PREAMBLEThis Policy sets forth the principles that govern appropriate use of computing and digital information resources. Such resources are the property of the State of Maryland, and users are bound by all pertinent University, State, and Federal policies and statutes. Access to UMBC computing resources is a privilege granted by the University. Computing policies, like other university policies, where ever possible are governed by the principle of academic freedom.
POLICY STATEMENTUMBC provides access to computing and information resources for students, staff, faculty, and certain other users in support of UMBC's mission of teaching, research, public service, and in support of the official duties of the University. When activating an account, a user implicitly affirms that: they will abide by the broadest interpretation of the following policies; failure to follow policies may result in loss of computing privileges; UMBC may monitor computer use to protect the system; and the university may terminate the account of anyone who has been determined to use his or her access for unlawful purposes or in contravention of this policy. Computer users shall:
- Act responsibly so as to ensure the integrity and ethical use of computing and information resources.
- Respect the rights of others, and not threaten, harass, intimidate, or commit theft or fraud.
- Respect all pertinent licenses, copyrights, contracts, and other restricted or proprietary information.
- Use University computing resources and user accounts only for appropriate University activities.
- Acknowledge that system administrators may examine files, mail, and printer listings for the purpose of diagnosing and correcting problems with the system.
- Acknowledge the right of the University to restrict or rescind computing privileges for cause.
EXAMPLES OF ACTIVITIES SPECIFICALLY PROHIBITEDThe following are some of the things that are prohibited activities; this list in not inclusive. No person may:
- Intentionally corrupt, misuse, or steal software or any other computing resource.
- Access information resources, data, equipment, or facilities in violation of any restriction on use.
- Use University computing resources for personal or private financial gain without written authorization. Excepted from this provision is remuneration to faculty and staff for customary university related activities from: approved consulting; copy rights; patents; royalties; honoraria; reviews; etc.
- Use another person's computer account.
- Establish an independent computer system, except those specifically authorized for departmental use.
- Knowingly, without written authorization, execute a program which may hamper normal computing activities at UMBC or elsewhere.
ACTION TO PRESERVE PUBLIC SAFETY OR INTEGRITY OF COMPUTING RESOURCESIf an University Computing Services(UCS) official reasonably believes that a user is engaged in activities which may pose an imminent threat to: 1) the health or safety of others; 2) the integrity of data; or 3) computing resources which may adversely affect system operations, the official may temporarily suspend user privileges for no more than two working days (excluding weekends and university holidays) before consulting an Administration official.
In all other cases, the UCS official shall consult the Associate Vice President for Academic Affairs and follow existing University procedures, where applicable, prior to:
If appropriate, or required, findings from investigations may be reported to other University officials for review and action, or to State or Federal authorities.
- Investigating alleged improper or illegal use of data, programs, or UCS equipment or resources;
- Accessing data and files pertinent to the investigation; or
- Limiting user privileges until the matter is resolved.
INFORMING USER OF ACTIONS TAKENUnless such notification may impede an investigation, within one week University officials shall disclose in writing to an affected user that:
- The user's account has been suspended, or that
- The user is under investigation, and that
- The user may submit evidence to those conducting the investigation, and the procedures that are applicable to the investigation.
ACKNOWLEDGEMENT OF POLICYBy activating a computing account, a user implicitly agrees to abide by the above policy in its entirety.
Approved for distribution:
Freeman A. Hrabowski, President
26 September 1996