MONTANA BOARD OF REGENTS OF HIGHER EDUCATION
 Policy and Procedures Manual

 

SUBJECT: INFORMATION TECHNOLOGY          

Policy 1304.1 - User Responsibilities - Students
Effective May 24, 2002; Issued June 10, 2002


SCOPE

This policy applies to all MUS students using MUS-owned or managed computing and information resources for student purposes. In this policy "user" refers to student user, as distinct from any role the individual may also have as an employee (Policy 1303.1) or patron (Policy 1305.1).

REQUIREMENTS

Each user of the Montana University System's computing and information resources should realize the fundamental importance of information resources and recognize his/her responsibility for the safekeeping of those resources. Users and system administrators must guard against abuses that disrupt or threaten the viability of all systems, including those connected to the MUS telecommunication network, the State telecommunication network, and other telecommunication networks to which MUS systems are connected.

Each user is responsible for having knowledge of MUS policies concerning security, privacy, and acceptable computing practices. Each user of MUS computing and information resources must act responsibly. Each user is responsible for the integrity of these resources. Each user of MUS-owned or managed computing systems must be knowledgeable of and adhere to MUS policies, respect the rights of other users by minimizing unnecessary network traffic that might interfere with the ability of others to make effective use of shared resources, respect the integrity of the physical facilities and controls, and obey all pertinent federal, state, county, and local laws and ordinances. Each user must abide by these policies, laws, and contractual obligations, and adhere to appropriate ethical standards.

MUS information technology resources should never be used for students' private, commercial purposes. Students should never, without explicit permission, modify or install software on MUS computers; attach unauthorized hardware or otherwise modify the MUS network in any manner; modify, delete, or in any way access data on another MUS user's account without explicit permission; or engage in any activity prohibited by local campus policies.

In that regard, each campus must clearly identify what MUS information technology resources are available for use by its students, and clearly identify those activities that are and are not appropriate for each resource. This includes but is not limited to use of resources such as e-mail systems, internal and external network facilities, student-accessible computer labs, and accounts on MUS-owned or operated computer systems. If a campus provides special services to residents of its university-provided housing, it must clearly identify what special services are provided and what activities are and are not appropriate in the use of those services by residents.


ENSURING COMPLIANCE

It is the responsibility of the Student Affairs Office on each campus to ensure that all students are aware of MUS policies and procedures concerning the use of MUS computing and information technology resources, understand them, and comply with them. In the case of special services provided to residents of university-provided housing, it is the responsibility of the campus housing operation unit to ensure that residents are aware of and comply with separate policies that govern the use of special services available only to housing residents.

REPORTING AND DISCIPLINARY ACTION

Users of MUS information technology resources must cooperate with requests from system administrators for information about computing activities; follow MUS procedures and guidelines in handling diskettes and external files in order to maintain a secure, virus-free computing environment; follow MUS procedures and guidelines for backing up data and making sure that critical data are saved to an appropriate location; and honor the Acceptable Use Policies of any MUS or non-MUS networks they access through MUS facilities.

Users must report acceptable use violations and other security violations to their immediate supervisors, to local personnel responsible for local network policy enforcement, or to personnel responsible for the enforcement of the policies pertinent to the violation.

Misuse of MUS computing or information resources will result in disciplinary action appropriate to and consistent with BOR policies and the campus Student Conduct Code.

GUIDELINES: RECOMMENDATIONS, NOT REQUIREMENTS

History:
Item 114-104-R0102, User Responsibilities - Students, approved by the Board of Regents on May 24, 2002.


Table of Contents  or Section 1300 Contents

 

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.