To Home Page To Home Page
General Description
Policy Provisions
Performance Evaluation
Subject Experts
Unacceptable Uses

Document Number: INFOTECH--104 Revision #: 1.0
Document Owner: Executive VP Date Last Updated: 08/17/2012
Primary Author: Director of Information Technology Status: Approved
Date Originally Created: 11/15/2011

General Description

Information about unacceptable uses of information technology by students, faculty, and staff.


Delineation of policy


Administration, Employees, Students

Responsibility: Director of IT
VP of Business and Finance

Back to Top

Relevant Knowledge: In order to comply with this policy you should know:
State statutes
Standards of good practice
Standard company policies
Current University policy

Terms and Definitions: Additional training

Corrective Action

Loss of privilege, general



Back to Top

Policy Provisions

Unacceptable Uses

The following uses of Cumberland University’s network and computer systems are unacceptable in addition to those cited above:

· Users may not use Cumberland University’s network and computer systems for any unlawful activity.

· Plagiarism of other’s work is unacceptable and those who use the expressions of others as their own will be subject to disciplinary action. Respect for intellectual labor and creativity is vital.  Because electronic information is easily reproduced, respect for the work and personal expression of others is critical. Violations including copying and using the work of another person as a user’s own are prohibited.  If a user is unsure whether or not he or she can use a work, the user should request permission from the copyright owner or contact IT.

· Users will not reproduce or allow others to reproduce copyrighted material in any form without proper authorization, or not in keeping with the University’s copyright regulations or federal and state laws.

· Users will not use software that allows for the direct sharing of music, movies, games, and software over the Internet when such peer-to-peer file sharing contains copyrighted works without the permission of the copyright holder.  

· Users will not attempt to gain unauthorized access to the system or to any other computer system through this network. This includes attempting to log in through another person’s account or access another person’s file. These actions are illegal, even if only for the purpose of browsing.

· Any unauthorized, deliberate action that damages or disrupts a computer, a network (or related hardware, software, and data), alters the normal performance of said equipment, or causes it to malfunction is a violation of policy regardless of system location or time duration. User will be financially responsible for such damage. This includes, but is not limited to the spread of computer viruses and worms. These actions are illegal. This also includes the unintentional spread of a virus when doing other activities which are prohibited in this policy.

· IT may regulate which social networking sites may be accessed on the Cumberland network in its sole discretion.

· Users may not send spam or create or retransmit chains in e-mail messages.

· Users may not send e-mail from another user’s account.

· Users may not alter the header of an e-mail message to prevent the recipient from determining the actual sender of the e-mail.

· Users may not log into or use any computer account or access, modify or create any files without the account owner’s permission.

· Users may not introduce new services or resources (e.g., personal web server) or alter existing services or resources (e.g., registering personal domain name) on the University’s network and computer systems.

· Users may not transmit, without authorization, information proprietary to Cumberland or information that could be construed as a statement of official Cumberland policy, position, or attitude.

· Users may not intercept network traffic without authorization.

· Any attempts to violate the security of the University’s network and computer systems are prohibited.  Any user identified by IT as a security risk or as having a history of problems with Cumberland University’s network and computer systems may be denied user privileges.

· The copying of system files is prohibited. The copying of copyrighted materials, such as third party software, without the express written permission of the owner or without the proper license, is prohibited.

· Decoding or attempting to decode system or user passwords is prohibited. Users are also prohibited from sharing their password with other people or allowing anyone to use a computer logged in under their login; doing so will result in the loss of network privileges.

· Intentional attempts to “crash” network systems or programs are prohibited.

· Attempts to secure a higher level of privilege on the University’s network and computer systems are prohibited.  Users are prohibited from using any type of “hacker” tools to try to break into the system, either on campus or from a remote site. Any attempt to circumvent firewall filtering is prohibited.

· Users of Cumberland’s network and computer systems will not use obscene, profane, lewd, vulgar, rude, inflammatory, threatening, disrespectful or otherwise objectionable language.

· Users may not visit nor download materials from any site that contains offensive, obscene or immoral pictures (i.e., pornography and nude photos), profane language, or any other material inappropriate for an educational setting. Neither shall users access material that advocates illegal acts, violence or discrimination towards other people (i.e., hate literature).

· Users will not use any method to bypass the University’s selected filtering process.

· All inappropriate sites may not be blocked by the filter; it is the user’s responsibility to determine whether a site is educationally appropriate.

· Cumberland’s network and computer systems will not be used in any immoral or unethical manner.

· Users will not engage in personal attacks, including prejudicial or discriminatory attacks.  Harassment is not permitted. Harassment is defined as persistently acting in a manner that causes distress or annoys another person.

· Users will not knowingly or recklessly post false or defamatory information about a person or group.

· Users will not re-post material that was sent to him or her privately without permission of the person who sent the material.

· Users will not post private information or details about another person.

· Deletion, examination, copying or modification of files and/or data belonging to others is prohibited.

· Disk space usage is controlled on the network. User storage is limited. Users should not use their assigned space for long-term storage of information or programs. Files that are not a part of the operating system or utility software may be routinely removed from the drive without warning. Student files may be deleted at the end of each academic year.  E-mail mailboxes that are above the University’s storage limit may be permanently deleted at any time during the semester.

· Cumberland University IT can and will delete any files that appear suspicious or inappropriate such as questionable pictures, cartoons or movie clips.


Back to Top

Performance Evaluation
Performance Metrics: Compliance with standard policy and procedure

Consequences: Expulsion
Further training
Loss of privileges

Back to Top

Subject Experts
The following may be consulted for additional information.
Director of Information Technology

Executive VP

VP of Business and Finance

Back to Top

This page created 10/30/2014 using Zavanta® version 6.0