Aerial view of Old Main in the fall at dusk.
Computer Technology Use Policy

Computer Technology Use Policy

Policy title
Computer Technology Use Policy
Category
Administration
Human Resources
Information Technology
Owner
CS/IT
Approved by
Ad Council
Purpose of this policy

This policy outlines the appropriate and approved use of ߲ݴý computer property and technology including access any electronic files or e-mail or other electronic communication on its systems for all employees, students and guests on campus.

Application of this policy

This policy applies equally to students, faculty, staff and guests on campus.

Policy statement

While ߲ݴý respects the privacy its community members, safety, liability, and business concerns may require ߲ݴý to access any electronic files or e-mail or other electronic communication on its systems. All materials on or in ߲ݴý computers are the property of ߲ݴý and accessible by ߲ݴý administration. This policy applies equally to students, faculty, staff and guests on campus.

Any hardware or software purchased with ߲ݴý funds, including but not limited to ߲ݴý professional development funds or Student-Faculty collaborative research funds, are the property of ߲ݴý and must be returned after the completion of the student’s degree or the employee’s employment.

߲ݴý Computing Resources

For purposes of this policy, the phrase ߲ݴý Computing Resources means any device, network, technology, or software made available to you by ߲ݴý, either for a charge or at no additional cost, including but not limited to wireless networks services, printers, audio visual technology, ߲ݴý laptops, workstations, mainframe computers, classroom and grading software, and office suite software such as word processing, spreadsheet, and presentation software provided by ߲ݴý.

What can you do?

* You may use ߲ݴý Computing Resources for activities relevant to your role at ߲ݴý.

* You may use ߲ݴý Computing Resources for academic and educational purposes, including involvement in professional organizations.

* You must use ߲ݴý Computing Resources in an ethical and responsible manner and respect the rights and members of the ߲ݴý community and the larger internet community.

* You may use ߲ݴý Computing Resources only while you are a currently enrolled student, an employee, or a faculty emeritus of ߲ݴý University, or as a participant in an on-going program of the University. 

* You must abide by all security restrictions on ߲ݴý Computing Resources.

What you cannot do?

* You may not allow another person to use your username and password, nor use another person’s username and password, to access ߲ݴý computing resources.

* You may not use ߲ݴý computing resources to support or advocate any commercial, political, or nonprofit organization without the written permission of the ߲ݴý Administration.

* You may not use ߲ݴý computing resources for any illegal or deceptive purpose including, but not limited to, unauthorized copying of software.

* You may not violate other ߲ݴý policies, including but not limited to policies against the harassment of others, in your use of ߲ݴý computing resources.  

* You may not be wasteful of ߲ݴý computing resources, use them unfairly, or disrupt their intended use.

* You may not intentionally damage ߲ݴý computing resources.

* You may not use ߲ݴý computing resources for unauthorized access to other

 resources.

* You may not attempt or commit any criminal act using ߲ݴý computing resources.

* You may not use ߲ݴý computing resources to violate the intellectual property rights of others, such as illegal downloading of information or files.

* You may not access Tor, I2P, hidden services, “the dark Web,” or similar services designed to obscure your identity or location.

* You may not install any software on a ߲ݴý device without the approval of ߲ݴý.

* You may not attempt to defeat or circumvent any security measure implemented by ߲ݴý.

What happens if you don’t comply?

* Failure to comply with these guidelines will result in disciplinary action according to standard University policies and procedures.

* The Code of Student Conduct includes as conduct subject to disciplinary sanctions that relating to theft or other abuse of University computer resources.