Abuse Statement

Tags policy

What Is It?

Statement regarding responsible use of computers and network systems

STATEMENT REGARDING RESPONSIBLE USE OF COMPUTERS AND NETWORK SYSTEMS

For inclusion in the Tech Catalog and Student Handbook
 
The use of computers or network systems in no way exempts any member of the University community from the normal requirements of ethical or legal behavior in the Tech community. In particular, data, software, and computer capacity have value and must be treated accordingly. Use of a computer and network system that is shared by many users imposes certain additional obligations. Legitimate use of a computer or network system does not extend to whatever an individual is capable of doing with it. Although some rules are built into the system itself, these restrictions cannot limit completely what an individual can do or can see. In any event, each member of the community is responsible for his/her actions whether or not rules are built in, and whether or not they can be circumvented. Members of the Tech community are expected to follow certain principles of behavior in making use of computers and network systems, in particular, to respect, and to observe policies and procedures governing:
* The privacy of or other restrictions placed upon data or information stored in or transmitted across computers and network systems, even when that data or information is not securely protected; 
* An owner's interest in proprietary software or other assets pertaining to computers or network systems, even when such software or assets are not securely protected; 
* The finite capacity of computers or network systems by limiting use of computers and network systems so as not to interfere unreasonably with the activity of other users. 
 
Members of the College community also are expected to follow all other policies, rules, or procedures established to manage computers or network systems, including those established to control access to, or the use of, computer data, files, or other information. Those who cannot accept these standards of behavior will be denied use of Montana Tech computers or network systems. Violators may also be subject to penalties under College regulations and under state and federal laws. Policies and statements regarding the Responsible Use of Electronic Communications and Abuse of Montana Tech Computers and Network Systems are posted on the Montana Tech WEB site and are accessible at the following URL: http://www.mtech.edu

Details

Article ID: 78351
Created
Wed 5/15/19 8:43 AM
Modified
Tue 10/27/20 11:07 AM

Related Articles (12)

Guidelines for use of the computing systems and facilities located at, or operated by Montana Tech
The most important thing to remember is that every email you send from a Montana Tech account represents the entire campus, not just you.
It is recognized the policies contained herein are subject to change as technology, campus mission and organization, and economic priorities advance. To ensure that these policies are kept up to date and reflect current needs, this statement of policy is necessary.
This procedure describes the steps which are to be taken for physical and computer security incidents which occur within the Montana Tech facility.
Procedures for dealing with computer security incidents
This policy describes the requirements and constraints for attaching a computer to the Montana Tech local area network (LAN). All devices connected o the Montana Tech network must meet minimum-security requirements.
The core of the Institute is the many security practitioners in government agencies, corporations, and universities around the world who invest hundreds of hours each year in research and teaching to help the entire SANS community.
In response to the increasing number of support requests made to Information Technology (IT) regarding personally owned computing devices (POCD), Montana Tech IT has established an official POCD support policy. The purpose of this policy is to define the support options available for personally owned computing devices.
Whether you call it borrowing, copying, sharing or "fair use," software piracy is illegal and puts Montana Tech's students, faculty and staff, as well as the college itself, at risk for legal action.
This agreement outlines the many do's and do not's of using special access accounts. Special access is defined as having the privilege and password to use domain administrator accounts.
This policy provides a set of requirements for the regulation of special access use on the Montana Tech Computer System. This policy will provide a mechanism for the addition and removal of people from the special access status and a mechanism for periodic reviews of the special access status.
This document establishes computer usage guidelines for the Montana Tech support staff in the course of their job duties on the Montana Tech Campus Computer Systems. These guidelines are intended to protect the rights and privacy of Montana Tech clients as well as those of the Montana Tech support staff.