Acceptable Use of Computing and Electronic Resources Policy: Difference between revisions
imported>Mcnaneym No edit summary |
imported>Deaskc |
||
Line 1: | Line 1: | ||
Policy 901 | Policy 901 | ||
== Introduction == | == Introduction == | ||
The University provides computer access and capabilities through Information Technology Services and various Colleges and departments. The University relies heavily upon these systems to meet operational, financial, educational and informational needs. It is essential that Appalachian's computer systems, and computer networks, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. It is critical that these systems and machines be protected from misuse and unauthorized access. This policy applies to all University computer systems and refers to all hardware, data, software and communications networks associated with these computers. In particular, this policy covers computers ranging from multi-user timesharing systems to single user personal computers, whether stand-alone or connected to the network. In addition to this computer policy, users of these computer systems are subject to applicable state and federal laws. Computer abuse will be referred to the Chief Information Officer, the Director of Technology Support Services and/or the appropriate person affiliated with a college or department computer facility. Computing resources are valuable, and their abuse can have a far-reaching negative impact. Computer abuse affects everyone who uses computing facilities. The same morality and ethical behavior that applies in the non-computing environment applies in the computing environment. | |||
== Scope == | == Scope == |
Revision as of 16:09, 26 September 2011
Policy 901
Introduction
The University provides computer access and capabilities through Information Technology Services and various Colleges and departments. The University relies heavily upon these systems to meet operational, financial, educational and informational needs. It is essential that Appalachian's computer systems, and computer networks, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. It is critical that these systems and machines be protected from misuse and unauthorized access. This policy applies to all University computer systems and refers to all hardware, data, software and communications networks associated with these computers. In particular, this policy covers computers ranging from multi-user timesharing systems to single user personal computers, whether stand-alone or connected to the network. In addition to this computer policy, users of these computer systems are subject to applicable state and federal laws. Computer abuse will be referred to the Chief Information Officer, the Director of Technology Support Services and/or the appropriate person affiliated with a college or department computer facility. Computing resources are valuable, and their abuse can have a far-reaching negative impact. Computer abuse affects everyone who uses computing facilities. The same morality and ethical behavior that applies in the non-computing environment applies in the computing environment.
Scope
Definitions
Definition phrase or word
- Definition summary