Personal tools
Navigation
Tools

Difference between revisions of "Acceptable Use of Computing and Electronic Resources Policy"

From Appalachian State University Policy Manual

Jump to: navigation, search
(Introduction)
Line 1: Line 1:
 
Policy 901
 
Policy 901
 
== Introduction ==
 
== Introduction ==
You may copy this page's source to start a new policy page. Be sure to remove or overwrite the examples. Second level headings should NOT be altered.
+
The University provides computer access and capabilities through Information Technology Services and various Colleges and departments. The University relies heavily upon these systems to meet operational, financial, educational and informational needs. It is essential that Appalachian's computer systems, and computer networks, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. It is critical that these systems and machines be protected from misuse and unauthorized access. This policy applies to all University computer systems and refers to all hardware, data, software and communications networks associated with these computers. In particular, this policy covers computers ranging from multi-user timesharing systems to single user personal computers, whether stand-alone or connected to the network. In addition to this computer policy, users of these computer systems are subject to applicable state and federal laws. Computer abuse will be referred to the Chief Information Officer, the Director of Technology Support Services and/or the appropriate person affiliated with a college or department computer facility. Computing resources are valuable, and their abuse can have a far-reaching negative impact. Computer abuse affects everyone who uses computing facilities. The same morality and ethical behavior that applies in the non-computing environment applies in the computing environment.
  
 
== Scope ==
 
== Scope ==

Revision as of 16:09, 26 September 2011

Policy 901

1 Introduction

The University provides computer access and capabilities through Information Technology Services and various Colleges and departments. The University relies heavily upon these systems to meet operational, financial, educational and informational needs. It is essential that Appalachian's computer systems, and computer networks, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. It is critical that these systems and machines be protected from misuse and unauthorized access. This policy applies to all University computer systems and refers to all hardware, data, software and communications networks associated with these computers. In particular, this policy covers computers ranging from multi-user timesharing systems to single user personal computers, whether stand-alone or connected to the network. In addition to this computer policy, users of these computer systems are subject to applicable state and federal laws. Computer abuse will be referred to the Chief Information Officer, the Director of Technology Support Services and/or the appropriate person affiliated with a college or department computer facility. Computing resources are valuable, and their abuse can have a far-reaching negative impact. Computer abuse affects everyone who uses computing facilities. The same morality and ethical behavior that applies in the non-computing environment applies in the computing environment.

2 Scope

3 Definitions

3.1 Definition phrase or word

Definition summary


4 Policy and Procedure Statements

4.1 Example policy 1

4.2 Example policy 2

5 Additional References

6 Authority

7 Contact Information

8 Effective Date

9 Revision Dates