18.10.2014 Views

Download - University of Maryland Eastern Shore

Download - University of Maryland Eastern Shore

Download - University of Maryland Eastern Shore

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

open to School <strong>of</strong> Pharmacy students and faculty 24/7 (with swipe-card security access<br />

afterhours). NO FOOD OR DRINK IS ALLOWED IN THIS ROOM. VIOLATORS ARE SUBJECT TO<br />

DISCIPLINARY ACTION.<br />

*Guidelines for the usage <strong>of</strong> computer facilities and all network resources in the School <strong>of</strong> Pharmacy<br />

The following is to serve as a guide for the appropriate use <strong>of</strong> computer facilities and network resources<br />

in the School <strong>of</strong> Pharmacy. Since it is impossible to document all appropriate conduct and use <strong>of</strong><br />

computer facilities, these guidelines are provided. Note that they are not intended to be all inclusive.<br />

The list serves as an example <strong>of</strong> infractions that are prohibited:<br />

Eating and drinking in technology areas: classrooms, reading rooms, and computer laboratory;<br />

Using the network for purposes other than educational;<br />

System tampering (any unauthorized alteration <strong>of</strong> operating systems, individual accounts,<br />

s<strong>of</strong>tware, networking facilities, and/or other programs);<br />

Using obscene, vulgar, abusive or inappropriate language, pictures, or other materials;<br />

Knowingly introducing viruses;<br />

Vandalizing, including equipment damage and willful tampering with data or s<strong>of</strong>tware;<br />

Attempting to read, delete, copy or modify the electronic mail <strong>of</strong> other users;<br />

Attempting to decrypt passwords;<br />

Attempting to gain unauthorized access to remote systems;<br />

Deliberately interfering with other users;<br />

Attempting to libel, slander or harass other users;<br />

Accessing IRC sites (chatting) or instant messaging;<br />

Sending/receiving personal, non-educational email;<br />

Allowing others to use your personal e-mail address, account or password;<br />

Using an account other than one’s own;<br />

Sharing passwords;<br />

Forging or attempting to forge e-mail messages;<br />

Unauthorized copying or transferring <strong>of</strong> copyrighted materials or any violation <strong>of</strong> copyright laws;<br />

Plagiarizing;<br />

Using networks for illegal activities;<br />

Using commercial advertising, chain letters, non-educational games;<br />

Unauthorized downloading <strong>of</strong> any kind from the Internet;<br />

Attaching hardware peripherals to the computer other than flash drives;<br />

Storing non-educational files on the server, local hard drive or removable disks;<br />

Attaching unauthorized PDAs or laptops to the network; and,<br />

Removal <strong>of</strong> computer equipment and/or any drug information references or resources.<br />

VIOLATIONS WILL RESULT IN A LOSS OF ACCESS (EVEN FOR REQUIRED WORK) AS WELL AS OTHER<br />

DISCIPLINARY OR LEGAL ACTIONS WILL BE TAKEN IF PERSON IS IDENTIFIED. FUNDS TO REPLACE<br />

COMPUTER EQUIPMENT AND DRUG INFORMATION REFERENCES WILL COME FROM THE GENERAL<br />

STUDENT BODY FUNDS!<br />

58

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!