Computer Use Policy

Principles and Guidelines.

Responsibilities of users of College computer resources.

   A. Respect the mission of the College.

   B. Do not compromise the integrity of the computer systems and network.

   C. Be aware of the legal implications of computer use.

   D. Email.

   E. Internet.

   F. Social Media.

Prohibited Uses of College Computer Resources.

Enforcement of Computer Use Policy.

Campus Computer Resource Locations 

Principles and Guidelines
This Computer User Policy provides guidelines for appropriate use of the College’s computer facilities and services. It is not comprehensive but, rather, includes principles to guide members of the College community, as well as specific policy statements that serve as reference points.

A. Respect the mission of the College.

  1. The College makes network resources available to students, faculty and staff to further the College’s academic, vocational, spiritual, patriotic and cultural goals. The College network, Internet connection, and
    email system are for the College educational program and business use only.
  2. The College cannot control the content of web pages, e-mail or other on-line communications and is not responsible for the views expressed by outside entities or individuals. The College may engage in the monitoring of all electronic transactions, including e-mail or other electronic files created by users of the College’s computer facilities and services. The College has the responsibility to take reasonable steps should it learn of illegal use of its computer facilities, and will do so.
  3. You are responsible for all activity involving your College computer account. Keep your account secure and private. Sharing your password with another person is prohibited. Do not use common words as your password. Do not post your password in plain view for anyone to access.
  4. The College is the custodian of a wide array of personal and financial data concerning its students, faculty, staff, alumni, donors and the College itself. Complete confidentiality is required. Only those with authorization may access, communicate, or use confidential information, which may include, but is not limited to, student transcripts and financial information, employee personnel records, donor financial records, and the financial records of the College.

B. Do not compromise the integrity of the computer systems and network.

  1. When using computer and network resources, do not tamper with the facilities and avoid actions that interfere with the normal operations of computers, network and facilities.
  2. Do not connect personal or unapproved equipment to any College-owned computer or to the College network.
  3. Do not install personal software on College-owned equipment.
  4. Do not install College software on equipment that is personally owned.
  5. Avoid excessive use of College resources, as they are finite. This includes network, Internet and e-mail except where related to the College business. Limitations may be placed on excessive usage, especially in the areas of Internet and e-mail.
  6. Be aware that it is possible for any online information to be read or copied; that some user information is maintained in the system logs as part of responsible system maintenance; that the College reserves the right to examine computer files, including personal and confidential information maintained on College computing facilities.
  7. Remember that you are granted privileges and responsibilities with your account. The use of College resources for personal commercial gain or for political purposes is prohibited.
  8. Passwords should be chosen by and known only to the individual user responsible for the login. Individuals who give their passwords to another individual or display them on a wall, desk, computer, keyboard or any other surface will be disciplined and may face termination. Passwords must be a minimum of 10 characters in length and must be made up of at least three of the following: uppercase, lowercase, special characters or numbers. The password can not contain your name and must be changed at an interval to be determined by the Computer Center.
  9. Workstations must be locked or logged off to a point that requires a new log-on whenever employees leave their work area. (ctrl/alt/delete then click lock computer). The screensaver policy will also enforce this.
  10. Do not install or run programs that circumvent security policies. 

C. Be aware of the legal implications of computer use.

  1. Much of what appears on the Internet is protected by copyright law regardless of whether the copyright is expressly noted. Users should assume that all materials are copyrighted unless specifically noted. Copyright protection also applies to software, which is licensed to the College, and may have limitations on its use. Individual users who violate a copyright may be held legally responsible for their actions. The College reserves the right to refuse to defend any faculty member, student or staff member named in a lawsuit arising out of alleged copyright infringement activity and to refuse to pay any damages awarded by a court of law against such person.
  2. Many state and federal laws, including those prohibiting deceptive advertising, use of others’ trademarks, defamation, violations of privacy and obscenity apply to all computer-related communications.  

D. E-mail.

  1. E-mail should adhere to the same standards of conduct as any other form of mail. Avoid distasteful, inflammatory, harassing or otherwise unacceptable comments. Individuals may not use e-mail to infringe the copyright or other intellectual property rights of third parties.
  2. The College may engage in monitoring of e-mail messages or other electronic files created by employees in specific instances in which there is a good cause for such monitoring or legal obligations to do so.
  3. The act of putting a name other than your own in the “from” field of an e-mail message is fraudulent. E-mail recipients have the right to know who is contacting them.
  4. Respect the privacy of others and their accounts. Do not access or intercept files or data of others without permission. Do not use the password of others or access information under false identity.
  5. Distribution of unsolicited mail is inappropriate.
  6. The College cannot completely protect individuals against the existence or receipt of materials that may be offensive to them.
  7. Do not open e-mail from unknown senders and be cautious when clicking links or attachments in an e-mail message.
  8. Use of e-mail is to be primarily for educational and business purposes. Employees will be permitted to engage in incidental personal emailing, as long as (1) it is done during the employee’s lunch period or other off-the-clock time and (2) as long as existing policy regarding-email content and the opening of sender-unknown (possibly virus-laden) e-mails is followed.
  9. Employees are not to use College e-mail for non-business related communications to the College “staff”, “faculty” or “student” lists. Examples of inappropriate usage are emails to buy or sell personal items, operate a personal business, buy/sell/rent houses or to pass along editorials, jokes, chain letters etc.
  10. Individuals must understand that they do not have a personal privacy right in any matter created, received or sent from the e-mail system. E-mail can be read or intercepted by others; including inadvertent disclosure, accidental transmission to third parties or purposeful retransmission to another employee’s internal mailing list.  

