Applies to: (examples; Faculty,Staff, Students, etc)
Faculty , Staff , Students , Contractors_Vendors
Faculty , Staff , Students , Contractors_Vendors
Conditions of Use
In the Policy below, the term “computing facility” means any and all forms of computer-related equipment, tools, and intellectual property. This includes computer systems, personal computers, computer networks, and all forms of software, firmware, operating software, and application software, which are owned, leased, or arranged for by the University or which the University possesses, has custody over, or controls. To be clear, “computing facility” includes cloud or internet-based services arranged for by the University or generally available cloud or internet-based services that you use to conduct University business or store University data.
By using the University’s computing facilities, you agree and are on notice that the University has made no representation as to the privacy of any communication or data stored on or sent through these facilities; that the University has reserved the rights set forth below; and that the use of these facilities is limited to University-authorized purposes.
The use of the University’s computing facilities in connection with University activities and de-minimis personal use is a privilege extended to various members of the University community; it is not a right. Users of the University’s computing facilities are required to comply with, and by using such facilities agree that they are on notice of and agree to comply with, be subject to, and grant the University the right to implement the Conditions of Use and Computing Ethics policy. Users also agree to comply with applicable federal, state, and local laws and to refrain from engaging in any activity that is inconsistent with the University’s tax-exempt status or that would subject the University to liability.
To protect the integrity of the University’s computing facilities and its users against unauthorized or improper use of those facilities, and to investigate possible use of those facilities in violation of or in aid of a violation of University rules, policies, and applicable laws. The University reserves the right, without notice, to limit or restrict any individual’s use, and to inspect, copy, remove or otherwise alter any data, file, or system resource which may undermine the authorized use of any computing facility or which is used in violation of University rules or policies. The University also reserves the right periodically to examine any system and any other rights necessary to protect its computing facilities.
The University provides an electronic infrastructure to be used primarily for educational purposes directly relating to our curriculum and the business of the University. While not recommended, incidental personal use is permissible, but it must not interfere with normal daily use, and must follow all other guidelines as set forth in this policy.
The University is not responsible for loss of data or interference with files resulting from its efforts to maintain the privacy and security of those computing facilities, system malfunction, or any other cause.
The University reserves the right to amend these Conditions of Use at any time without prior notice and to take such further actions as may be necessary or appropriate to comply with other published policies and with applicable federal, state, and local laws.
Examples of inappropriate actions:
Unauthorized entry into a voice mailbox
Unauthorized use of another individual's identification and authorization code
Use of the University telephone system to send abusive, harassing, or obscene messages
Making personal long distance calls
University Inspection of Personal Electronic Information
All information technology resources, including computer networks, equipment and connected resources, provided by the University are the property of the University. The University values the principles of academic freedom and privacy and does not condone casual inspection of the information contained within or transmitted via these resources. However, electronic information on the University’s networks or equipment, including, but not limited to, electronic mail and personal information, is subject to examination by the University, in its sole discretion, when:
Student Organizational Web Pages
Summary
Each user shall conduct themselves with morality, fairness, and respect. Engaging in any activity that violates the policies outlined in this document can lead to loss of use and access privileges, as well as other disciplinary procedures within the scope of the University of Health Sciences and Pharmacy's policies, including dismissal or termination from the University. Please refer to the Staff Handbook, Faculty Handbook, and the Student Code of Non-Academic Conduct for detailed conduct and disciplinary guidelines. In addition to the University’s policies, there are an increasing number of federal, state, and local regulations governing the use of electronic resources that allow criminal charges to be filed if applicable.
Position/Office/Department | Responsibility |
All computer and infrastructure users | Comply with conditions of use and computing ethics contained in this policy. |
Acceptable Use of Library Resources Policy
Digital Millennium Copyright Act Policy
Web-site Privacy and CAN SPAM Act Policy - Interim
Name | Contact Information |
Lewis, Zachary, AVP IT | Zachary.Lewis@uhsp.edu, 314-446-8402 |
Knoll, Eric, Vice President Operations | Eric.Knoll@uhsp.edu, 314-446-8375 |