Body
Policy
In support of the university's mission of teaching, research, and public service, Instructional Technology Services (ITS) provides computing, networking, and informational resources to the university community of students, faculty, and staff for university programs. Students are referred to Board of Regents Policy, Section #22.
Rights and Responsibilities
Open access through computers and networking is a privilege. Users must respect the rights of other users, the integrity of the system, and related physical resources. Users must keep all passwords and access mechanisms private and secure. All existing laws(federal, state, and local) and university regulations and policies apply. Laws and regulations specific to computers and networks, as well as those laws that may apply generally to personal conduct, shall be observed. Users may be held accountable for misuse of computing, networking, or information resources under any applicable university policies, procedures, or collective bargaining agreements. Misuse may result in loss of computing privileges. Allegations of misuse of ITS resources will be directed to those responsible for taking appropriate disciplinary action.
Procedures
-
All network users must be registered with Instructional Technology Services (ITS).
-
In accepting authorization to use computing or networking services, the user agrees to comply with all existing laws (federal, state, and local) and university regulations and policies. (See Board of Regents Policies, Section B22)
-
Theft, misuse, or abuse of computing or networking resources may result in loss of network privileges, discipline, or prosecution in accordance with all Regental, university, local, state, and federal policies, laws, or regulations.
-
Activities will not be considered misuse when authorized by the Director of Instructional Technology Services (ITS) for security or performance testing.
-
Theft, misuse, or abuse of computing or networking resources includes, but is not limited to:
-
Unauthorized use of any computer account.
-
Unauthorized transfer of or entry into a file.
-
Using the campus network to gain unauthorized access to any computer system.
-
Performing an act that will interfere with or degrade the quality of the normal operation of computers, peripherals or networks - or with the normal operations of the university computing system.
-
Violating terms of applicable software licensing agreements or copyright laws. (Illegal reproduction of software protected by US Copyright law is subject to civil damages and criminal penalties including fines and imprisonment.)
-
Using electronic mail to harass others.
-
Running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan horses, and worms.
-
Attempting to circumvent data protection schemes or uncovering security loopholes.
-
Posting materials on any electronic medium which violate existing laws, regulations or the university's policies and codes of conduct.
-
Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing or deleting another user's files or software.
-
Masking the identity of an account or machine, or use of another individual's password, identification or account.
-
Use of computing facilities that interferes with the work of another student, faculty or staff member.
-
Unauthorized use of university network system, i.e. network infrastructure for commercial purposes.
-
Hosting of materials for individuals or businesses not affiliated with the university.
-
Users assume all risks and conditions associated with utilizing institutional computer resources and the transmission and posting of information including:
-
South Dakota Mines reserves the right to access any and all files stored on institutional computer systems.
-
South Dakota Mines cannot guarantee that information transmitted or stored electronically will be protected.
-
World Wide Web Pages
-
Space and resources permitting, students, faculty, and staff of South Dakota Mines are encouraged to create Web pages that can be accessed from the World Wide Web. These Web pages are provided as part of the university’s mission and should be used to showcase our achievements and provide information to the public. Therefore, those individuals and departments whose Web pages are hosted by South Dakota Mines are responsible for ensuring that their pages are professional and appropriate in content, appearance, and with regard to links to other sites.
-
Users must request an account through ITS.
-
Users will be allotted a maximum amount of space as identified by ITS.
-
Users are encouraged to observe copyright protocols with regard to establishing links and with regard to link agreements. Users are also encouraged to monitor the accuracy of the links on their sites.
-
South Dakota Mines reserves the right to access any and all materials and files stored on the institutional computer systems.
-
Residence Hall Connections
Access is available in the residence halls. In accepting authorization to access computing or networking services through a residence hall room, a user agrees to comply with all existing laws (federal, state, and local) and university regulations and policies. Additionally, the user agrees not to engage in any practice that would be considered theft, misuse, or abuse of computing or networking resources. Users assume all risks and conditions associated with utilizing institutional computer resources and the transmission and posting of information including the following:
-
Only allow login access to registered Tech students. Initial login indicates agreement and acknowledgment on the part of Tech students to this agreement and all subsequent additions, deletions, or addendums to this policy.
-
These accounts must be reviewed, by the user, each semester for validity.
-
Only Anonymous FTP "downloads" of files owned by the site owner will be allowed.
-
Anonymous FTP "uploads" are specifically prohibited.
-
Individual site security is the responsibility of the site owner.
-
Theft, misuse, or other abuse of computing or networking resources may result in loss of computer privileges, discipline, or prosecution in accordance with all applicable regental, university, local, state, and federal policies, laws, or regulations.
-
Activities will not be considered misuse when authorized by the director of ITS for security or performance testing.