Acceptable Use Policy of Computing Resources
STUDENT, FACULTY, AND STAFF AGREEMENT TO ABIDE BY THE POLICY AND GUIDELINES FOR THE ACCEPTABLE USE OF COMPUTING RESOURCES AND INFORMATION TECHNOLOGY OF THE UNIVERSITY OF MARYLAND EASTERN SHORE
General Standards for Acceptable and Responsible Use
These guidelines set forth standards for responsible and acceptable use of University computing resources. They supplement existing University policies, agreements, and state and federal laws and regulations. Computing resources include host computer systems, University-sponsored computers and workstations, communications networks, software, and files.
Violation of these standards constitutes unacceptable use of computing resources and may violate other University policies and/or state and federal law. Suspected or known violations should be reported to the Office of the Vice President of Information Technology, the Vice President of Student Affairs, and/or the Chief of Police of the University of Maryland Eastern Shore. Violations will be processed and adjudicated by the UMES Judicial System (for students), the UMES Grievance Committee (Faculty) and/or law enforcement agencies. Violations may result in revocation of computing resource privileges, academic dishonesty, or Honor proceedings, as well as faculty, staff, or student disciplinary action or legal action.
The maintenance, operation, and security of computing resources require responsible University personnel to monitor and access the system. To the extent possible in the electronic environment and in a public setting, a user’s privacy will be preserved. Nevertheless, that privacy is subject to the Maryland Access to Public Records Act, other applicable state and federal laws, and the needs of the University to meet its administrative, business, and legal obligations.
- might be preserved as computer files on centrally administered disks. Therefore, it is possible for people other than the user to see the messages.
- sent by one user becomes the possession of the receiver and can easily be redistributed by recipients. In this sense, the e-mail messages are not private, and all messages that should not be preserved should be deleted.
- University policy also allows system administrators to view any files, including email messages, in the course of troubleshooting system problems.
The following provisions describe conduct prohibited under these standards and guidelines:
Users of the University’s data network must read, agree to, and sign this agreement stating that they have read and will abide by University policies set forth in the University’s Guidelines for the Acceptable Use of Computing Resources before they are permitted to use UMES Computing Resources.