Acceptable Use Policy and account creation

Saint Martin's University ("SMU", "we", "the University", "our") provides numerous information technology resources for use by the University community to support its educational mission. The use of these resources must be consistent with the goals of the University. As a member of the University community, you are expected to act responsibly and to follow the University's guidelines, policies, and procedures in utilizing information technology and electronic networks accessed by such technology.

These information technology resources include computers and computer services as well as access to our on-campus network, the Internet, World Wide Web and other online computer networks (collectively, "online networks"). We encourage members of the University community to use online networks for educational purposes under the appropriate circumstances. However, in order to protect our rights and the rights of others, certain rules must be followed.

The University's Integrated Technology Acceptable Use Policy includes the following guidelines that apply to all University community members, including faculty, students, staff or other users:

  • Respect the rights of others to freedom from harassment or intimidation. Sending of abusive or unwanted material causing the work or University experience of others to be disrupted is a violation of University policies, may violate the law and is unacceptable. Targeting another person, group or organization to cause distress, embarrassment, injury, unwanted attention or other substantial discomfort is harassment and is prohibited.
  • Abide by security restrictions on all systems and information. Use your assigned personal login account for all computer access. Using another person's account or making your password or another person's password or access code available to others or otherwise attempting to evade, disable or "crack" password or other security provisions or assisting others in doing so threatens the work, privacy and well-being of many others and is a serious violation of University policies, and is grounds for immediate suspension of your access privileges and other disciplinary action. You will be held responsible and will be liable for any harm resulting from your disclosing or allowing disclosure or improper use of a password.
  • Prohibition of improper advertising, solicitation, chain letters, mass emails, hoax email and pyramid schemes. Use of any online network to send unsolicited advertising, promotional material or other forms of solicitation to others is prohibited, except as permitted by law and when not prohibited by University policies and in those areas that are designated for such a purpose, for example, a classified ad area. Transmissions of chain letters and pyramid schemes of any kind are prohibited. Certain chain letters and pyramid schemes are illegal.
  • Do not post or transmit offensive graphic files. Transmitting through or posting on any online network sexually explicit images or any other content deemed to be offensive and inappropriate for academic use is prohibited. Viewing or transmitting sexually explicit material may constitute a violation of the University's sexual harassment policy.
  • Accept responsibility for your own work by learning appropriate uses of software to maintain the integrity of what you create. Keep archives and backup copies of important work. Learn and properly use the features for securing or sharing access to your information on any computers you use. Change passwords frequently and do not share them.
  • Unauthorized software installations and/or system modifications are prohibited. Installation of software onto networked or system hard drives may only be done by authorized personnel. System modifications of SMU owned computers may only be done by authorized personnel. Such restrictions are designed to ensure system integrity.
  • Respect copyright and other intellectual-property rights. Information, software, photographs, videos, graphics, music, sounds and other material (collectively "content") may be subject to copyright, trademark, trade secrets or other proprietary rights. Any unauthorized copying or distribution of such content will be considered a violation of University policies, and may constitute a violation of law, fraud, plagiarism or theft. Software licensed by the University must only be used in accordance with the applicable license. Modifying or damaging information without authorization (including but not limited to altering data, introducing viruses or simply damaging files) is unethical, a violation of University policies and may be a felony.
  • Identify yourself clearly and accurately in electronic communication. Anonymous or pseudo-anonymous communications appear to dissociate you from responsibility for your actions and are inappropriate. Concealing your identity or misrepresenting your name or affiliation to mask or attempt to distance yourself from irresponsible or offensive behavior is a serious abuse and violation of University policies. Communication under a false name or designation or a name or designation you are not authorized to use, including instances in conjunction with representing that you are somehow acting on behalf of or under the auspices of Saint Martin's University is prohibited and constitutes fraud.
  • Use resources efficiently. Accept limitations or restrictions on computing resources, such as storage space, time limits or amount of resources consumed, when so instructed by the University. Such restrictions are designed to ensure fair access for all users.
  • Recognize limitations to privacy in electronic communications. You may have an expectation that the contents of what you write or otherwise create, store and send can be seen only by those to whom you intend or give permission; however, the security of electronic information on shared systems and networks is approximately that of paper documents -- fairly reliable and generally respected, but breachable by someone determined to do so. Also note that, as part of their responsibilities, technical managers or other persons may need to view file contents.