èßäapp

Skip to main content

HR-518 Computer Utilization

Summary

Utilization of University computer networks, equipment, and connecting resources are restricted. This policy applies to all users including faculty, staff, students and their guests.

If any part of this Policy does not reflect with the Collected Rules and Regulations (CRR), the provisions of the CRR will govern.


Policy

Per Collected Rules and Regulations (CRR) 110.005: Acceptable Use Policy (Bd. Min 10-23-09):

This policy applies to all users including faculty, staff, students, and guest users of University of èßäapp computer networks, equipment, or connecting resources.

  1. University Inspection of Personal Electronic Information—All information technology resources, including computer networks, equipment and connected resources, provided by the University of èßäapp are the property of the University. The University values the principles of academic freedom and privacy and does not condone casual inspection of the information contained within or transmitted via these resources. However, electronic information on University networks or equipment, including, but not limited to, electronic mail and personal information, is subject to examination by the University where:
    1. It is necessary to maintain or improve the functioning of University computing resources;
    2. There is a suspicion of misconduct under University policies, or suspicion of violation of Federal or State laws;
    3. It is necessary to comply with or verify compliance with Federal or State law including e-discovery procedures; or
    4. If it will serve a legitimate business need of the University.
  2. Acceptable Use Guidelines
    1. Responsibilities of Users of University Computer Resources:
      1. Respect the intellectual property rights of authors, contributors, and publishers in all media.
      2. Protect user ID, password, and system from unauthorized use.
      3. Adhere to the terms of software licenses and other contracts. Persons loading software on any University computer must adhere to all licensing requirements for the software. Except where allowed by University site licenses, copying software licensed for University use for personal use is a violation of this policy.
      4. Adhere to other University and campus policies, including the Collected Rules and Regulations of the University of èßäapp, and, if applicable, the University Business Policy Manual, Human Resources Manual and policies established for a specific resource.
      5. Adhere to data access policies of the University or those established by law.
      6. Use University computer resources in a manner that is compliant with University policies and State and Federal law.
    2. Prohibited Uses of University Computer Resources:
      1. Unauthorized or excessive personal use. Use may be excessive if it overburdens a network, results in substantial use of system capacity, or otherwise subjects the institution to increased costs or risks (employees additionally may be subject to discipline for unauthorized or excessive personal use of computer resources.)
      2. Uses that interfere with the proper functioning of the University’s information technology resources.
      3. Uses that unreasonably interfere with the ability of others to make use of University computer resources.
      4. Attempting to gain or gaining unauthorized access to the computer system, or files of another.
      5. Use of University computer resources to infringe the intellectual property rights of others.
      6. Use of University computer resources for personal profit, except as permitted under the University’s conflict of interest policy.
  3. Enforcement of Acceptable Use Policy—Violation of the Acceptable Use Policy may result in a denial of access to University information technology resources, and other appropriate disciplinary actions.

Further HR Policy Provisions

Additional HR-518 policy provisions below in accordance with CRR 110.005

None at this time.


See Also

HR 507 Conflict of Interest
Policy 12006 Email Management Policy

Date Created: 11/01/2001
Updated: 08/23/2009; 08/22/2010; 05/05/2022 (reformat)

Reviewed 2022-05-05