Computer Labs: Acceptable Use Policies
From ITS Wiki - Information Technology Services - University of Rhode Island
These policies apply to the following computer labs on the Kingston Campus:
- LL4 (Kingston Library Lower Level)
- Quinn 215/217
- Fine Arts 102F
- Ballentine 240
These labs are maintained by the central Information Technology Services Organization.
Students using the lab are restricted by the following policies. Students violating these policies will be asked to leave the computer labs.
1. No pornography.
2. No loud voices or otherwise disruptive behavior.
3. No soliciting.
4. No photography or videography without the express permission of the Associate Director, End User Support and the Dean of the Library.
5. Any files left on the machines will be purged when the machines are restarted daily.
6. There is no expectation of privacy in this lab. If you leave a machine, and do not log out of your accounts (facebook, twitter, online banking), URI is not liable for anyone else accessing your information.
7. If you send harassing messages/files that can be traced to a particular machine, URI reserves the right use digital forensics methods on the machine to determine the user at the time the harassing materials were generated.
8. Evidence of tampering with these machines to include, but no limited to, key logging and screen capture techniques, is not allowed.. If discovered URI reserves the right use digital forensics methods on the machine to determine the user at the time the harassing materials were generated.
These policies apply to all university-owned, Information Technology Services maintained computer resources and information technology systems and govern all users of these resources. The University of Rhode Island does not guarantee protection against media failure. Additionally, URI and ITS staff cannot be held accountable for violations of user data, such as unauthorized access by other users.
In this document, "user" refers to URI faculty, staff or students and "resources" refers both to the physical hardware including servers, computers, networks, and related systems and to the software and data on those systems.
While respecting confidentiality and privacy, ITS reserves the right to examine all university owned and operated computer systems and electronic/digital resources. ITS takes this step to enforce its policies regarding harassment and the safety of individuals; to prevent unauthorized reproduction or distribution of proprietary software or digital texts, images (moving and still) or music; to safeguard the integrity of computers, networks, and data; and to protect the University against seriously damaging consequences. ITS may restrict the use of its computers and network systems for electronic communications when faced with evidence of violation of University policies, or federal or local laws. ITS will respond to, and comply with, all valid legal documents, including subpoenas. The University reserves the right to limit access to its computers and networks.
The University cannot protect individuals using ITS systems against the existence or receipt of offensive material. Anyone using these electronic resources are warned that they may inadvertently be recipients of material they find offensive. Additionally, ITS resources should not be used for the transmission or dissemination of pornography, harassing materials or for-profit business endeavors.
Use of Resources
Users should recognize that computing resources are limited and should therefore not exceed their reasonable share of resources. System and network administrators may limit the use of any users seen to be in violation of this principle. Users must not misuse ITS computer resources to include, but not limited to, disseminating email widely and without good purpose (spamming) or flooding an individual, group, or system with numerous or large email messages (bombing), or perpetrating denial of service attacks.
Users must use only his/her own computer account(s), and may not attempt to impersonate the identities of others. Users may not supply false/misleading data nor improperly obtain another's password in order to gain access to computers or network systems, data or information. Negligence by another person in revealing an account name or password is not considered authorization of use.
Users must follow established procedures for protecting files, including managing passwords, using encryption technology, and storing back-up copies of files. Users must protect the physical and electronic integrity of equipment, networks, software, and accounts. Users must not introduce worms, viruses, or other malicious code into the system and must avoid propagating virus hoaxes.
Users must not attempt to access restricted files or portions of operating systems, security systems, or administrative systems to which they have not been given access.
Although anonymity can be legitimate under certain circumstances (for example, on an electronic bulletin board or posting comments to a blog), users must not hide their identity for malicious purposes or assume the identity of another user. Users must not harass other users using ITS computer resources (harassment is defined under existing campus policies), or make repeated unwelcome contacts with other users. Users must not display material that is explicitly sexual or offensive.
Misuse of Information
Users must not access without authorization electronic mail, protected data, or programs, or information protected under state and federal privacy laws. Users must not release another user's personal information.
Users are responsible for making use of software and electronic materials in accordance with copyright and licensing restrictions and applicable university policies. You may not use University networks, equipment and software to violate copyright or the terms of any license agreement. No one may inspect, modify, distribute, or copy proprietary data, directories, programs, files, disks or software without proper authorization.