1 / 17

Computer Usage Policy

Computer Usage Policy. Purpose. Provide guidance relating to responsible use of the University's electronic information systems . General Information. Access to electronic information systems is a privilege, not a right

river
Télécharger la présentation

Computer Usage Policy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Usage Policy

  2. Purpose • Provide guidance relating to responsible use of the University's electronic information systems

  3. General Information • Access to electronic information systems is a privilege, not a right • All users must act honestly and responsibly, respect the rights of other computer users

  4. General Information con’d • Failure to comply with this Policy may result in denial of access to University information systems or other disciplinary action.

  5. Definitions • Electronic communications shall include the communicating or posting of information by way of electronic mail, bulletin board, World Wide Web (internet), or other such electronic tools.

  6. Definitions con’d • Information systems shall include computers, networks, servers and other similar devices administered by the University

  7. Definitions con’d • Obscene shall mean that an average person would find the material taken as a whole, shameful or morbid interest in nudity, sex, or excretion

  8. Obscene con’d • The material depicts or describes in a patently offensive sexual conduct

  9. Permitted Uses • Information systems are to be used predominately for University-related business.

  10. Permitted Uses con’d • It does not interfere with University operations or an employee user's performance of duties as a University employee.

  11. Permitted Uses con’d • Personal use of University information systems resources or equipment by any user for personal financial gain in connection with outside (non-University) consulting, business or employment is prohibited

  12. Misuse of Computers • Misuse includes attempting to modify or remove computer equipment, without proper authorization. • Accessing without proper authorization

  13. Misuse of Computer con’d • Sending any fraudulent electronic communication • Using electronic communications to harass or threaten users to create an atmosphere which unreasonably interferes with the education or the employment experience.

  14. Misuse con’d • Academic dishonesty. • Visit website for full list of examples at http://www.nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf

  15. E-Mail • E-mail messages should be deleted once the information contained in them is no longer useful

  16. Web Pages • Each University campus may establish standards for those Web Pages considered to be "official" pages of the University.

  17. Complete Policy • Entire policy can be reviewed at http://www.nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf

More Related