Acceptable Use Policy
By using or accessing Central Methodist University technology resources, the user agrees to the terms and conditions of this Acceptable Use Policy:
- Using Central Methodist University technology resources in a manner that does not violate University policies, local, state, or federal laws and the rights and privacy of others;
- Respecting the integrity and security of Central Methodist University technology resources and avoiding any action that interferes with the efficient operation of the technology resources or impedes the flow of information necessary for academic or administrative operations of the University;
- Using Central Methodist University technology resources in a manner that does not infringe upon or otherwise impair, interfere with or violate any copyright or other intellectual property rights of another. This pertains to all copyrighted material, including, but not limited to music, video and software;
- Protecting your assigned Central Methodist University account information from unauthorized use and accessing information that is your own, which is publicly available, or to which you have been given authorized access;
- Respecting the rights and property of others, including privacy, confidentiality and intellectual property.
Purpose of the Acceptable Use Policy
The computing resources at Central Methodist University are valuable and limited resources that serve a large number and variety of users. The use of the computing resources is a privilege that is extended to support the educational, instructional, and administrative activities of the University. As a user of these computing resources, you have access to valuable University resources and to internal and external networks. Consequently, it is important for users to behave in a responsible, ethical, and legal manner.
Records of Electronic Communication
Users should be aware that their uses of Central Methodist University technology resources are not completely private. Central Methodist does not routinely monitor individual usage of its technology resources; however, the normal operation and maintenance of the University's technology resources require the backup and caching of data and communications. The logging of activity, the monitoring of general usage patterns, and other such activities are necessary for the rendering of service. The University may also specifically access and monitor the activity and accounts of individual users of University technology resources, including individual log in session and communications, without notice, when:
- the user has consented, or has voluntarily made information or communications accessible to the public, as by posting them to a web page or listserv;
- it is necessary to maintain University business functions and the user is no longer with the University, is suspended, or is otherwise unavailable;
- an account appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns;
- it reasonably appears necessary to do so to protect the integrity, security, or functionality of University or other technology resources or to protect the University from liability;
- there is reasonable cause to believe that the user has violated, or is violating, this policy or other University policies as reflected in information for faculty, the employee handbook, student handbook or other official University documents.
The University, in its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, to appropriate University personnel or law enforcement agencies and may use those results in appropriate University disciplinary proceedings.
This policy applies to all entities using Central Methodist University technology resources which includes (but is not limited to) Central Methodist University students, alumni, faculty, staff, administration, and special guests.
Technology resources include all university owned, licensed, or managed hardware and software, and use of the university network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.
These policies apply to technology administered by the University, personally-owned computers and devices connected by wire or wireless to the campus network, and to off-campus computers that connect remotely to the University's network services.
Penalties for violating the Acceptable Use Policy may include restricted access or loss of access to the Central Methodist University technology resources, monetary reimbursement to the University or other appropriate sources, termination and/or expulsion from Central Methodist University and in some cases, civil and/or criminal liability.
Questions about this Acceptable Use Policy should be directed toward the Vice-President of Information Services.