Nothing Special   »   [go: up one dir, main page]

Academic Computer Use

Updated: June 20, 2022
Policy:
REG08.05.10
Title:
Academic Computer Use
Category:
Information Technology
Sub-category:
Security and Compliance
Authority:
Chancellor
Contact:

Chief Information Officer, (252) 328-9000

Additional References:
History:

ITCS Policy No. 1.600 (supersedes policy dated April 17, 1998); Revised and placed in University Policy Manual April 30, 2018.
Approved by Chancellors Executive Council to move from interim to permanent status June 20, 2022.

Previous Versions:

No previous versions available.

1. Introduction

  • 1.1. Purpose
    To govern the use of university computer systems, which includes hardware, data, software and communication networks.
  • 1.2. General Statement
    • 1.2.1. Freedom of expression and academic freedom are limited to no greater degree in electronic formats than in printed or oral communication. Individual faculty members are entitled to full freedom in research and in the publication of results. Academic freedom includes freedom of artistic expression through electronic means as well as in familiar and traditional media. Intellectual property in electronic form is as fully protected as are those properties in other forms. Individual faculty members are entitled to freedom in the classroom in discussing their subject, including those formats used in virtual spaces and areas where communication is inherent in the teaching and learning process.
    • 1.2.2. The university provides academic access to a functioning system of electronic communication on a nondiscriminatory basis, without regard to the perceived merit of a particular content or subject matter or the views of users. Equality of access is assured without regard to race, gender, nationality, age, religion, disability, or sexual orientation.
    • 1.2.3. The university relies heavily upon its computer information systems to meet operational, financial, educational and informational needs. It is essential that East Carolina University’s computer systems, and computer networks, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. It is critical that these systems and machines be protected from misuse and unauthorized access.
    • 1.2.4. This policy applies to university computer systems and refers to hardware, data, software and communications networks associated with these computers. In particular, this policy covers computers ranging from multi-user timesharing systems to single user personal computers, whether stand-alone or connected to the network.
    • 1.2.5. Individual faculty members shall make every effort to show that they are not speaking for the university when they are not. Special care shall be taken in posting or distributing digital material, on a web page or site created and accessed through the university computing system. Individual faculty members must avoid or dispel any inference that the speaker represents the views of the university or of faculty colleagues. Individual faculty members are responsible for following federal, state, University of North Carolina Board of Governors, and university laws and policies.

2. Regulatory Limitations

  • 2.1. The university may monitor access to the equipment and networking structures and systems to insure the security and operating performance of its systems and networks and to enforce university policies. Monitoring or otherwise accessing individual faculty member’s computers to enforce university policies requires specific approval of the Chancellor or the Chancellor’s designee.
  • 2.2. The university reserves the right to limit access when federal or state laws or university policies are violated or where university contractual obligations or university operations may be impeded.
  • 2.3. The university may authorize confidential passwords or other secure entry identification; however, employees have no expectation of privacy in the material sent or received by them over the university computing systems or networks. While general content review will not be undertaken, monitoring of this material may occur for the reasons specified above. Again, monitoring or otherwise accessing individual faculty members’ computers to enforce university policies requires specific approval of the Chancellor or the Chancellor’s designee.
  • 2.4. The university generally does not monitor or restrict material residing on university computers housed within a private domicile or on non-university computers, whether or not such computers are attached or able to connect to campus networks.
  • 2.5. All material prepared and utilized for work purposes and posted to or sent over university computing and other telecommunication equipment, systems or networks must be accurate and must correctly identify the creator and receiver of such.

3. Permissible Uses

  • 3.1. Faculty members are expected to follow this policy and any related university rules, regulations and procedures for university work produced on computing equipment, systems and networks. Faculty members may access these technologies for personal uses if the following restrictions are followed.
    • 3.1.1. The use is lawful under federal or state law.
    • 3.1.2. The use is not prohibited by Board of Governors, university or institutional policies.
    • 3.1.3. The use does not overload the university computer equipment or systems, or otherwise harm or negatively impact the system’s performance.
    • 3.1.4. The use does not result in commercial gain or private profit (other than allowable under university intellectual property policies.
    • 3.1.5. The use does not violate federal or state laws or university policies on copyright and trademark.
    • 3.1.6. The use does not state or imply university sponsorship or endorsement.
    • 3.1.7. The use does not violate state or federal laws or university policies against race or sex discrimination, including sexual harassment.
    • 3.1.8. The use does not involve unauthorized passwords or identifying data that attempts to circumvent system security in any way attempts to gain unauthorized access.

4. Other Computer Usage Guidelines

  • 4.1. Users are to have valid, authorized accounts and may only use those computer resources which are specifically authorized. Users are responsible for taking reasonable precautions to safeguard their own computer account.
  • 4.2. Users who choose to publish home pages on the World Wide Web must identify themselves as the author. In addition, they must include a disclaimer that any personal home page content reflects their own views and not necessarily that of the university. Furthermore, any links to other Web resources must be identified.
  • 4.3.Users may not change copy, delete, read or otherwise access files or software owned by other parties without permission of the custodian of the files or the system administrator. Users may not bypass accounting or security mechanisms to circumvent data protection schemes. Users may not attempt to modify software except when intended to be user customized.
  • 4.4. Users shall assume that any software they did not create is copyrighted. They may neither distribute copyrighted proprietary material without the written consent of the copyright holder nor violate copyright or patent laws concerning computer software, documentation or other tangible assets.
  • 4.5. Users must not use the computer systems to violate any rules in the East Carolina University faculty manual, or any local, state or federal laws.
  • 4.6. University policies stated in the faculty manual of which individual faculty members should be aware that may bear on computer use include: Part IV, Section V, External Professional Activities for Pay; Part VII, Section II.G., Copyright Procedures; and Appendix I, East Carolina University Policy on Conflicts of Interest and Commitment.
  • 4.7. North Carolina statutes of which individual faculty members should be aware that may bear on computer use include: 14-190-1, Obscene Literature and Exhibitions; 114-15.1., Denial of Computer Services to an Authorized User and 114-14.1 Department Heads to Report Possible Violations of Criminal Statutes Involving Misuse of State Property to the State Bureau of Investigation.
  • 4.8. United States statutes of which individual faculty members should be aware that indirectly may bear on computer use include: Title 18, Section 1030, Fraud and Related Activity in Connection with Computers.