ºÚÁÏÉçÇø

Skip to Main Content

Search for a Policy

Responsible Use of University Computing Resources

Scope: Employees, Students Visitors and Vendors are covered by this policy.

Visitors • Employees • Students

Responsible Use of University Computing Resources

General Statement

University Computing Resources include, but are not limited to, end-user computing devices, servers, networks, email, software, printers, scanners, video distribution systems, telephone systems, and other computing hardware and software, whether owned by the University or contracted from a third party. All such University Computing Resources are intended for University-related use, including direct and indirect support of the University’s instruction, research, and service missions; of University administrative functions; of ºÚÁÏÉçÇø and campus life activities; and of the free exchange of ideas.

The rights of free expression and academic freedom apply to the use of University Computing Resources; so, too, however, do the responsibilities and limits associated with those rights. All who use the University Computing Resources must act responsibly, in accordance with the highest standards of ethical and legal behavior. Thus, legitimate use of University Computing Resources does not extend to whatever is technically possible. Users must abide by all applicable restrictions, whether or not they are built into the operating system or network and/or whether or not they can be circumvented by technical means.

This policy applies to all users of University Computing Resources, whether or not affiliated with the University, and to all uses of those resources, whether on campus or from remote locations. Additional policies may apply to specific computers, computer systems, and/or networks provided and operated by specific units of the University, and/or to uses within specific units. Some of these policies are listed in the “Additional Policies and Procedures” policy and the section of this policy titled “Other ºÚÁÏÉçÇø Computing Policies”.

Policy

All University Computing Resources users must:

  1. Comply with all federal, Ohio, and other applicable law; all generally applicable University rules and policies; and all applicable contracts and licenses. Examples of such laws, rules, policies, contracts, and licenses include: the laws of libel, privacy, copyright, trademark, obscenity, and child pornography; the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, which prohibit “hacking”, “cracking”, and similar activities; the University’s Code of Student Conduct; the University’s sexual harassment policy; and all applicable software licenses. In particular, users must:
    1. respect the right of others to be free from harassment or intimidation to the same extent that this right is recognized in the use of other communication; and
    2. respect copyrights, intellectual-property rights, ownership of files and passwords. Unauthorized copying of files or passwords belonging to others or to the University may constitute plagiarism or theft. Accessing or modifying files without authorization (including altering information, introducing viruses or other malware, or damaging files) is unethical, may be illegal, and may lead to sanctions; and
    3. not send unsolicited bulk email (“spam”) or email designed to trick users into providing their login credentials or other personal information (“phishing email”).
      • Users who engage in electronic communications with persons in other states or countries or on other systems or networks should be aware that they may also be subject to the laws of those other states and countries and the rules and policies of those other systems and networks. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses.
      • ºÚÁÏÉçÇø extends these policies and guidelines to systems outside the University that are accessed via the University’s facilities (e.g., electronic mail or remote logins using the University’s Internet connections).
  2. Use only those University Computing Resources that they are authorized to use and use them only in the manner and to the extent authorized. Ability to access University Computing Resources does not, by itself, imply authorization to do so. Users are responsible for ascertaining what authorizations are necessary and for obtaining them before proceeding. Accounts, passwords, and other authentication mechanisms, may not, under any circumstances, be shared with, or used by, persons other than those to whom they have been assigned by the University.
  3. Respect the finite capacity of University Computing Resources and limit use so as not to consume an unreasonable amount of those resources or to interfere unreasonably with the activity of other users. Although there is no set bandwidth, disk space, CPU time, or other limit applicable to all uses of University Computing Resources, the University may require users of those resources to limit or refrain from specific uses in accordance with this principle. The reasonableness of any particular use will be judged in the context of all of the relevant circumstances.
  4. Limit the personal use of University Computing Resources and refrain from using those resources for personal commercial purposes or for personal financial or other gain.Personal use of University Computing Resources is permitted when it does not consume a significant amount of those resources, does not interfere with the performance of the user’s job or other University responsibilities, and is otherwise in compliance with this and other University policy. Further limits may be imposed upon personal use in accordance with normal supervisory procedures.
  5. Refrain from stating or implying that they speak on behalf of the University and from using University trademarks and logos without authorization to do so. Affiliation with the University does not, by itself, imply authorization to speak on behalf of the University. Authorization to use University trademarks and logos may be granted only by ºÚÁÏÉçÇø. The use of appropriate disclaimers is encouraged. Personal web pages linked to the University Web should disclaim association with ºÚÁÏÉçÇø.

Enforcement

Whenever it becomes necessary to enforce University rules or policies, an authorized administrator may: disallow network connections by certain computers (even departmental and personal ones); require adequate identification of computers and users on the network; undertake audits of software or information on shared systems where policy violations are possible; take steps to secure compromised computers that are connected to the network; or deny access to computers, the network, and institutional software and databases.

