Effective: Fall 2000
Computing services at Southwestern Oklahoma State University are provided to promote administrative, educational, and research efforts of the faculty, students, and staff. All persons utilizing these services are responsible to ensure that computing resources are used in an ethical and lawful manner. The following basic principles and examples provide a general framework for determining acceptable behavior and conduct when using university provided computing resources.
Use university computing resources for appropriate university activities only.
University computer systems shall not be used for unauthorized political activities or unauthorized commercial purposes.
Unauthorized copies of copyrighted material shall not be created, distributed, or knowingly utilized.
Do no harm to the computing environment.
Users shall not attempt to degrade or manipulate system-wide performance or capability.
Users are responsible for specialized hardware and/or software that they have installed on university computers.
Do no harm to other system users.
Obscene, threatening, harassing, or intimidating material shall not be entered into the computer or sent by electronic means.
Users shall not examine, change, or use another person's (or institutional) username, password, files, or e-mail.
Users shall always identify themselves appropriately.
Users are responsible for all usage of their accounts. They should never permit others to use their accounts.
Electronic media on all SWOSU systems is as private as is feasibly possible. System administrators will not access another person's data unless necessary in the course of their duties and will treat the data as confidential. Unauthorized attempts to access another person's data will be treated with the utmost seriousness.
All individuals using computer and network systems owned by the University are subject to applicable laws and University policies. Violations are subject to disciplinary action. The University may immediately suspend the computer/network privileges of alleged violators, subsequently ensuring due process. The University will provide proportional sanctions for policy violations, including but not limited to reprimand, temporary or permanent removal of computer/network privileges, dismissal from the University, and legal action. Violations of this policy may constitute a criminal offense, punishable by local, state, or federal law.