JAMES MADISON UNIVERSITY

INFORMATION TECHNOLOGY

INFORMATION SYSTEMS APPROPRIATE USE POLICY

Dr. Karen A. Forcht - CIS Department

Access to computer systems and networks owned or operated by the University imposes certain responsibilities and obligations and is granted subject to University policies, and local, state, and federal laws. This access carries with it certain ethical responsibilities and obligations and should reflect the academic honesty and discipline appropriate for our shared community of network and computer resources. Ethical use demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and to freedom from intimidation, harassment, and unwarranted annoyance.

General Guidelines

In making appropriate use of resources you must:

In making appropriate use of resources you must NOT:

Enforcement

The University considers any violation of appropriate use principles or guidelines to be a serious offense and reserves the right to copy and examine any files or information resident on University systems allegedly related to inappropriate use. Violators are subject to disciplinary action as prescribed in the honor code, Student Handbook, and the University Data Security Policy, I:01:07. State and Federal laws may also apply.

Acknowledgment:

I understand the above policy and understand that any violation of this use policy will be subject to disciplinary action as described above.

Signature_______________________________Date_______________________________

Printed Name ____________________________ SSN _________-______-__________

©1997 James Madison University