Responsible use of computing resources at Miami University
Miami University IT Help logo  


Did this solve your problem?
Yes No, continue to search No, open a ticket Add to favorites Email Solution Printer Friendly

Responsible use of computing resources at Miami University
Solution:

Details:

Responsible Use of Computing at Miami University

19.2.A General Statement 19.2.E Privacy and Security
19.2.B Policy 19.2.F The User's Responsibilities
19.2.C Enforcement 19.2.G The University's Responsibilities
19.2.D Sanctions 19.2.H Other Miami University Computing Policies

19.2.A General Statement

Miami University acquires, develops, and maintains computers, computer systems, and networks. These computing resources are intended for University-related use, including direct and indirect support of the University's instruction, research, and service missions; of University administrative functions; of student and campus life activities; and of the free exchange of ideas.

The rights of free expression and academic freedom apply to the use of University computing resources. So, too, however, do the responsibilities and limits associated with those rights. All who use the University's computing resources must act responsibly, in accordance with the highest standard of ethical and legal behavior. Thus, legitimate use of computing resources does not extend to whatever is technically possible. Users must abide by all applicable restrictions, whether or not they are built into the operating system or network and whether or not they can be circumvented by technical means.

This policy applies to all users of University computing resources, whether affiliated with the University or not, and to all uses of those resources, whether on campus or from remote locations. Additional policies may apply to specific computers, computer systems or networks provided or operated by specific units of the University or to uses within specific units. Some of these policies are listed in Sections 19.2.H and 19.4 of this manual.


[back to top]

19.2.B Policy

All University computing resource users must:
1. Comply with all federal, Ohio, and other applicable law; all generally applicable University rules and policies; and all applicable contracts and licenses. Examples of such laws, rules, policies, contracts, and licenses include: the laws of libel, privacy, copyright, trademark, obscenity, and child pornography; the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, which prohibit 'hacking', 'cracking', and similar activities; the University's Code of Student Conduct; the Miami University Policy and Information Manual, the University's sexual harassment policy; and all applicable software licenses. In particular, users must:

a. respect the right of others to be free from harassment or intimidation to the same extent that this right is recognized in the use of other communication; and
b. respect copyrights, intellectual-property rights, ownership of files and passwords. Unauthorized copying of files or passwords belonging to others or to the University may constitute plagiarism or theft. Accessing or modifying files without authorization (including altering information, introducing viruses or Trojan horses, or damaging files) is unethical, may be illegal, and may lead to sanctions.

Users who engage in electronic communications with persons in other states or countries or on other systems or networks should be aware that they may also be subject to the laws of those other states and countries and the rules and policies of those other systems and networks. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses.

Miami University extends these policies and guidelines to systems outside the University that are accessed via the University's facilities (e.g., electronic mail or remote logins using the University's Internet connections).


2. Use only those computing resources that they are authorized to use and use them only in the manner and to the extent authorized. Ability to access computing resources does not, by itself, imply authorization to do so. Users are responsible for ascertaining what authorizations are necessary and for obtaining them before proceeding. Accounts, passwords, and other authentication mechanisms, may not, under any circumstances, be shared with, or used by, persons other than those to whom they have been assigned by the University.


3. Respect the finite capacity of those resources and limit use so as not to consume an unreasonable amount of those resources or to interfere unreasonably with the activity of other users. Although there is no set bandwidth, disk space, CPU time, or other limit applicable to all uses of University computing resources, the University may require users of those resources to limit or refrain from specific uses in accordance with this principle. The reasonableness of any particular use will be judged in the context of all of the relevant circumstances.


4. Limit the personal use of University computing resources and refrain from using those resources for personal commercial purposes or for personal financial or other gain. Personal use of University computing resources is permitted when it does not consume a significant amount of those resources, does not interfere with the performance of the user's job or other University responsibilities, and is otherwise in compliance with this and other University policy. Further limits may be imposed upon personal use in accordance with normal supervisory procedures.

5. Refrain from stating or implying that they speak on behalf of the University and from using University trademarks and logos without authorization to do so. Affiliation with the University does not, by itself, imply authorization to speak on behalf of the University. Authorization to use University trademarks and logos may be granted only by Miami University. The use of appropriate disclaimers is encouraged. Personal web pages linked to the University Web should disclaim association with Miami University.

[back to top]

19.2.C Enforcement

Whenever it becomes necessary to enforce University rules or policies, an authorized administrator may: disallow network connections by certain computers (even departmental and personal ones); require adequate identification of computers and users on the network; undertake audits of software or information on shared systems where policy violations are possible; take steps to secure compromised computers that are connected to the network; or deny access to computers, the network, and institutional software and databases.

