Guidelines for Responsible Computing
Purpose
The purpose of these guidelines is to provide a list of responsibilities and expectations that accompany the privilege of using the university's computing and technology resources.
Towson University provides access to computing and information resources for students, faculty, staff and other authorized users in support of the university's mission of teaching, research and public service. Computing resources include host computer systems, university-sponsored computers and workstations, communication networks, software and electronic files. Access to computing resources carries certain responsibilities and should reflect the academic honesty and discipline appropriate for the shared community of network and computer resources. Proper use demonstrates respect for intellectual property, ownership of data, systems security mechanisms and each individual's rights to privacy and to freedom from intimidation, harassment and unwarranted annoyance.
Responsibilities
Use of the university's information technology resources is a privilege. Each user must accept the responsibility for his or her actions and agree to:
- Review and adhere to the University Acceptable Use Policy (10-01.02)
- Act responsibly to ensure the integrity and lawful use of computing and information resources
- Respect the rights of others and not threaten, harass, intimidate or engage in unlawful activity
- Abide by all applicable licenses, copyrights, contracts and other restricted or proprietary information
- Understand that system administrators may examine electronic files, electronic mail and printer listings for the purpose of diagnosing and correcting problems with the system
- Acknowledge the right of the university to restrict or rescind computing privileges in accordance with this and other applicable university policies when the user has inappropriately used computer facilities
- Be considerate when sharing computing resources. Refrain from monopolizing systems; overloading networks with excessive data; using computers inefficiently or unproductively by wasting connect time, disk space, printer paper, manuals, or other resources.
- Recognize that the same standards of intellectual and academic freedom developed for faculty and student publications in traditional media are applicable to publications in computer media. Web pages, electronic mail and electronic files may not contain copyrighted material without the approval from the owner of the copyright.
- Use appropriate language, behavior and style
- Use TU-provided Web pages only for organizations or individuals that are affiliated with the university. TU-affiliated Web pages may not contain commercial advertising.
- Provide appropriate content. Content served from university hosts must comply with Federal, State and local legal requirements and must not conflict with either the University Guidelines for Responsible Computing or the Towson University Code of Student Accountability.
Inappropriate Behavior
The following examples show unethical, unlawful and/or inappropriate behaviors:
- Attempting to alter system, hardware, software or account configurations
- Accessing or monitoring another individual's accounts, files, software, electronic mail or computer resources without permission from the owner
- Misrepresenting your identity, role or the identity of any other person in any type of electronic communication
- Misrepresenting or implying that the content of a personal home page constitutes the views or policies of the university
- Misusing the university's computing resources so as to reduce their efficiency or to affect access to the detriment of other users
- Producing chain letters or broadcasting messages to individuals or lists of users, or producing any communication which interferes with the work of others
- Breaching or attempting to breach computer security systems, whether with or without malicious intent
- Engaging in any activity that might be harmful to systems or to any stored information such as creating or propagating viruses, worms, Trojan Horses, or other rogue programs; disrupting services; or damaging files
- Violating copyright and/or software license agreements
- Using computing resources to threaten or harass others or transmitting obscene or fraudulent messages
- Using computing resources for commercial or profit-making purposes without the written authorization from the university
- Disobeying lab, system, or university policies, procedures, or protocol
- Installing or operating computer games on university-owned computers for purposes other than academic instruction
- Downloading or posting to university computers, or transporting across university networks, material that is illegal, proprietary, in violation of university contractual agreements; or in violation of university policy
- Violating local, State or Federal laws
How to Report a Violation
Email the OTS Information Security Office any questions regarding this guideline. Suspected violations should be reported to the appropriate office. Office of Student Accountability and Restorative Practices should be reported to for alleged violations by students, and immediate supervisors should be reported to for alleged violations by faculty and staff.
Enforcement
The university considers any violation of these guidelines to be a serious offense. Violations may result in:
- Administrative Action - Violations may result in the revocation or restriction of computer privileges
- Disciplinary Action - Violations may result in disciplinary action outlined in the Code of Student Accountability, applicable faculty and staff handbooks, and university policies and procedures
- Legal Action - Alleged violations may also be referred to local, State and/or Federal authorities