excessive amounts of central processor time or disk usage will be checked for on central systems, as well as excess amounts of printing on public printers. Instructional, research, and administrative computing take precedence over personal computing. Users shall not send chain letters via electronic mail. Mass emails require approval from the Student Affairs department. Users should avoid all activities that generate unnecessary output, create unnecessary multiple jobs or processes, or create unnecessary network traffic.
- No person or organizational unit with a long-distance access code for University business purposes should allow any other person or organizational unit to use that code. Faculty and staff with business access should not use their codes for personal long-distance calls. Because the University receives a tax reduction on business calls, it is not legal or ethical to make personal calls, even if restitution is made.
- Privacy
Users of the University's computer and telecommunications systems expect security of their accounts and privacy of information stored in their accounts. The Information Technology Department will make reasonable attempts to provide such security and privacy for users.
- Users should keep passwords and access codes secret. Report any suspicious account activity to the Information Technology Department. If a password or access code has been compromised, contact the Information Technology Department immediately.
- Members of the University community who are expecting to leave the University permanently should work with the Information Technology Department to dispose of or redistribute information stored in their personal computer or on network drives. Information Technology reserves the right to close accounts and dispose of information stored on personal computers or network drives if no arrangements are made to save this information. The University may claim the right to information produced by employees as part of their regular duties, subject to certain limitations.
- All users should be aware that information transmitted electronically is very easy to forward to others. A good rule is to never send out any information by electronic mail or voice mail that you would not want distributed widely.
- All users should be aware that information transmitted electronically, by telephone, voice mail, or computer systems, is subject to the same University policies and international, federal, state, and local laws that apply to written and oral communications. Information that others view as abusive, profane, pornographic, harassing, threatening, libelous, or sexually, racial, or religiously offensive may be addressed under other University policies or the applicable laws.
- The University’s employees or agents reserve the right to monitor, examine or disclose the contents of data, electronic files/communications, or other system accounting information. The University also reserves the right to monitor, access and disclose the contents of employees’ electronic and/or telephone communications (including e-mail and voice mail). The issuance of a password or other means of access to the computer or voice mail systems is to assure appropriate confidentiality of University files and information. The issuance of a password DOES NOT guarantee privacy for personal or improper use of University equipment and facilities.
- Property
Software and information stored on computer systems or transmitted over computer networks is considered intellectual property and is protected by copyright law and rules governing plagiarism.
- All members of the University community must abide by the terms of all software licensing agreements. Absolutely no software piracy will be tolerated.
- Users may not use University resources to gain access to either local or remote accounts or computers which they are not authorized to use. Users may not try in any way to obtain a password for another person's account.
- Users must not attempt to circumvent data protection schemes or uncover security loopholes on either University computer systems or remote computer systems.
- Users must not attempt to monitor or read another person's electronic mail or other data transmissions without permission. Users may not read, copy, change, or delete another person's files or software without permission of the owner.
- System Security
Actions that cause the telephone system, voice mail system, computer systems or networks at the University to fail or become impaired are absolutely forbidden.
- Absolutely no physical abuse or theft of equipment, wiring, software, or data will be tolerated.
- Absolutely no misuse of the telephone system, the voice-mail system, computer systems, the computer network, or other systems on the network will be tolerated. This includes, but is not limited to, breaking into, halting, slowing down, or breaching security of any of these systems. In particular, introduction of any of a range of programs known as computer viruses, Trojan horses, or worms is expressly forbidden.
- A user may not attempt to disguise the identity of the account or machine he or she is using or the nature of the work that he or she is doing.
- Anonymous or pseudonymous written communications appear to disassociate users from responsibility for their actions, and are almost always inappropriate. Concealing or misrepresenting user name or affiliation to mask irresponsible, offensive, and/or prohibited behavior is a serious abuse of University computing resources. Using identifiers associated with other individuals as your own constitutes fraud.
- A standard set of software products will be installed on each networked computer, to include Microsoft Windows, Microsoft Office, and Internet Explorer. Installation of software without prior review and authorization by the Information Technology Department is prohibited, and may constitute cause for termination of access privileges.
- World Wide Web
The University recognizes the value and potential of publishing on the Internet, and so allows and encourages divisions, departments and organizational units to publish electronic information. Divisions, departments, and organizational units may create electronic home pages, publications pages, or other pages that carry out official University business in support of the University's mission and goals.
- All division, department, and organizational unit pages are the electronic equivalent of a publication, and will begin with some reference to the University, either in text or in graphical form.
- Copyright laws apply to electronic publishing as well as to print publishing. Publishers must have permission to publish the information, graphics, or photographs on their pages, if the publisher is not the author or creator. Electronic publications are subject to the same University policies and standards as print publications.
- All pages accessible to the general public that contain health or treatment-related information must contain a link to the general Copyright & Disclaimer page; the URL for this page may be obtained from the Office of Communications.
- University resources may not be used to create web pages primarily intended for personal business or personal gain, except as permitted by other University policies. Personal pages that provide information about an individual relevant to that individual's role at the University are permissible, within the content provided by a division, department, or organizational unit.
- University web pages may not link to any external site that violates University policy or international, federal, state and local laws pertaining to content, including but not limited to those policies and laws relating to intellectual property, harassment, and offensive behavior. When identified, links to such material must be immediately deactivated.
- Disciplinary Procedure
Violations of this policy will be handled through existing disciplinary procedures. Policy infractions may incur sanctions up to and including loss of account privileges, dismissal or expulsion. The Information Technology Department reserves the right to temporarily suspend a user's access pending disciplinary, procedures.