Download - University of Maryland Eastern Shore
Download - University of Maryland Eastern Shore
Download - University of Maryland Eastern Shore
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
open to School <strong>of</strong> Pharmacy students and faculty 24/7 (with swipe-card security access<br />
afterhours). NO FOOD OR DRINK IS ALLOWED IN THIS ROOM. VIOLATORS ARE SUBJECT TO<br />
DISCIPLINARY ACTION.<br />
*Guidelines for the usage <strong>of</strong> computer facilities and all network resources in the School <strong>of</strong> Pharmacy<br />
The following is to serve as a guide for the appropriate use <strong>of</strong> computer facilities and network resources<br />
in the School <strong>of</strong> Pharmacy. Since it is impossible to document all appropriate conduct and use <strong>of</strong><br />
computer facilities, these guidelines are provided. Note that they are not intended to be all inclusive.<br />
The list serves as an example <strong>of</strong> infractions that are prohibited:<br />
Eating and drinking in technology areas: classrooms, reading rooms, and computer laboratory;<br />
Using the network for purposes other than educational;<br />
System tampering (any unauthorized alteration <strong>of</strong> operating systems, individual accounts,<br />
s<strong>of</strong>tware, networking facilities, and/or other programs);<br />
Using obscene, vulgar, abusive or inappropriate language, pictures, or other materials;<br />
Knowingly introducing viruses;<br />
Vandalizing, including equipment damage and willful tampering with data or s<strong>of</strong>tware;<br />
Attempting to read, delete, copy or modify the electronic mail <strong>of</strong> other users;<br />
Attempting to decrypt passwords;<br />
Attempting to gain unauthorized access to remote systems;<br />
Deliberately interfering with other users;<br />
Attempting to libel, slander or harass other users;<br />
Accessing IRC sites (chatting) or instant messaging;<br />
Sending/receiving personal, non-educational email;<br />
Allowing others to use your personal e-mail address, account or password;<br />
Using an account other than one’s own;<br />
Sharing passwords;<br />
Forging or attempting to forge e-mail messages;<br />
Unauthorized copying or transferring <strong>of</strong> copyrighted materials or any violation <strong>of</strong> copyright laws;<br />
Plagiarizing;<br />
Using networks for illegal activities;<br />
Using commercial advertising, chain letters, non-educational games;<br />
Unauthorized downloading <strong>of</strong> any kind from the Internet;<br />
Attaching hardware peripherals to the computer other than flash drives;<br />
Storing non-educational files on the server, local hard drive or removable disks;<br />
Attaching unauthorized PDAs or laptops to the network; and,<br />
Removal <strong>of</strong> computer equipment and/or any drug information references or resources.<br />
VIOLATIONS WILL RESULT IN A LOSS OF ACCESS (EVEN FOR REQUIRED WORK) AS WELL AS OTHER<br />
DISCIPLINARY OR LEGAL ACTIONS WILL BE TAKEN IF PERSON IS IDENTIFIED. FUNDS TO REPLACE<br />
COMPUTER EQUIPMENT AND DRUG INFORMATION REFERENCES WILL COME FROM THE GENERAL<br />
STUDENT BODY FUNDS!<br />
58