Personal tools
Navigation
Tools

Acceptable Use of Computing and Electronic Resources Policy

From Appalachian State University Policy Manual

Revision as of 16:09, 26 September 2011 by Deaskc (Talk | contribs) (Introduction)

Jump to: navigation, search

Policy 901

1 Introduction

The University provides computer access and capabilities through Information Technology Services and various Colleges and departments. The University relies heavily upon these systems to meet operational, financial, educational and informational needs. It is essential that Appalachian's computer systems, and computer networks, as well as the data they store and process, be operated and maintained in a secure environment and in a responsible manner. It is critical that these systems and machines be protected from misuse and unauthorized access. This policy applies to all University computer systems and refers to all hardware, data, software and communications networks associated with these computers. In particular, this policy covers computers ranging from multi-user timesharing systems to single user personal computers, whether stand-alone or connected to the network. In addition to this computer policy, users of these computer systems are subject to applicable state and federal laws. Computer abuse will be referred to the Chief Information Officer, the Director of Technology Support Services and/or the appropriate person affiliated with a college or department computer facility. Computing resources are valuable, and their abuse can have a far-reaching negative impact. Computer abuse affects everyone who uses computing facilities. The same morality and ethical behavior that applies in the non-computing environment applies in the computing environment.

2 Scope

3 Definitions

3.1 Definition phrase or word

Definition summary


4 Policy and Procedure Statements

4.1 Example policy 1

4.2 Example policy 2

5 Additional References

6 Authority

7 Contact Information

8 Effective Date

9 Revision Dates