- About Us
- Student Organizations
- Fraternity and Sorority Life
- Volunteerism and Civic Engagement
- Peer Involvement Advisors
- Campus and Community Involvement Scholarships
- Housing Options
- Assessment Plans and Reports
Computing and Network Acceptable Use Guidelines
Information & Technology
104 Computer Science
The University of Missouri Acceptable Use Policy applies to all users including faculty, staff, students, and guest users of University of Missouri computer networks, equipment, or connecting resources. The Missouri S&T guidelines stated here provide some specifics, but neither supercede nor conflict the UM policy.
Missouri S&T provides access to computing, networking and information resources for students, faculty and staff in support of Missouri S&T's mission of teaching, research, public service, and in support of the official duties of the university. When activating an account, a user implicitly affirms that: he or she will abide by the broadest interpretation of the following policies; failure to follow policies may result in loss of computing privileges; Missouri S&T may monitor computer use to protect the system; and the university may terminate the account of anyone who has been determined to use his or her access for unlawful purposes or in contravention of this policy.
Legal and Ethical Computer Use
Three legal concepts lie behind the following policy. It is unethical and illegal, without proper and valid authorization, to:
- Obtain access to services and data that do not belong to you;
- Consume or utilize services that do not belong to you;
- Alter or destroy data that do not belong to you.
The rules below are vigorously enforced by Missouri S&T. Users who do not comply may have their userids restricted to revoked or their access curtailed. Certain cases of abuse may result in prosecution, termination, or academic probation.
- Do not use the university's computing facilities to gain unauthorized access to a computer system.
- Do not infringe on the privacy rights or copyrights of others.
- Do not use computing facilities to harass other users or to do mischief. Do not send message to unwilling recipients. do not unnecessarily prevent other authorized users from using a terminal or other resource. Do not distribute a program that can damage the user or system environment.
- Do not use any ID, account or file without proper authorization. Do not use or intentionally seek access to an ID that is not yours.
- Do not endanger or interfere with the operation of any computer system. Do not change or alter hardware or software configurations on campus computers or networks.
- Do not run a program sent to you unless you know what it does and throughly trust its source.
- Protect userids , accounts, files, printouts and other computer resources from unauthorized users. Never reveal your password or share access through your userid .
- Do not copy data or software without proper authorization. Never distribute, through any mechanism, electronic or otherwise, a copy of a computer program to someone else without proper authorization.
- Do not use computing facilities to plagiarize the work of others.
- Do not use electronic mail or send message frivolously. Refrain from tampering with, forging, or sending large volumes of electronic mail. Do not send annoying or obscene message to any other user.
- Do not use university computing facilities for personal profit.
Misuse of university computing facilities will be reported to the Director of Information Technology (IT). The director may impose restrictions on the offender's computer access, and report the incident to the Vice Chancellor of Student Affairs, the Vice Chancellor of Administrative Services, the Vice Chancellor of Academic Affairs or University Police, whichever is appropriate. Please keep in mind that violation of U.S. or Missouri laws may result in legal and/or civil action. The Missouri statutes make computing tampering offenses a Class A misdemeanor for a first-time offender, which can carry a one-year prison sentence and a fine of $1,000. If the offender makes a profit of at least $150 from the offense, he or she may be charged with a Class D felony, which can carry a five-year sentence and fine of $5,000. If an individual guilty of tampering with computer equipment is to have caused $1,000 or more in damages, the offense becomes a Class C felony, which can carry a seven-year sentence