9.9 Code of Computing Practices
(Fayetteville Policies and Procedures 201.0; Family Educational Rights and Privacy Act of 1974, 20 U.S.C. §1232g; Electronic Communications Privacy Act of 1986, 18 U.S.C. §§ 2510 et seq.; 18 U.S.C. § 1030; Arkansas Freedom of Information Act, Arkansas Code Ann. §§ 25-19-101 et seq.; Arkansas Code Ann. §§ 5-41-101 et seq.)
Computing resources are provided to enhance teaching, research, service and the activities which support them. When you use university computing resources or are granted the use of a computing account, you are expected to use your access, accounts and resources responsibly and for the intended educational, research and administrative purposes. You may not use your account for private consulting or personal gain. If you have access to privileged or sensitive information, you should keep it confidential. Your use of computing and network resources should always be legal and ethical, reflect academic honesty, and show restraint in the consumption of shared resources. It should demonstrate respect for intellectual property, ownership of data, system security mechanisms, the right to personal privacy and the right of individuals to freedom from intimidation and harassment. You must adhere to copyright and licensing agreements and should become familiar with those for each specific product you use before using it.
You may produce, in a manner consistent with this code, an individual World Wide Web page through your university account. It must include a disclaimer as specified in the Code of Computing Practices. The university does not approve, preview or censor home pages and accepts no responsibility for their content, or for the content of electronic mail communications. Approval for Listservs or newsgroups must be obtained from the appropriate system administrator. The university does not control the content of lists or newsgroups and does not assume responsibility for their content.
You do not own your university computer accounts, but are granted use of them. The university will access electronic files, including email files, only under one or more of the following conditions: you consent in writing to such access; there is an emergency which may affect someone's physical health or well-being or may result in the damage or destruction of university property; there is reason to believe that a violation of law or university policy is occurring or has occurred; or access is necessary for maintenance of computers, networks, data, and storage systems, or to protect the rights or property of the university or other users.
Electronic files, including email files, of university employees are potentially subject to public inspection and copying under the state Freedom of Information Act (FOIA), which states that "All records maintained in public offices or by public employees within the scope of their employment are presumed to be public records."
Records containing information directly related to a student are confidential and protected from public disclosure by the Family Educational Rights and Privacy Act. You may not access any such records maintained in an electronic format or disclose or distribute their contents in a manner inconsistent with federal and state laws and university regulations. Confidential information placed in computers must be protected appropriately.
You should not give your password to any unauthorized user and should take advantage of system-provided protection measures to prevent unauthorized use of or access to your account, your computer and its network. If you cease to be a member of the campus community, are assigned new responsibilities, or take a new position, your account and access authorization will be reviewed. You may not use facilities, accounts, access codes, privileges or information which you are not authorized to use.
You must not attempt to access, copy, or destroy programs or files that belong to other users or to the university, nor use university computing resources for unauthorized monitoring of electronic communications. You must not create, run, install or knowingly distribute a computer virus, Trojan horse or other surreptitiously destructive program, email, or data via any university computer or network facility, regardless of whether it results in demonstrable harm. University computers must not be used to annoy, harass, threaten, intimidate, terrify, or offend another person, disrupt or damage another person's work, or invade another's privacy. Sending electronic chain letters, spamming, spoofing, and engaging in resource-intensive activities unrelated to university functions are also prohibited. Violation of this code may result in revocation or suspension of access privileges, in disciplinary action, or legal sanctions. For full text see the University Code of Computing Practices.
Monday, September 28, 2009 2:11 PM