[CHANGEME] University Policy on Acceptable Use of Computer Technology

It is the intent of [CHANGEME] University to provide a quality technological environment for the University community in which certain standards are observed. All [CHANGEME] University students, faculty and staff authorized to use [CHANGEME] University computing facilities are responsible for reading, understanding, and complying with the following policies:

[CHANGEME] technology resources are available to the following learning communities:

  1. Students: OIT Services for Students
  2. Faculty: OIT Services for Faculty
  3. Staff: OIT Services for Staff
  4. Alumni: e-mail is available through a service provided by the Alumni Office.
  5. Emeritus faculty: e-mail accounts until there has been one year of inactivity; also access to the Cowles Computer Lab.
  6. Organizations with affiliation agreements with the University: as described in the affiliation agreement.

All members of the [CHANGEME] community authorized to use these services are responsible for reading, understanding, and complying with the following policies.

Requirements for use of University technology resources:

  1. Comply with the following Acceptable Use Policy.
  2. Understand and agree that use of [CHANGEME] University technology resources indicates acceptance of the policy.
  3. Understand that the use of a personally-owned computer that is on the [CHANGEME] network obligates the owner to comply with the [CHANGEME] Acceptable Use Policy.
  4. Obtain necessary accounts and passwords and be responsible for maintaining the security of all accounts.
  5. Realize public computer facilities and electronic classrooms are established for educational purposes and those purposes must take priority.

[CHANGEME] University Acceptable Use Policy

The purpose of the [CHANGEME] University network is to support education, communication, and research by providing access to unique resources and the opportunity for interaction and collaborative work on the Internet and through Email and other applications. The following operations are acceptable uses of the Internet and Email network at [CHANGEME] University.

  1. Instructional use in [CHANGEME] University classes
  2. Faculty Research
  3. Student Research
  4. Class Assignments
  5. Official work of students, faculty, administration, and staff, recognized student and campus organizations, and agencies of the University
  6. Electronic communication that supports instruction, research, or official work of students, faculty, administration, and staff
  7. Personal use by authorized users that does not interrupt or diminish access to resources for other users

Additional restrictions apply to use of the Internet over the Iowa Communications Network.

It is contrary to [CHANGEME] University Acceptable Use Policy to engage in any of the following behavior:

  1. Violate the "Statement of Software and Intellectual Rights". Computer software must be used in accordance with license agreements, whether it is licensed to the University or to them.
  2. Violate the Federal Copyright Law by downloading copyrighted audio, video, graphics or text materials from the Internet without proof of proper licensing arrangements.
  3. Use another person's account or PIN or give your password, PIN or identification to another person for the purpose of gaining access to a University-owned computer, network or database resource. This includes, but is not limited to, unauthorized use of an account, use of an account for a purpose for which it was not intended or use of another person's email address. Changing another person's password may be considered harassment.
  4. Access a file on a University-owned computer or network without the permission of the owner to copy, rename, modify, examine or change file protection or visibility. Lack of protection on a file does not imply right of access.
  5. Interrupt or inhibit the access of [CHANGEME] University technology resources by actions such as distributing computer viruses, worms, or bulk email. This includes any other procedures that interfere in any way with the information technology resources available to a user. Virus-scanning software is required for all student, faculty and staff computers.
  6. Display text or graphic files over the Internet that may be considered offensive in nature by some members of the [CHANGEME] community. As potential consumers of these materials, users are expected to exercise proper judgment and sensitivity as to how and where these materials are displayed.
  7. Operate a University-owned computer in a manner that is otherwise wasteful of any computing or network resource.
  8. Employ a computer to annoy or harass other users; for example, to send obscene, abusive, or threatening mail.
  9. Use a computer to violate the principles of academic honesty.
  10. Misuse information accessed while performing work as a [CHANGEME] University employee. Information stored on administrative computers and microcomputers is confidential. Use or distribution of such information other than as assigned is prohibited by University policy and State and Federal laws.
  11. Use or distribute any parts of [CHANGEME] University's administrative records that are accessed unintentionally. These include, but are not limited to information stored on disk, tape, hardcopy, microfilm as well as information on terminal screens.
  12. Use University-owned computer resources for commercial work except as permitted by faculty and staff handbooks and licensing agreements.
  13. Tamper with terminals, microcomputers, printers or any other associated University-owned equipment. Remove computer equipment, disks, paper or documentation from a computing facility. Equipment and software failures should be reported to the Office of Information Technology.
  14. Gain access to [CHANGEME] University technology resources when one is no longer eligible.
  15. Connect any device, e.g., PlayStation or network hub or router, other than a desktop computer to [CHANGEME]'s computer network.

Results of failing to follow [CHANGEME] University Acceptable Use Policy:

  1. Failure to follow the policies set forth in this document constitutes an offense.
  2. As with all matters of law and ethics, ignorance of the rules does not excuse violations.
  3. Authorized users learning of any policy violations should notify their immediate supervisor, who will notify the CIO and the appropriate division Vice President. Student violations will be reported to the Dean of Student's Office.
  4. Ethical policy abuses may result with immediate denial of service and penalties that range from the loss of computing privileges through suspension or expulsion from the University.
  5. Ethical policy abusers are liable for monetary payment and may also be liable for civil or criminal prosecution under State and Federal statutes.
  6. The Office of Information Technology will not provide support to users who fail to follow the Acceptable Use Policy.

Statement of Software and Intellectual Rights

The following statement, jointly developed by EDUCOM, a consortium of over 450 colleges and universities, and ADAPSO, the computer and software services industry association and published in "Using Software: A Guide to Ethical and Legal Use of Software for Members of the Academic Community", is used with permission.

Respect for intellectual labor and creativity is vital to academic discourse and enterprise. this principle applies to works of all authors and publishers in all media. It encompasses respect for the right to acknowledgement, right to privacy, and right to determine the form, manner, and terms of publication and distribution.

Because electronic information is volatile and easily produced, respect for the work and personal expression of others is expecially critical in computer environments. Violations of authorial integrity, plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against members of the academic community.