12/May/1998

Western New Mexico University

Acceptable Use Policy (AUP) for Computing Resources

1.       Purpose

The purposes of these policies and procedures are to cultivate computer use at Western New Mexico University (the University) and to regulate computer and network use as necessary to protect individual privacy, to provide an equitable sharing of limited resources and to promote responsibility in the use of University computing resources.

2.       Policy

The University's general policies for use of its computer systems and equipment are:

A.      All computer users have the responsibility to use the University computing and networking systems in an effective, efficient, ethical and lawful manner.

B.       The use of the University computing facilities is a privilege, not a right. The University may protect legitimate facilities uses by imposing sanctions on users who abuse the privilege, including the loss of the privileges.

C.       Computer users shall:

(1)     Respect the intended use of accounts established for their use;

(2)   Respect the integrity of the University computing and networking systems; (3) Respect the privacy of other computer users;

(3)     Respect the rules, regulations and procedures governing the use of University computing facilities, equipment and systems, including those of the University's official server(s);

(4)     respect the proprietary rights of software owners and comply with all copyright laws, treaties and compacts of the United States and all laws of the state of New Mexico, including the New Mexico Computer Crimes Act, Sections 30‑ to 30‑45‑7, New Mexico Statutes Annotated (1978 Compilation).

D.      The University computer systems and networks are dedicated to the educational mission of the University. In addition to these policies and procedures, standards of common sense and common decency must be applied in determining what uses are proper when using the public resources of the University.

E.       The University shall not provide computer access to persons or entities not affiliated with the University as that would violate Article IX, Section 14, of the Constitution of New Mexico, which prohibits donations by the state to private individuals or entities.

F.          The University acknowledges that the computer medium provides its students, faculty and staff opportunities for research, dialogue and expression. However, the University and each computer user has the responsibility to use each of the computing and networking systems, which are public property, in a manner related to the educational process for which they are intended.

Procedures

3.        Computer Accounts in General. All computer accounts shall be the property of the University. The privileges of such accounts shall be given by authorized units, departments and offices of the University for specific academic, administrative and other authorized University uses.

4.        Account Protection. The integrity of the University computer systems shall be maintained by the protection of accounts through use of passwords. Any violation of the integrity of a University computer system shall be deemed to be a prohibited misappropriation of University property and will subject the violator to discipline and loss of computer privileges.

A.      Attempts to perform any of the following acts are among such prohibited actions:

(1)     Make an account available to any person not authorized access by the university;

(2)     Defeat the security system of any computer;

(3)     Circumvent the accounting system;

(4)     Access and/or use an account without authorization;

(5)     Use accounts for other than intended purposes;

(6)     Misappropriate the data or files of another person;

(7)     Download or upload copyrighted material; or

(8)     Use University computing and networking resources to gain unauthorized access to any computer system.

5.        Resource Limits. The University reserves the authority to establish storage and memory limits of accounts. If resources are low, the account holder should notify the course instructor, Academic Computing, the Information Systems Department, or the authorizing manager or department head, whichever is appropriate for that account.

6.        Session Limits. The University may limit a computer user's session if there are insufficient resources or if the user is determined by appropriate authorities to be acting in an irresponsible or unlawful manner. The University may also cancel, restart, or place a hold on a job, process or program to protect or improve system performance.

7.        Protection of the System. Responsible continued use of the University computing and networking systems requires that each user:

A.      Refrain from development or use of programs or utilities which:

(1)     harass or interfere with other University computer users;

(2)     infiltrate or modify the system or an account ; or

(3)     damage the hardware or software components of the system

B.       When requested, cooperate with systems administrators in investigations of systems abuse; and report suspected abuse, especially any damage to or problems with the user's files.

8.       Non‑Confidentiality. The University recognizes that users might believe computer files and e‑mail messages to be confidential; however, such files and messages are subject to access by Academic Computing and/or Information Systems during system maintenance as well as when there is a report of suspected unlawful or improper activities to the proper University or other governmental authorities. Although the University will not routinely review user's e‑mail or files, the University reserves the right to review all information on any University server. Users' files are not confidential.

9.        Rules. In addition to these policies and procedures, the University has various specific rules, regulations and procedures which govern the use of computing and networking equipment and facilities located around the University and which are posted in labs or readily available in printed form. Each computing site and environment has operators, consultants and/or supervisors who have the responsibility of the use of that site. Users shall abide by the rules, regulations and procedures of the University, users shall cooperate with operators, consultants and supervisors.

10.     Consultation. Computer users are encouraged to consult with Academic Computing or Information Systems personnel (Or other appropriate University consultants) regarding computer use. However, obtaining assistance in completing computer related academic assignments is prohibited unless permission for consultation is given by the instructor.

11.     Copyrights and Licenses. Computer users shall not copy software protected by copyrights or software licenses except as specifically allowed by the licensing agreements or other stipulations of the owner. Making and distributing copies shall not be done in such a way that the number of simultaneous users exceeds the number of original copies purchased, unless otherwise stipulated in the purchase contract. Computer users at the University should presume that software is copyrighted unless they have specific knowledge to the contrary.

12.     Recreational and Personal Use. There are uses of University computing and networking systems which are improper. Reasonable recreational and other personal uses are allowed, provided such use does not interfere with academic use, violate any University policy or procedure or law. The responsibility to use good judgement to avoid improper use resides with the user. All such improper uses cannot be anticipated or listed here; but some uses are:

A.      Under no circumstances may games be played, or other recreational uses occur, when such use would interfere with the availability of facilities for academic use.

B.       Certain other activities are expressly prohibited. These include but or not limited to:

1.        Commercial activities or advertising,

2.        Libelous statements that would damage a person,

3.        Use of computers to harass or threaten a person,

4.        Dissemination of licensed software, and

5.        Invasion or violation of personal property.

13.     Sanctions. Failure to abide by the guidelines set forth in the foregoing policies and procedures shall subject any user of the University computing and networking systems to sanctions, which may result in denial of computer account privileges and/or other disciplinary action, which could lead to expulsion from the University, dismissal from a position, or legal action.

14.     Administration. These policies and procedures shall be administered by the Director of Information Systems and the Director of Academic Computing (the Directors), with oversight by the Executive Committee.

A.      Student concerns not resolved by the Directors may be presented to the office of the Vice President for Academic Affairs. B. Faculty concerns not resolved by the Directors may be presented to the Executive Committee.

B.       Administrative concerns not resolved by the Director of Info. Systems may be presented to the Vice President for Business Affairs.

15.     Agreement to Abide by Acceptable Use Policy. I hereby certify that I have received a copy of the WNMU Acceptable Use Policy for Computing Resources and agree to the terms and conditions set forth within the policy. I understand that access to the University computing facilities is a privilege, and not a right, and that this access may be completely revoked or limited by the University at any time, for any reason deemed sufficient by the University. I further understand that any violation of the terms of this policy may result in suspension or termination of my access privileges, and also result in disciplinary action in accordance with the Faculty, Staff or Student Handbooks.

Signature                                                                Date                         Approved by: Policy Committee

                                                                                                                       Date: December 15, 1998