SKIP TO PAGE CONTENT

Computing Services: Rules for Responsible Computing

Computing Services: Rules for Responsible Computing

1.23 | Computing Services: Rules for Responsible Computing

1.23.A | Misuse of Computing Resources: Failure to comply with University rules and procedures, license agreements, and contracts governing network, software and hardware use; abuse of communal resources; use of computing resources for unauthorized commercial purposes of personal gain; failure to protect your password or use of your account; breach of computer security resources including, but not limited to: Use of another individual's identification and/or passwork.

  1. Use of computing facilities and resources to send obscene or threatening messages.
  2. Use of computing facilities and resources in violation of copyright laws.

1.23.B | Use of university computing resources and facilities is a privilege and requires that individual users act in compliance with University rules. The University providers users with an account that permits use of computing resources and facilities within guidelines established by WTAMU. Users must respect the integrity of computing resources and facilities, respect the rights of other users, and comply with all relevant laws (local, state, federal, and international), University rules and contractual agreements. The University reserves the right to limit, restrict or deny computing privileges and access to its information resources for those who violate University rules and/or laws. As an institution of higher learning, WTAMU encourages, supports, and protects freedom of expression and an open environment to pursue scholarly inquiry and to share information. Access to networked computer information in general and to the Internet, in particular, supports the academic community by providing a link to electronic information in a variety of formats and covering all academic disciplines. As with any resource, it is possible to misuse computing resources and facilities and abuse access to the internet. The following statements address, in general terms, WTAMU's philosophy about computing use.

  1. Freedom of Expression: Censorship is not compatible with the goals of WTAMU. The University should not limit access to any information due to its content when it meets the standard of legality.
  2. Privacy: The general right to privacy is extended to the electronic environment to the extent possible. Privacy is subject to the Texas Public Information Act, administrative review, and computer system administration. Contents of electronic files will be examined or disclosed only when authorized by their owners, approved by an appropriate university official or required by law.
  3. Intellectual Property: All members of the University community should be aware that property laws apply to the electronic environment. Users should assume that works communicated through a network are subject to copyright unless specifically stated otherwise. Unless permission of the author is obtained, utilization of any electronically transmitted information must comply with the "fair use" principle.
  4. Criminal and Illegal Acts: Computing resources of the University, which include the hardware, software, and network environment, shall not be used for illegal activities. Any such use of these resources will be dealt with by appropriate university authorities and/or other legal and law enforcement agencies. Criminal and illegal use may involve unauthorized access, intentional corruption, or misuse of computing resources, theft, obscenity, child pornography, and racial, ethnic, religious, or sexual harassment.
  5. Authorized Use: Computing resources are provided by the University to accomplish tasks related to the University's mission. Some computers may be dedicated to specific research or teaching missions that limit their use. Computing resources may not be used for unauthorized commercial activities or any illegal activities.