MONTANA
BOARD OF REGENTS OF HIGHER EDUCATION
Policy and Procedures Manual
SUBJECT: INFORMATION TECHNOLOGY
Policy 1303.1 - User
Responsibilities - Employees
Effective May 24, 2002; Issued
June 10, 2002
SCOPE
This policy applies to all MUS employees using MUS-owned or managed computing and information resources where access to those resources is part of their employment. It also applies to visiting faculty, "adjuncts," other persons having officially sanctioned, unpaid affiliations with a MUS campus, and any other person that has authorized access to MUS-owned or managed computing and information resources through other than student or patron status, as defined in Policy 1302. The term "user" in this policy refers to MUS employees and the other types of users described above.
Separate policies apply
to MUS student and patron users of MUS computing and information resources,
i.e., Policies 1304.1 and 1305.1
respectively.
REQUIREMENTS
Each user of the Montana University System's computing and information resources
should realize the fundamental importance of information resources and recognize
his/her responsibility for the safekeeping of those resources. Users and system
administrators must guard against abuses that disrupt or threaten the viability
of all systems, including those connected to the MUS telecommunication network,
the State telecommunication network, and other telecommunication networks to
which MUS systems are connected.
Each user is responsible for having knowledge of MUS policies concerning security,
privacy, and acceptable computing practices. Each user of MUS computing and
information resources must act responsibly. Each user is responsible for the
integrity of these resources. Each user of MUS-owned or managed computing systems
must be knowledgeable of and adhere to MUS policies, respect the rights of other
users by minimizing unnecessary network traffic that might interfere with the
ability of others to make effective use of shared resources, respect the integrity
of the physical facilities and controls, and obey all pertinent federal, state,
county, and local laws and ordinances. Each user must abide by these policies,
laws, and contractual obligations, and adhere to appropriate ethical standards.
MUS information technology resources are to be used by an employee for the job-related
activities to which the employee is assigned. An employee should not use MUS
information technology resources for private, commercial purposes, except those
covered under formal agreements with the MUS.
ENSURING COMPLIANCE
In the case of MUS staff, it is the responsibility of the supervisor to ensure that employees are aware of MUS policies and procedures concerning the use of MUS computing and information technology resources, understand them, and comply with them. In the case of visitors, adjuncts, or other affiliates who have authorized access to MUS computers and information resources, this responsibility falls to the head of the agency that sponsors or sanctions the individual in question.
REPORTING AND DISCIPLINARY
ACTION
Users of MUS information technology resources must cooperate with requests from
system administrators for information about computing activities; follow MUS
procedures and guidelines in handling diskettes and external files in order
to maintain a secure, virus-free computing environment; follow MUS procedures
and guidelines for backing up data and making sure that critical data are saved
to an appropriate location; and honor the Acceptable Use Policies of any MUS
or non-MUS networks they access through MUS facilities.
Users must report acceptable use violations and other security violations to
their immediate supervisors, to local personnel responsible for local network
policy enforcement, or to personnel responsible for the enforcement of the policies
pertinent to the violation.
Misuse of MUS computing or information resources may result in disciplinary
action appropriate to the misuse, up to and including termination of an employee.
GUIDELINES: RECOMMENDATIONS, NOT REQUIREMENTS
Example Misuses of MUS
Information Technology Resources
The following items represent, but do not fully define, misuse of information
technology resources. Note that many of these examples may be considered appropriate
uses of technology resources in specific academic or professional contexts;
determination of appropriateness is the initial responsibility of the user's
supervisor (e.g., manager, director, instructor, department chair, dean, or
provost).
History:
Item 114-104-R0102,
User Responsibilities - Employees, approved by the Board of Regents on May 24,
2002.
Table of Contents or Section 1300 Contents