13.07.2015 Views

FACULTY HANDBOOK July 2009 - Morgan State University

FACULTY HANDBOOK July 2009 - Morgan State University

FACULTY HANDBOOK July 2009 - Morgan State University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PAGE 167 * <strong>Morgan</strong> <strong>State</strong> <strong>University</strong> Faculty Handbookii. Intentionally or knowingly, personally or through any agent, deleting, examining, copying,destroying altering or modifying files and/or data/records or computer programs stored,maintained or produced by a computer without permission, consent, authorization from theowner;iii. Physically damaging hardware or software;iv. removing computer hardware and/or any internal components;e. Unauthorized use of an account-id and /or password;f. Unauthorized use and/or copying of software;g. Use for personal commercial gain, charitable solicitations unless these are authorized by theappropriate <strong>University</strong> official, or personal political activities such as campaigning for candidatesfor public office, or for lobbying of public officials.h. Any access and/or use which violate state or federal law is prohibited.2. Use only those computers and computer accounts for which you have authorization.3. Use mainframe accounts only for the purpose(s) for which they have been issued. Use <strong>University</strong>ownedmicrocomputers and advanced work stations for <strong>University</strong>-related projects only.4. Avoid copyright and trademark infringement. All members of the <strong>University</strong> community areresponsible for understanding and observing, applicable policies, regulations, state and federal lawsin connection with copyright and fair use. Similarly, all members of the <strong>University</strong> community mustrespect access to users’ messages or documents except where necessary to:1. Meet the requirements of the Maryland Public Records Law and/or other statutes, laws orregulations;2. Protect the integrity of the <strong>University</strong>’s information technology resources, and the rights andother property of the <strong>University</strong>;3. Allow system administrators to perform routine maintenance and operations, and respond toemergency situations;4. Protect the rights of individuals working in collaborative situations where information and filesare shared;5. Retrieve a file by a supervisor or principal investigator of assigned work, when an employee isunavailable; or6. Monitor general usage patterns, and inspect files for a limited time when there is probable causeto believe a user has violated this Policy.7. Investigate security violations and unauthorized access.Each user is ultimately responsible for his or her own computing and his or her own work using acomputer. Take this responsibility seriously.V. Administration and Enforcement.The Vice President for Planning and Information Technology is charged with communicating this Policyto the user community and for providing educational programs to achieve technical proficiency andappropriate use of the resources. Requests for interpretation of the Policy as applicable to particularsituations may be directed to the appropriate <strong>University</strong> administrator, such as the Vice President forPlanning and Information Technology, the Vice President for Student Affairs, the Director of HumanResources or to the Office of the General Counsel.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!