Ohio Administrative Code (Last Updated: January 12, 2021) |
3352 Wright State University |
Chapter3352-7. Administration Generally |
3352-7-17. Responsible use of university computing resources
-
(a) General policy.
(1) Wright state university provides computers, computing systems, and networks for faculty, staff, and other users to fulfill the university's mission of teaching, research, and service. Computing resources are the property of the university, and all use of university computing resources must be authorized and authenticated.
(2) This policy applies to the use of all Wright state university computing resources, whether administered by the department of computing and telecommunications services, by individual colleges and departments, or by off-campus units that connect remotely to the university's network and operate under the aegis of Wright state university. Nonuniversity owned computing resources, while attached to the university network, are subject to the same policies as university owned computing resources.
(B) Compliance.
(1) Responsible use of university computing resources by faculty, staff, and other users requires compliance as listed in paragraph (B)(1)(a) to (B)(1)(d) of this rule.
(a) Users must comply with local, state, federal, and international regulations and statutes, including copyright law and trademark law. Users also must abide by all university policies.
(b) Users must abide by the terms of software licensing agreements and contracts that pertain to the university's computing, information, and communications resources.
(c) Personal use of university computing resources is permitted when such use does not result in personal commercial, financial, or other gain; consume a significant amount of computing resources; or, interfere with the performance of the user's job or other university responsibilities.
(d) Further limits may be imposed upon personal use in accordance with normal departmental procedures.
(2) Users are responsible for the security of their computer resources and for activity that originates from their accounts. Users should not share their accounts or use accounts for which they are not authorized.
(3) Users should be considerate in their use of computer resources and not perform acts that are deliberately wasteful of computing resources or that unfairly monopolize resources.
(4) Any exception to this policy requires the recommendation of the appropriate dean or vice president, written approval of the provost, and appropriate contractual arrangements with the university prior to such use. A copy of the written authorization and/or contract shall be kept on file by the appropriate dean or vice president and by the director of computing and telecommunications services.
(5) Failure to comply with this policy may result in disciplinary action and/or the loss of use of university computing resources. The university also may refer suspected violations of applicable law to appropriate law enforcement agencies.