Technology Usage Policies

Acceptable Use

By using or accessing Central Methodist University technology resources, the user agrees to the terms and conditions of this Acceptable Use Policy:

  • Using Central Methodist University technology resources in a manner that does not violate University policies, local, state, or federal laws and the rights and privacy of others;
  • Respecting the integrity and security of Central Methodist University technology resources and avoiding any action that interferes with the efficient operation of the technology resources or impedes the flow of information necessary for academic or administrative operations of the University;
  • Using Central Methodist University technology resources in a manner that does not infringe upon or otherwise impair, interfere with or violate any copyright or other intellectual property rights of another. This pertains to all copyrighted material, including, but not limited to music, video and software;
  • Protecting your assigned Central Methodist University account information from unauthorized use and accessing information that is your own, which is publicly available, or to which you have been given authorized access;
  • Respecting the rights and property of others, including privacy, confidentiality and intellectual property.

Purpose of the Acceptable Use Policy

The computing resources at Central  Methodist University are valuable and limited resources that serve a large number and variety of users. The use of the computing resources is a privilege that is extended to support the educational, instructional, and administrative activities of the University. As a user of these computing resources, you have access to valuable University resources and to internal and external networks. Consequently, it is important for users to behave in a responsible, ethical, and legal manner.

Scope

This policy applies to all entities using Central Methodist University technology resources which includes (but is not limited to) Central Methodist University students, alumni, faculty, staff, administration, and special guests.

Technology resources include all university owned, licensed, or managed hardware and software, and use of the university network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.

These policies apply to technology administered by the University, personally-owned computers and devices connected by wire or wireless to the campus network, and to off-campus computers that connect remotely to the University's network services.

Enforcement

Penalties for violating the Acceptable Use Policy may include restricted access or loss of access to the Central Methodist University technology resources, monetary reimbursement to the University or other appropriate sources, termination and/or expulsion from Central Methodist University and in some cases, civil and/or criminal liability.

Questions about this Acceptable Use Policy should be directed toward the Vice-President of Technology and Planning.

Unacceptable Use

Use of University computer and communication resources is a privilege. As an authorized user, you are responsible for the security and use of your computer accounts. You accept full responsibility for your accounts, your data and all activity performed on university computing resources by you or through your accounts.

You may not perform these activities:

  1. Trying to gain unauthorized access to or modification of information and files stored on Central Methodist University computing systems.
  2. Use Central Methodist University computers and network for commercial purposes.
  3. Transmitting inappropriate images, sounds, or messages which might reasonably create an atmosphere of discomfort or be considered harassing.
  4. Using Central Methodist University computing resources for commercial use resulting in a financial gain to you or someone else.
  5. Using the Central Methodist University technology resources to violate copyright laws. The majority of software and information for use on Central Methodist University computers and network is protected by federal copyright laws. In addition, software is usually protected by a license agreement between the purchaser and the software manufacturer. (The software provided through the University for use by faculty, staff and students may be used ONLY on University equipment and in the quantities specified in the various software agreements). It is Central Methodist University's policy to respect the copyright protections given to owners by federal law. It is against Central Methodist University policy for faculty, staff or students to copy or reproduce any copyrighted material or licensed software on Central Methodist computing resources, except as expressly permitted by the owner or software agreement.
    In addition, faculty, staff and students may NOT use unauthorized copies of copyrighted material or software on University-owned computers or its network. Any Central Methodist University user who reproduces copyright-protected material in "excess" of the "fair use" doctrine on Central Methodist University's resources including, but not limited to, email, Internet and other Central Methodist resources may be liable for copyright infringement.
  6. Interfering with normal operations of networks and servers. Examples include:
    1. Generating excessive network traffic - Generating traffic that impacts normal, daily network operations in a harmful manner is prohibited and is subject to disciplinary action and/or violation of Missouri statutes. Hardware connected to the Central Methodist University network that is faulty or is interfering with the normal operations MUST be disconnected upon request. Failure to disconnect malfunctioning equipment WILL result in disconnection of network connection.
    2. Network games - Any game that utilizes the Central Methodist University network and impacts its normal operations/bandwidth in a detrimental fashion is a violation of University policy and may result in a fine or suspension of network resources.
    3. Running unauthorized servers in residence hall rooms and offices. Computers providing resources to other users and computers are classified as a server.
    4. Server resources prohibited in residence halls and offices include:
      1. WINS (Windows Internet Name Service)
      2. DHCP (Dynamic Host Control Protocol)
      3. DNS (Domain Name System)
      4. FTP (File Transfer Protocol)
      5. HTTP (World Wide Web Server, Master Browser)
      6. Peer-to-Peer services
      7. MP3 Server
      8. Mail Servers
      9. Sharing of files to an unreasonable number of users as determined by context of usage and content.
  7. Attempting to bypass security measures. Examples include:
    1. Password capturing/cracking programs
    2. Packet sniffing/analyzing programs
    3. Port scanning
    4. Launching and creation of computer viruses
    5. Using passwords and usernames you are not authorized to use
    6. Accessing systems, data files or resources without authorization
    7. Using false (spoofed) IP address or Domain name.
  8. Misusing University property which includes theft or damage of equipment or software
  9. Fraudulently accessing and interfering with computer systems, resources, data or other users-for more information, see sections 569.094-569.099 of the Missouri Revised Statutes
  10. Using open mail relays on University equipment.
  11. Sharing your University accounts passwords with others, allowing anyone else to use your account, or use someone else's account.

If you are unsure, always check with the Office of Technology Services or review other University policies. Be sure to review the section on breach of policy.

Breach of Policy

For any alleged breach of CMU's policies, the reporting procedure is as follows:

  • Report of an incident must be in writing and given to the Office of Technology Services. The Technology Services Policy Committee will review the report. Reports must be first-hand accounts.
  • Report should include all pertinent information (i.e. names, dates, times). Reports must be signed and dated.