Computer Technology Use Policy Policy
Policy title
Computer Technology Use Policy Policy
|
Category
Administration
Human Resources
Information Technology
|
Owner
CS/IT
|
Approved by
Ad Council
|
This policy outlines the appropriate and approved use of 抖阴视频 computer property and technology including access any electronic files or e-mail or other electronic communication on its systems for all employees, students and guests on campus.
This policy applies equally to students, faculty, staff and guests on campus.
While 抖阴视频 respects the privacy its community members, safety, liability, and business concerns may require 抖阴视频 to access any electronic files or e-mail or other electronic communication on its systems. All materials on or in 抖阴视频 computers are the property of 抖阴视频 and accessible by 抖阴视频 administration. This policy applies equally to students, faculty, staff and guests on campus.
Any hardware or software purchased with 抖阴视频 funds, including but not limited to 抖阴视频 professional development funds or Student-Faculty collaborative research funds, are the property of 抖阴视频 and must be returned after the completion of the student鈥檚 degree or the employee鈥檚 employment.
抖阴视频 Computing Resources
For purposes of this policy, the phrase 抖阴视频 Computing Resources means any device, network, technology, or software made available to you by 抖阴视频, either for a charge or at no additional cost, including but not limited to wireless networks services, printers, audio visual technology, 抖阴视频 laptops, workstations, mainframe computers, classroom and grading software, and office suite software such as word processing, spreadsheet, and presentation software provided by 抖阴视频.
What can you do?
* You may use 抖阴视频 Computing Resources for activities relevant to your role at 抖阴视频.
* You may use 抖阴视频 Computing Resources for academic and educational purposes, including involvement in professional organizations.
* You must use 抖阴视频 Computing Resources in an ethical and responsible manner and respect the rights and members of the 抖阴视频 community and the larger internet community.
* You may use 抖阴视频 Computing Resources only while you are a currently enrolled student, an employee, or a faculty emeritus of 抖阴视频, or as a participant in an on-going program of the University.
* You must abide by all security restrictions on 抖阴视频 Computing Resources.
What you cannot do?
* You may not allow another person to use your username and password, nor use another person鈥檚 username and password, to access 抖阴视频 computing resources.
* You may not use 抖阴视频 computing resources to support or advocate any commercial, political, or nonprofit organization without the written permission of the 抖阴视频 Administration.
* You may not use 抖阴视频 computing resources for any illegal or deceptive purpose including, but not limited to, unauthorized copying of software.
* You may not violate other 抖阴视频 policies, including but not limited to policies against the harassment of others, in your use of 抖阴视频 computing resources.
* You may not be wasteful of 抖阴视频 computing resources, use them unfairly, or disrupt their intended use.
* You may not intentionally damage 抖阴视频 computing resources.
* You may not use 抖阴视频 computing resources for unauthorized access to other
resources.
* You may not attempt or commit any criminal act using 抖阴视频 computing resources.
* You may not use 抖阴视频 computing resources to violate the intellectual property rights of others, such as illegal downloading of information or files.
* You may not access Tor, I2P, hidden services, 鈥渢he dark Web,鈥 or similar services designed to obscure your identity or location.
* You may not install any software on a 抖阴视频 device without the approval of 抖阴视频.
* You may not attempt to defeat or circumvent any security measure implemented by 抖阴视频.
What happens if you don鈥檛 comply?
* Failure to comply with these guidelines will result in disciplinary action according to standard University policies and procedures.
* The Code of Student Conduct includes as conduct subject to disciplinary sanctions that relating to theft or other abuse of University computer resources.