E. Internet.

  1. Use of the Internet by employees or students is permitted and encouraged where such use is suitable for business or educational purposes. Users should be aware that the College will monitor activity and filter content which is inconsistent with the values, standards and mission of the College.
  2. Exploring the Internet for personal use should be done before or after work hours or during the lunch break.
  3. Downloading from the Internet should be done with caution and kept under control, because of potential viruses and space limitations. Any music files stored on College of the Ozarks computers are subject to deletion at any time and without notification. Bandwidth restrictions will be placed on audio and
    video streaming files that use excessive bandwidth. Do not automatically respond OK to pop-ups you receive while browsing the Internet.
  4. The display or downloading of sexually-explicit images, messages or cartoons or any document that contains ethnic slurs, racial epithets or anything that may be construed as harassment or disparagement of others based on their race, national origin, sex, sexual orientation, age, disability, religious or political beliefs is not permitted before, during or after business hours.
  5. The College has the right and capability to monitor and track Internet browsing by each user on our system. Our goal is that employees and students will make this unnecessary. 

F. Social Media.

  1. Social media includes such internet-based sites as MySpace, Facebook, Twitter, LinkedIn and blogs. College policy applies to two classes of Social media accounts: those owned and administered by the College itself for its business purposes, and those non-College-owned accounts and blogs which belong to students or employees, and which represent the College.
  2. All accounts or blogs owned by the College must be administered by an approved College employee who is responsible for monitoring content and removing anything that would reflect poorly on the College, including but not limited to, items that may be considered obscene, vulgar, defamatory, threatening, discriminatory, harassing, abusive, hateful or embarrassing to another person or entity. All materials posted must be compatible with the College’s Vision and Mission Statements. The content of all non-College-owned accounts and blogs which represent the College (1., above) is the responsibility of their respective owner(s), who may be subject to discipline for violation of this policy.
  3. No social media account or blog may link to any of the College’s websites without prior approval by the College.
  4. All social media described in 1. And 2., above, must adhere to current College policy regarding acceptable network use and security; student or employee codes of conduct; copyright, logo and trademark legal requirements (including those of the College); and protection of confidential information relating to the College, its employees or students.
  5. Should non-College-owned accounts or blogs make any reference to the College, they must include clear disclaimers that any views expressed are the owners alone, and do not necessarily represent the views of the College.
  6. There is no absolute privacy when posting to any social networking site. Be aware that content in violation of this policy may be grounds to discipline an employee or student. 

Prohibited Uses of College Computer Resources.

  1. Uses that violate College policy are prohibited.
  2. Unauthorized or excessive personal use is prohibited. Use is excessive if it affects the performance and/or operation of the network, results in substantial use of a system capacity, or otherwise subjects the College to increased cost or risks. Use that interferes with the performance of work or responsibilities of any employee of the College of the Ozarks is not permitted.
  3. Uses that interfere with the proper functioning of the College’s information technology resources are prohibited.
  4. Uses that unreasonably interfere with the ability of others to make use of the College computer resources are prohibited.
  5. Attempting to gain or gaining unauthorized access to the computer system or files is prohibited.
  6. Use of college computer resources to infringe the intellectual property rights, including copyright violations (www.copyright.gov) is prohibited. The College adheres to the Federal Digital Millennium Copyright Act of 1998 (www.copyright.gov/legislation/dmca.pdf).
  7. Use of College computer resources for personal profit is prohibited.
  8. Frivolous, disruptive or inconsiderate conduct in computer labs is prohibited.
  9. No college computing facility or office may be used for playing computer games.
  10. Moving or removing college owned computer equipment, software or peripherals without proper authorization is prohibited.
  11. Use of any college information system to access, download, print, store, forward, transmit or distribute offensive, obscene, pornographic, tasteless, racist, or illegal material is prohibited.
  12. Violating any state or federal law in connection with use of any College information system is prohibited. 

Enforcement of Computer Use Policy. 

Violation of any of these principles and guidelines may result in a denial of access to College computer resources, disciplinary action, termination and if appropriate, legal action. 

Campus Computer Resource Locations 

Art Department Graphic Design Computer Lab, Jones Building, Room 107
Plaster Lab, Plaster Building, Room 307
Center for Writing and Thinking, Jones Building, Room 308
Foreign Language Lab, Jones Building, Room 3
Gittinger Music Building, Music Computer Lab, Room 130
Graphic Arts Lab, Press Building, Room 2
Lyons Memorial Library, First Floor and Room 1
Mass Communications Lab, Jamison, Rooms 209 and 212
McKibben Lab, McKibben Center, Room 104
Math Lab, Pfeiffer Building, Room 226
Youngman Agriculture Bldg. Computer Lab, Room 117 

Dormitory Computers (All Dormitories have three student use computers) 

Each of these facilities establishes and maintains a computer use policy supplementing the college computer use policy according to its own purposes.


© 2014 College of the Ozarks ®