Sanctions

Users who violate this policy may be denied access to University Computing Resources and may be subject to other penalties and disciplinary action, both within and outside of the University. Violations will normally be handled through the University disciplinary procedures applicable to the relevant user. Alleged violations by ºÚÁÏÉçÇøs will normally be investigated, and the Office of Ethics and Student Conflict Resolution will normally impose any penalties or other discipline.

However, the University, through its information managers, may suspend or block access to an account prior to the initiation or completion of such procedures; when it reasonably appears necessary to do so, and in order to protect the integrity, security, or functionality of University Computing Resources or other computing resources; or to protect the University from liability.

The University may also refer suspected violations of applicable law to appropriate law enforcement agencies.

Privacy and Security 

The University employs various measures to protect the security of University Computing Resources and users accounts. However, users should be aware that the University does not and cannot guarantee such security.

Users should also be aware that their uses of University Computing Resources are not private. While the University does not routinely monitor individual usage of University Computing Resources, the normal operation and maintenance of University Computing Resources require the backup and caching of data and communications, the logging of activity, the monitoring of usage patterns, and other such activities that are necessary for the rendition of service. Systems or technical managers, as part of their technical responsibilities, may occasionally need to diagnose or solve problems by examining the contents of particular files. Data from University Computing Resources may be used to evaluate the efficiency of University operations and personnel.

The University may also monitor the activity and accounts of individual users of University Computing Resources, including individual sessions and communications, without notice when:

  1. the user has voluntarily made them accessible to the public, as by posting to Usenet or a web site;
  2. it reasonably appears necessary to do so to protect the integrity, security, or functionality of University Computing Resources or other computing resources or to protect the University from liability;
  3. there is reasonable cause to believe that the user has violated, or is violating, any University policy;
  4. an account or device appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns; or
  5. it is otherwise required or permitted by law.

Any such individual monitoring, other than that specified in (1), or required by law, or necessary to respond to perceived emergency situations, must be authorized in advance by the Vice President for Information Technology or a designee of same.

The University, in its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, to appropriate University personnel or law enforcement agencies and may use those results in appropriate University disciplinary proceedings. Communications made by means of University Computing Resources are also generally subject to Ohio’s Public Records Statute to the same extent as they would be if made on paper.

The User’s Responsibilities 

  1. Be aware of the limits of computer security. Although the University employs various measures to protect the security of its computing resources and user accounts, users should be aware that the University cannot guarantee such security. Users should therefore engage in “safe computing” practices by establishing appropriate access restrictions for their accounts, guarding their passwords, and changing them regularly.
  2. Be responsible for backing up and protecting personal files.Although the University under certain circumstances may provide storage space and under certain circumstances that storage may be backed up, ºÚÁÏÉçÇø assumes no responsibility for the loss or recovery of personal files.
  3. Be responsible for protecting Miami data. All users have a responsibility to protect Miami data from unauthorized disclosure.

The User's Responsibilities

The University owns various computers and the entire internal computer networks used on campus. The University also has various rights to the software and information residing on, developed on, or licensed for, these computers and networks. The University has the responsibility to administer, protect, and monitor this aggregation of computers, software, and networks. Specifically, purposes of the University’s information technology management are to:

  1. manage computing resources so that members of the University community benefit equitably from their use;
  2. protect University computers, networks and information from destruction, tampering, and unauthorized inspection and use;
  3. communicate University policies and the responsibilities of individuals systematically and regularly in a variety of formats to all parts of the University community;
  4. establish and support reasonable standards of security for electronic information that community members produce, use, or distribute. Standards for security and access are elaborated in the document “ºÚÁÏÉçÇø Computing Security Policy,” as well as in documents derived from it;
  5. monitor policies and propose changes in policy as events or technology warrant.

The University's Responsibilities

“Responsible Use of Computing Resources at ºÚÁÏÉçÇø” was adapted from The Ohio State University’s Policy on Responsible Use of University Computing Resources. ºÚÁÏÉçÇø is grateful to The Ohio State University for allowing us to use its policy as a model.

Additional policies, including the “ºÚÁÏÉçÇø Computing Security Policy”, elaborate the above policies and outline procedures for implementation.

Additional policies that are not in this document may apply to specific computers, computer systems, or networks provided or operated by specific units of the University. Consult the operators or managers of these systems for further information.


Related Form(s)

Not applicable.


Additional Resources and Procedures

Not applicable.


FAQ

Not applicable.


Policy Administration

Other ºÚÁÏÉçÇø Computing Policies

7/1/2027

Responsible Officers

Vice President for Information Technology & Chief Information Officer

Legal Reference

  • Electronic Communications Privacy Act
  • Computer Fraud and Abuse Act

Compliance Policy

Yes

Recent Revision History

 

Reference ID(s)

  • MUPIM 19.2
  • OAC 3339-19-02

Reviewers

Vice President for Information Technology & Chief Information Officer