[back to top]

19.2.D Sanctions

Users who violate this policy may be denied access to University computing resources and may be subject to other penalties and disciplinary action, both within and outside of the University. Violations will normally be handled through the University disciplinary procedures applicable to the relevant user. Alleged violations by students will normally be investigated, and the Office of Ethics and Student Conflict Resolution will normally impose any penalties or other discipline.

However, the University, through its information managers, may suspend or block access to an account prior to the initiation or completion of such procedures; when it reasonably appears necessary to do so, and in order to protect the integrity, security, or functionality of University or other computing resources; or to protect the University from liability.

The University may also refer suspected violations of applicable law to appropriate law enforcement agencies.

[back to top]

19.2.E Privacy and Security

The University employs various measures to protect the security of its computing resources and users accounts. However, users should be aware that the University does not and cannot guarantee such security.

Users should also be aware that their uses of University computing resources are not private. While the University does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of University computing resources requires the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns, and other such activities that are necessary for the rendition of service. Systems or technical managers, as part of their technical responsibility, may occasionally need to diagnose or solve problems by examining the contents of particular files.

The University may also monitor the activity and accounts of individual users of University computing resources, including individual sessions and communications, without notice (a) when the user has voluntarily made them accessible to the public, as by posting to Usenet or a web site; (b) when it reasonably appears necessary to do so to protect the integrity, security, or functionality of University or other computing resources or to protect the University from liability; (c) when there is reasonable cause to believe that the user has violated, or is violating, this policy; (d) when an account or device appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns; or (e) when it is otherwise required or permitted by law.

Any such individual monitoring, other than that specified in '(a)', or required by law, or necessary to respond to perceived emergency situations, must be authorized in advance by the Vice President for Information Technology or a designee of same.

The University, in its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, to appropriate University personnel or law enforcement agencies and may use those results in appropriate University disciplinary proceedings. Communications made by means of University computing resources are also generally subject to Ohio's Public Records Statute to the same extent as they would be if made on paper.

[back to top]

19.2.F The User's Responsibilities

1. Be aware of the limits of computer security. Although the University employs various measures to protect the security of its computing resources and user accounts, users should be aware that the University cannot guarantee such security. Users should therefore engage in 'safe computing' practices by establishing appropriate access restrictions for their accounts, guarding their passwords, and changing them regularly.

2. Be responsible for backing up and protecting personal files. Although the University under certain circumstances may provide storage space and under certain circumstances that storage may be backed up, Miami University assumes no responsibility for the loss or recovery of personal files.

[back to top]

19.2.G The University's Responsibilities
The University owns various computers and all of the internal computer networks used on campus. The University also has various rights to the software and information residing on, developed on, or licensed for, these computers and networks. The University has the responsibility to administer, protect, and monitor this aggregation of computers, software, and networks. Specifically, purposes of the University's information technology management are to:

  1. manage computing resources so that members of the University community benefit equitably from their use;
  2. protect University computers, networks and information from destruction, tampering, and unauthorized inspection and use;
  3. communicate University policies and the responsibilities of individuals systematically and regularly in a variety of formats to all parts of the University community;
  4. establish and support reasonable standards of security for electronic information that community members produce, use, or distribute. Standards for security and access are elaborated in the document 'Miami University Computing Security Policy,' as well as in documents derived from it;
  5. monitor policies and propose changes in policy as events or technology warrant.

[back to top]

19.2.H Other Miami University Computing Policies

'Responsible Use of Computing Resources at Miami University' was adapted from The Ohio State University's Policy on Responsible Use of University Computing Resources. Miami University is grateful to The Ohio State University for allowing us to use its policy as a model.

Additional policies, including the 'Miami University Computing Security Policy', elaborate the above policies and outline procedures for implementation.

Additional policies that are not in this document may apply to specific computers, computer systems, or networks provided or operated by specific units of the University. Consult the operators or managers of these systems for further information.

[back to top]

Note:These policies are also available online at Miami University Policy & Information Manual (MUPIM) and Appendix BB of the Student Handbook



Symptoms:

Keywords: 4831 responsible use mupim computing resources policy sanction security

Applies To: Security


Solution ID: 040972654004831@kpol17 Last Modified Date: 09/27/2013 02:55:40 PM


Did this solve your problem?
Yes No, continue to search No, open a ticket Add to favorites Email Solution Printer Friendly

 
RightAnswers Inc.
RightAnswers Self-Service - Version 4.5
© RightAnswers Inc. 1999-2008