Page tree
Skip to end of metadata
Go to start of metadata

Acceptable Use Policy of Computing Resources


General Standards for Acceptable and Responsible Use

These guidelines set forth standards for responsible and acceptable use of University computing resources. They supplement existing University policies, agreements, and state and federal laws and regulations. Computing resources include host computer systems, University-sponsored computers and workstations, communications networks, software, and files.

Violation of these standards constitutes unacceptable use of computing resources and may violate other University policies and/or state and federal law.  Suspected or known violations should be reported to the Information Security Manager immediately.  Violations will be processed and adjudicated by the UMES Judicial System (for students), the UMES Grievance Committee (Faculty), The Office of Administrative Affairs (Staff) and/or law enforcement agencies.  Violations may result in revocation of computing resource privileges, academic dishonesty, or Honor proceedings, as well as faculty, staff, or student disciplinary action, civil penalties, and/or criminal prosecution.


The maintenance, operation, and security of computing resources require responsible University personnel to monitor and access the system. Users shouldn’t have an expectation of privacy, though the University will attempt to preserve user privacy and identity to the best of it’s ability. Nevertheless, that privacy is subject to the Maryland Access to Public Records Act, other applicable state and federal laws, and the needs of the University to meet its administrative, business, and legal obligations. All IT resources are the property of the institution, and as such, the University reserves the rights to search and monitor users’ accounts and usage of University IT resources, including e-mail and files.

Users should be aware that the following conditions apply:

  • Electronic files and e-mail might be preserved as computer files on centrally administered disks or cloud hosted storage. Therefore, it is possible for people other than the user to see the messages. 
  • E-Mails or files sent by one user become the possession of the receiver and can easily be redistributed by recipients. In this sense, the e-mail messages and files are not private, and all data that should not be preserved should be deleted. 
  • University policy also allows system administrators to view any files, including email messages, in the course of troubleshooting system problems.
  • In the event of a personnel issue or investigation, IT staff may be required to provide access to University Counsel, Title IX Administrator, or other delegated individuals at the request of a cabinet officer.

User Responsibilities

The following provisions describe conduct prohibited under these standards and guidelines:

  1. Altering system software or hardware configurations without authorization, or disrupting or interfering with the delivery or administration of computer resources. 
  2. Attempting to access or accessing another’s account, private files, or e–mail without the owner’s permission.
  3. Misrepresenting oneself as another individual in electronic communication. 
  4. Installing, copying, distributing, or using software in violation of: copyright and/or software agreements; applicable state and federal laws or the principles described in “Using Software: A Guide to the Ethical and Legal Use of Software for Members of the Academic Community.” 
  5. Using computing resources for commercial or profit-making purposes without written authorization from the University. 
  6. Using computing resources to engage in conduct that interferes with other users’ use of share computer resources and/or the activities of other users. 
  7. Failing to adhere to individual departmental or unit lab and system policies, procedures, and protocols. 
  8. Allowing access to computer resources by unauthorized users. 
  9. Using computer resources for illegal activities. 
  10. Not ensuring that one’s use does not generate an inordinate amount of traffic that adversely affects others. 
  11. Non UMES managed network devices (hubs, switches, access points, etc) are not authorized to connect to the UMES network.
  12. Encrypting University data without express permission of the IT department.
  13. Sharing accounts between users.