Use of University computer and communication resources is a privilege. As an authorized user, you are responsible for the security and use of your computer accounts. You accept full responsibility for your accounts, your data and all activity performed on university computing resources by you or through your accounts.
You may not perform these activities:
- Trying to gain unauthorized access to or modification of information and files stored on Central Methodist computing systems.
- Use Central Methodist computers and network for commercial purposes.
- Transmitting inappropriate images, sounds, or messages which might reasonably create an atmosphere of discomfort or be considered harassing.
- Using Central Methodist computing resources for commercial use resulting in a financial gain to you or someone else.
- Using the Central Methodist technology resources to
violate copyright laws. The majority of software and
information for use on Central Methodist computers and
network is protected by federal copyright laws. In addition,
software is usually protected by a license agreement between
the purchaser and the software manufacturer. (The software
provided through the University for use by faculty, staff
and students may be used ONLY on University equipment and in
the quantities specified in the various software
agreements). It is Central Methodist policy to respect the
copyright protections given to owners by federal law. It is
against Central Methodist policy for faculty, staff or
students to copy or reproduce any copyrighted material or
licensed software on Central Methodist computing resources,
except as expressly permitted by the owner or software
In addition, faculty, staff and students may NOT use unauthorized copies of copyrighted material or software on University-owned computers or its network. Any Central Methodist user who reproduces copyright-protected material in "excess" of the "fair use" doctrine on Central Methodist resources including, but not limited to, email, Internet and other Central Methodist resources may be liable for copyright infringement.
- Interfering with normal operations of networks and
servers. Examples include:
- Generating excessive network traffic - Users are strongly encouraged to limit network and computer usage to legitimate academic and administrative pursuits. Generating traffic that impacts normal, daily network operations in a harmful manner is prohibited and is subject to disciplinary action and/or violation of Missouri statutes. Hardware connected to the Central Methodist network that is faulty or is interfering with the normal operations MUST be disconnected upon request. Failure to disconnect malfunctioning equipment WILL result in disconnection of network connection.
- Network games - Any game that utilizes the Central Methodist network and impacts its normal operations/bandwidth in a detrimental fashion is a violation of University policy and may result in a fine or suspension of network resources.
- Running unauthorized servers in residence hall rooms
and offices. Computers providing resources to other
users and computers are classified as a server. Server
resources allowed in residence hall rooms and offices
- Sharing a printer
- Sharing of files on your computer for your personal use.
- Server resources prohibited in residence halls and
- WINS (Windows Internet Name Service)
- DHCP (Dynamic Host Control Protocol)
- DNS (Domain Name System)
- FTP (File Transfer Protocol)
- HTTP (World Wide Web Server, Master Browser)
- Peer-to-Peer services (LimeWire, BearShare, etc.)
- MP3 Server (Napster)
- Mail Servers
- Sharing of files to an unreasonable number of users as determined by context of usage and content.
- Attempting to bypass security measures. Examples
- Password capturing/cracking programs
- Packet sniffing/analyzing programs
- Port scanning
- Launching and creation of computer viruses
- Using passwords and usernames you are not authorized to use
- Accessing systems, data files or resources without authorization
- Using false (spoofed) IP address or Domain name.
- Misusing University property which includes theft or damage of equipment or software
- Fraudulently accessing and interfering with computer systems, resources, data or other users-for more information, see sections 569.094-569.099 of the Missouri Revised Statutes
- Using open mail relays on University equipment.
- Sharing your University accounts passwords with others, allowing anyone else to use your account, or use someone else's account.
If you are unsure, always check with the Office of Technology Services or review other University policies. Be sure to review the section on breach of policy.
Breach of Policy
For any alleged breach of CMU's policies, the reporting procedure is as follows:
- Report of an incident must be in writing and given to the Office of Technology Services. The Technology Services Policy Committee will review the report. Reports must be first-hand accounts.
- Report should include all pertinent information (i.e. names, dates, times). Reports must be signed and dated.