久草热久草视频

Skip to main content

110.005 Acceptable Use Policy

Bd. Min. 9-14-00; 10-23-09.

This policy applies to all users including faculty, staff, students, and guest users of 久草热久草视频 of Missouri computer networks, equipment, or connecting resources.

  1. 久草热久草视频 Inspection of Personal Electronic Information -- All information technology resources, including computer networks, equipment and connected resources, provided by the 久草热久草视频 of Missouri are the property of the 久草热久草视频.  The 久草热久草视频 values the principles of academic freedom and privacy and does not condone casual inspection of the information contained within or transmitted via these resources.  However, electronic information on 久草热久草视频 networks or equipment, including, but not limited to, electronic mail and personal information, is subject to examination by the 久草热久草视频 where:
    1. It is necessary to maintain or improve the functioning of 久草热久草视频 computing resources;
    2. There is a suspicion of misconduct under 久草热久草视频 policies, or suspicion of violation of Federal or State laws;
    3. It is necessary to comply with or verify compliance with Federal or State law including e-discovery procedures; or
    4. If it will serve a legitimate business need of the 久草热久草视频.
  2. Acceptable Use Guidelines
    1. Responsibilities of Users of 久草热久草视频 Computer Resources:
      1. Respect the intellectual property rights of authors, contributors, and publishers in all media.
      2. Protect user ID, password, and system from unauthorized use.
      3. Adhere to the terms of software licenses and other contracts. Persons loading software on any 久草热久草视频 computer must adhere to all licensing requirements for the software. Except where allowed by 久草热久草视频 site licenses, copying software licensed for 久草热久草视频 use for personal use is a violation of this policy.
      4. Adhere to other 久草热久草视频 and campus policies, including the Collected Rules and Regulations of the 久草热久草视频 of Missouri, and, if applicable, the 久草热久草视频 Business Policy Manual, Human Resources Manual and policies established for a specific resource.
      5. Adhere to data access policies of the 久草热久草视频 or those established by law.
      6. Use 久草热久草视频 computer resources in a manner that is compliant with 久草热久草视频 policies and State and Federal law.
    2. Prohibited Uses of 久草热久草视频 Computer Resources:
      1. Unauthorized or excessive personal use. Use may be excessive if it overburdens a network, results in substantial use of system capacity, or otherwise subjects the institution to increased costs or risks (employees additionally may be subject to discipline for unauthorized or excessive personal use of computer resources.)
      2. Uses that interfere with the proper functioning of the 久草热久草视频's information technology resources.
      3. Uses that unreasonably interfere with the ability of others to make use of 久草热久草视频 computer resources.
      4. Attempting to gain or gaining unauthorized access to the computer system, or files of another.
      5. Use of 久草热久草视频 computer resources to infringe the intellectual property rights of others.
      6. Use of 久草热久草视频 computer resources for personal profit, except as permitted under the 久草热久草视频's conflict of interest policy.
  3. Enforcement of Acceptable Use Policy -- Violation of the Acceptable Use Policy may result in a denial of access to 久草热久草视频 information technology resources, and other appropriate disciplinary actions.

Search Collected Rules: