Acceptable Use Policy
ACCEPTABLE USE OF COMPUTING RESOURCES POLICY
POLICY
Western Oregon University requires professional behavior and acceptable use of computing resources, including the MIDI/Keyboard lab in APS 102.
PURPOSE
The intent of this document is to promote the responsible use of University Computing Resources, not to discourage their use.
1. Appropriate Use of Computing Resources
- 1.1 When you are provided access to University Computing Resources, your use of them may be explicitly or implicitly limited. For example, if you have access to administrative systems, you should use them solely for the purpose for which the access was provided.
- 1.2 The situation with academic timesharing computers and microcomputer labs is less narrowly defined. As with the University Library, access academic computing resources is provided in part so you can learn, explore, grow, or discharge your responsibilities as part of your education or employment at the university. However, activities related to the university’s scholarly mission take precedence over computing pursuits of a more personal or recreational nature. For example, those completing class assignments or conducting research have priority over those using computing resources to process personal email, explore network, resources, etc.
- 1.3 Some applications (such as Muds/Moos/Mucks/Mushes, IRC, Talk, Chat, and on-line computer games) are generally unsupported and actively discouraged, due to the demands they place on our limited modem pool, central processing capacity, and computer lab resources. Please cooperate with university staff if you are asked to refrain from running applications like these when resource use is heavy.
- 1.4 Unauthorized use or misuse of University Computing Resources may theft of services, and may be criminally punishable. Violators may also be civilly liable for the value of the stolen resource.
2. Prohibited Conduct
- 2.1 The Code of Student Responsibility prohibits, among other things, lewd or indecent conduct, threat of imminent physical harm, sexual or other harassment, stalking, forgery, intentional disruption of university services, and damaging or destroying university property. Similarly, the code’s prohibitions against illegal discrimination, including discriminatory harassment and sexual harassment also apply to electronic forums.
3. Violations of Electronic Privacy
- 3.1 Access to electronic files, network communications, and related data are protected by various federal statutes, including the Electronic Communications Privacy Act. Like an unauthorized telephone wiretap, unauthorized access to a person’s electronic data is prohibited, and may subject the perpetrator to serious penalties. Examples of specifically prohibited behaviors include:
- unauthorized interception or diversion of network transmissions,
- accessing clearly confidential files that may be inadvertently publicly readable, and
- accessing confidential information about a person (such as their educational records) without their consent or other authorization.
- 3.2 Keep in mind that shared systems are inherently insecure. Authorized computing staff may access accounts and transmissions for trouble-shooting and maintenance–and, if there is reasonable suspicion of misuse, they may access them for investigative purposes. Security systems whose purpose is to identify unauthorized users of a system may also be used to monitor authorized users.
- 3.3 In general, material whose privacy must be guaranteed should not be stored on shared computers. Good quality encryption tools (such as PGP, Pretty Good Privacy) are now widely available, and should be used whenever working with information of a sensitive nature.
4. Interference with Computer Use or Operations
- 4.1 Efforts to interfere with the use or operation of University Computing Resources are prohibited. These include:
- distribution of computer viruses, worms, trojan horse programs, email “bombs,” etc.;
- actions that result in the denial of service to other users by triggering system security features, or intentionally
- disconfiguring equipment to render it unusable;
- forged or counterfeited email messages;
- posting USENET news articles to inappropriate news groups, posting to moderated news groups without the approval of the moderator, or cross-posting articles to many news groups simultaneously “spamming”); and
- interference with the use of microcomputers, X terminals, or other workstations by the unauthorized display of output on such devices without the assent of the individual currently using the device.
- 4.2 We ask that you cooperate with system administrators if you are advised of potential security problems with your account or system.
5. Free Speech
- 5.1 We all enjoy our constitutionally protected right to free speech and the tradition of academic freedom here at the university. However, with these freedoms comes responsibility for what you say and write. If you defame someone on-line or invade his or her privacy, you may be sued. Exercise your freedom to speak out, but please do so responsibly and in a way that reflects creditably to the university.
6. Wise Use of Limited Resources
- 6.1 Given the university’s limited resources, as well as the direct costs associated with wasteful behavior (such as printing output that isn’t needed), we ask that you be careful how you use computing resources, especially:
- tangible resources (such as printing) where excessive use translates into additional real costs; and
- shared finite resources (e.g., dial-in modem time, disk space, or Internet bandwidth), where selfish behavior on the part of a few can prevent many others from doing their work.
- Please cooperate in making the most of the limited resources we have available.
7. Commercial Use of Resources Prohibited
- 7.1 The university does not want to unwittingly underwrite some activities by providing access to computing resources which could then be commercially exploited. Moreover, in many instances the university negotiates special academic pricing agreements for obtaining the computing resources it needs. Most such agreements are contingent upon the university prohibiting commercial use of the resources. Breaching educational licensing agreements could have serious financial consequences for Western Oregon University.
- 7.2 Using University Computing Resources to transmit or propagate chain letters is explicitly prohibited.
PROCEDURES OF AUTHORITY
The Code of Student Responsibility, OAR 574-30-046, applies as well as:
8. Recognition of Copyrights and Intellectual Property Rights
- 8.1 Western Oregon University respects copyright laws and insists that its faculty, students, and staff do likewise. Copying proprietary software is theft, and will not be tolerated on campus. Illegally copying software subjects the university to the risk of litigation and denies software authors the compensation they deserve. Moreover, use of such software could result in suspension or dismissal from the university, and either criminal prosecution or a civil suit for copyright infringement, or both.
- 8.2 Similarly, if you make materials available for others to retrieve or use (via a World Wide Web server, postings to a USENET news group, etc.), be sure to respect their copyrights and intellectual property rights. In general, every document, image, or sound is protected by the U.S. copyright laws upon creation and may only be used or redistributed with the permission of the copyright holder.
PROCEDURES OF RESPONSIBILITY
Individuals are personally responsibility for on-line statements.
9. Disciplinary Action
- Violations of computing acceptable-use policies that constitute a breach of the Code of Student Responsibility, Faculty Handbook, or other appropriate and pertinent OUS and Western Oregon University rules and regulations will be referred to appropriate authorities. University personnel may take immediate action as needed to abate ongoing interference with network and system operations or to ensure system integrity.