Website Tools
Computer and Network Usage Policy    
The use of Maharishi University of Management IT resources and campus network is primarily for university Academic, Research, and Administrative  activities. All other uses are secondary.

Users of the network and computer resources have a responsibility to properly use and protect those information resources and to respect the rights of others. This policy provides guidelines for the appropriate use of information technologies.
    
1. Policy Scope and Applicability
  1. Applicability — This policy is applicable to all University students, faculty and staff and to others granted use of MUM information resources. This policy refers to all University information resources whether individually controlled or shared, stand-alone or networked. It applies to all computer and communication facilities owned, leased, operated, or contracted by the University. This includes networking devices, personal digital assistants, telephones, wireless devices, personal computers, workstations, mainframes, minicomputers, and any associated peripherals and software, regardless of whether used for administration, research, teaching or other purposes.
  2. Department Policies — Departments may create their own supplemental conditions of use if consistent with this policy.
  3. Legal and University Process — The University does not exist in isolation from other communities and jurisdictions and their laws. Under some circumstances, as a result of investigations, subpoena, or lawsuits, the University may be required by law to provide electronic or other records or other information related to those records or relating to use of information resources (“information records”). Further, the University may in its reasonable discretion review information records, e.g., for the proper functioning of the University or for internal investigations.
    
2. Policies
  1. Copyrights and Licenses — Computer users must respect copyrights and licenses to software, entertainment materials, published and unpublished documents, and any other legally protected digital information.
    1. Copying — Any material protected by copyright must not be copied except as specifically stipulated by the owner of the copyright or otherwise permitted by copyright law. Protected material may not be copied into, from, or by any University facility or system, except pursuant to a valid license or as otherwise permitted by copyright law.
    2. Number of Simultaneous Users — The number and distribution of copies of copyrighted materials must be handled in such a way that the number of simultaneous users in a department does not exceed the number of original copies purchased by that department, unless otherwise stipulated in the purchase contract or as otherwise permitted by copyright law.
    3. Copyrights — All copyrighted information (text, images, icons, programs, video, audio, etc.) retrieved from computer or network resources must be used in conformance with applicable copyright and other law. Copied material must be properly attributed. Plagiarism of digital information is subject to the same sanctions as apply to plagiarism in any other media.
  2. Integrity of Information Resources — Computer users must respect the integrity of computer-based information resources.
    1. Modification or Removal of Equipment — Computer users must not attempt to modify or remove computer equipment, software, or peripherals that are owned by others, without proper authorization.
    2. Encroaching on Others' Access and Use — Computer users must not encroach on others' access and use of the University's computers, networks, or other information resources, including digital information. This includes but is not limited to: attempting to access or modify personal, individual or any other University information for which the user is not authorized; attempting to access or modify information systems or other information resources for which the individual is not authorized; sending chain-letters, unsolicited bulk electronic mail either locally or off-campus; printing excess copies of documents, files, data, or programs; running grossly inefficient programs when efficient alternatives are known by the user to be available; unauthorized modification of system facilities, operating systems, or disk partitions; attempting to crash or tie up a University computer, network or other information resource; or otherwise damaging or vandalizing University computing facilities, equipment, software, computer files or other information resources.
    3. Unauthorized or Destructive Programs — Computer users must not intentionally develop or use programs which disrupt other computer or network users or which access private or restricted information or portions of a system and/or damage software or hardware components of a system. Computer users must ensure that they do not use programs or utilities which interfere with other computer users or which modify normally protected or restricted portions of the system or user accounts. Computer users must not use network links for any use other than permitted in network guidelines. The use of any unauthorized or destructive program may result in legal civil action for damages or other punitive action by any injured party, including the University, as well as criminal action.
  3. Unauthorized Access — Computer users must refrain from seeking to gain unauthorized access to information resources or enabling unauthorized access.
    1. Abuse of Computing Privileges — Users of University information resources must not access computers, computer software, computer data or information, or networks without proper authorization, or intentionally enable others to do so, regardless of whether the computer, software, data, information, or network in question is owned by the University. For example, abuse of the networks to which the University belongs or the computers at other sites connected to those networks will be treated as an abuse of University computing privileges.
    2. Reporting Problems — Any defects discovered in system accounting or system security must be reported to the appropriate system administrator so that steps can be taken to investigate and resolve the problem.
    3. Password Protection — A computer user who has been authorized to use a password-, or otherwise protected, account may be subject to both civil and criminal liability if the user discloses the password or otherwise makes the account available to others without permission of the system administrator.
  4. Usage — Computer users must respect the rights of other computer users. Most University systems provide mechanisms for the protection of private information from examination by others. Attempts to circumvent these mechanisms in order to gain unauthorized access to the system or to another person’s information are a violation of University policy and may violate applicable law. Authorized system administrators may access computer users' files at any time for maintenance purposes. System administrators will report suspected unlawful or improper activities to the proper authorities.
    1. Prohibited Use — Use of the University's computers, network or electronic communication facilities (such as electronic mail or instant messaging, or systems with similar functions) to send, view or download fraudulent, harassing, obscene (i.e., pornographic), threatening, or other messages or material that are a violation of applicable law or University policy, such as under circumstances that might contribute to the creation of a hostile academic or work environment, is prohibited at any time.
    2. Mailing Lists — Users must respect the purpose and charters of computer mailing lists (including local or network news groups and bulletin-boards). The user of an electronic mailing list is responsible for determining the purpose of the list before sending messages to or receiving messages from the list. Subscribers to an electronic mailing list will be viewed as having solicited any material delivered by the list as long as that material is consistent with the list's purpose. Persons sending to a mailing list any materials which are not consistent with the list's purpose will be viewed as having sent unsolicited material.
    3. Advertisements — In general, the University's electronic communication facilities should not be used to transmit commercial or personal advertisements, solicitations or promotions (see Commercial Use, below). Public bulletin boards that have been designated for selling items by members of the MUM community may be used appropriately, according to the stated purpose of the list(s).
    4. Information Belonging to Others — Users must not intentionally seek or provide information on, obtain copies of, or modify data files, programs, passwords or other digital materials belonging to other users, without the specific permission of those other users.
  5. Political, Personal and Commercial Use — The University is a non-profit, tax-exempt organization and, as such, is subject to specific federal, state and local laws regarding sources of income, political activities, use of property and similar matters. It also is a contractor with government and other entities and thus must assure proper use of property under its control and allocation of overhead and similar costs.
    1. Political Use — University information resources must not be used for partisan political activities where prohibited by federal, state or other applicable laws, and may be used for other political activities only when in compliance with federal, state and other laws and in compliance with applicable University policies.
    2. Personal Use — University information resources should not be used for personal activities not related to appropriate University functions during business hours, except in a purely incidental manner.
    3. Commercial Use — University information resources should not be used for commercial purposes during business hours, except in a purely incidental manner or except as permitted under other written policies of the University or with the written approval of a University officer having the authority to give such approval. Any such commercial use should be properly related to University activities, take into account proper cost allocations for government and other overhead determinations and provide for appropriate reimbursement to the University for taxes and other costs the University may incur by reason of the commercial use. Users also are reminded that the “EDU” domain on the Internet has rules restricting or prohibiting commercial use, and thus activities not appropriately within the EDU domain and which otherwise are permissible within the University computing resources should use one or more other domains, as appropriate.
  6. Inspection and Monitoring — Any two of the following: the University's Executive Vice President, Chief Administrative Officer, or Legal Counsel can authorize the inspection of private data or monitoring of messages (including electronic mail) when there is reasonable cause to suspect improper use of computer or network resources. Legally privileged material should not be reviewed without consent of the owner.
    
