Acceptable Use Policy of Computing Resources
STUDENT, FACULTY, AND STAFF AGREEMENT TO ABIDE BY THE POLICY AND GUIDELINES FOR THE ACCEPTABLE USE OF COMPUTING RESOURCES AND INFORMATION TECHNOLOGY OF THE UNIVERSITY OF MARYLAND EASTERN SHORE
General Standards for Acceptable and Responsible Use
These guidelines set forth standards for responsible and acceptable use of University computing resources. They supplement existing University policies, agreements, and state and federal laws and regulations. Computing resources include host computer systems, University-sponsored computers and workstations, communications networks, software, and files.
Violation of these standards constitutes unacceptable use of computing resources and may violate other University policies and/or state and federal law. Suspected or known violations should be reported to the Information Security Manager immediately. Violations will be processed and adjudicated by the UMES Judicial System (for students), the UMES Grievance Committee (Faculty), the Office of Administrative Affairs (Staff) and/or law enforcement agencies. Violations may result in revocation of computing resource privileges, academic dishonesty, or Honor proceedings, as well as faculty, staff, or student disciplinary action or legal action.
The maintenance, operation, and security of computing resources require responsible University personnel to monitor and access the system. To the extent possible in the electronic environment and in a public setting, a user’s privacy will be preserved. Nevertheless, that privacy is subject to the Maryland Access to Public Records Act, other applicable state and federal laws, and the needs of the University to meet its administrative, business, and legal obligations.
Users should be aware that e-mail messages:
- might be preserved as computer files on centrally administered disks. Therefore, it is possible for people other than the user to see the messages.
- sent by one user becomes the possession of the receiver and can easily be redistributed by recipients. In this sense, the e-mail messages are not private, and all messages that should not be preserved should be deleted.
- University policy also allows system administrators to view any files, including email messages, in the course of troubleshooting system problems.
The following provisions describe conduct prohibited under these standards and guidelines:
- Altering system software or hardware configurations without authorization, or disrupting or interfering with the delivery or administration of computer resources.
- Attempting to access or accessing another’s account, private files, or e–mail without the owner’s permission.
- Misrepresenting oneself as another individual in electronic communication.
- Installing, copying, distributing, or using software in violation of: copyright and/or software agreements; applicable state and federal laws or the principles described in ”Using Software: A Guide to the Ethical and Legal Use of Software for Members of the Academic Community.”
- Using computing resources for commercial or profit-making purposes without written authorization from the University.
- Using computing resources to engage in conduct that interferes with other users’ use of share computer resources and/or the activities of other users.
- Failing to adhere to individual departmental or unit lab and system policies, procedures, and protocols.
- Allowing access to computer resources by unauthorized users.
- Using computer resources for illegal activities.
- Not ensuring that one’s use does not generate an inordinate amount of traffic that adversely affects others.
- Non UMES managed network devices (hubs, switches, access points, etc) are not authorized to connect to the UMES network.