12.07.2015 Views

Microsoft Word MU 2009-2010.doc - Methodist University

Microsoft Word MU 2009-2010.doc - Methodist University

Microsoft Word MU 2009-2010.doc - Methodist University

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Right to Change RequirementsThe faculty reserves the right to change academic curricula and requirements. When the cataloguechanges, the student has two options: to be governed by the catalogue under which he/she enrolled or to begoverned by a more recent catalogue. Requirements from the two catalogues cannot be mixed. A studentwishing to switch to a more recent catalogue must notify the Registrar in writing. No student can graduateunder the terms of any catalogue dated more than six years prior to the graduation date. (This catalogueexpires in August, 2015).Institutional Effectiveness<strong>Methodist</strong> <strong>University</strong> strives to maintain excellence in its academic programs and services. As part ofthe <strong>University</strong>’s Institutional Effectiveness program, students are asked to respond to various surveys suchas the Entering Student Survey, Student Evaluation of Instruction, the Noelle-Levitz Student SatisfactionInventory, the National Survey of Student Engagement (NSSE), and the Graduating Senior Survey. Thesesurveys help us to assess the quality of the <strong>University</strong>’s programs and services. The <strong>University</strong> will use asample of students whenever possible to try to mitigate the number of surveys students have to complete.Students in IDS 110 are assessed on their reading abilities as well as their basic skills and competenciesthrough the Nelson-Denny Reading Test and the College Base Test. Students may also be required to takesubject-area examinations and submit student portfolios for their particular academic programs.Computing Resources Policy/ Computer Use PolicyThe <strong>University</strong> reserves the right to modify and/or expand this policy at any time. You may also get thelatest updates at: http://www.methodist.edu/oic/index.htm1. All users shall respect the privacy of other users. This means that no users will attempt to access,copy, or disrupt the use of information that belongs to others. This includes email files. Proscribedbehavior includes any attempt to or any hacking behavior. It is against <strong>University</strong> policy foranyone to connect any device to the campus network that will allow additional equipment to beconnected. Such devices include, but are not limited to: Wireless Access Points, bridges, routers,switches, hardware and software servers, transceivers, converters, hubs, printers, concentrators.Users are not authorized to attach anything to the <strong>Methodist</strong> <strong>University</strong> Network that isn'tapproved by the Computing Services Department. Any unauthorized attempt to access campusresources or any disruptive behavior on campus networks or systems will be dealt withimmediately and severely.2. All users shall abide by copyright laws. This means that copying or use of programs or files thatare not licensed to the user is forbidden. If you don’t own a copy of a program, you cannot load iton your computer. You cannot load multiple copies of programs for which you don’t own multiplelicenses. If any computer software is loaded on a <strong>Methodist</strong> <strong>University</strong> computer and no licensecan be produced for the software, the Computer Services staff will remove the software from thecomputer.3. All users who are authorized to use the <strong>Methodist</strong> <strong>University</strong> Student Information System arerequired to exercise diligence and discretion to ensure that confidential information containedwithin the <strong>Methodist</strong> <strong>University</strong> Student Information System is protected against unauthorizeddisclosure. This means safeguarding passwords, as well as informing the Computer Services Staffimmediately when a user suspects that security has been compromised. Each user is required aunique account and password and use only that account and password. Users are also required tolog off of any terminal when they are physically away from the keyboard. Each user must confinethe use of the information contained in the <strong>Methodist</strong> <strong>University</strong> Student Information System toofficial needs. Individual users must not allow unauthorized parties to load software on theirsystems, and they must not download information onto removable media without properauthorization.4. All users shall follow appropriate standards of civility and conduct and respect the feelings ofothers when engaged in communication. This means that all users will identify themselves andrestrain from any behavior or communication that might be considered harassing, discriminatory,21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!