3. Consequences Of Misuse Of Computing Privileges
A user of University information resources who is found to have purposely or recklessly violated any of these policies will be subject to disciplinary action up to and including discharge, dismissal, expulsion, and/or legal action.

  • Cooperation Expected — Users, when requested, are expected to cooperate with system administrators in any investigation of system abuse. Users are encouraged to report suspected abuse, especially any damage to or problems with their files. Failure to cooperate may be grounds for cancellation of access privileges, or other disciplinary actions.
  • Corrective Action — If system administrators have persuasive evidence of misuse of computing resources, and if that evidence points to the computing activities or the computer files of an individual, they should pursue one or more of the following steps, as appropriate to protect other users, networks and the computer system.
    • Provide notification of the investigation to the University's Chief Administrative Officer as well as the user's instructor or department head.
    • Temporarily suspend or restrict the user's computing privileges during the investigation. A student may appeal such a suspension or restriction and petition for reinstatement of computing privileges through the Dean of Students. A staff member may appeal through applicable dispute resolution procedures. Faculty members may appeal through the Dean of Faculty.
    • With authorization from the University's Chief Administrative Officer, inspect the user's files, disks, tapes, and/or other computer-accessible storage media on University owned and operated equipment.
    • Refer the matter for possible disciplinary action to the appropriate University unit, i.e., the Dean of Students Office for students, the Chief Administrative Officer for staff, and the Dean of Faculty for faculty.
search login
 


Click here to cancel

You were trying to view a protected page.
Please login to gain access or cancel to go back to the site.
User ID:  
Password:  


Forgot your password?