Missouri State University

Acceptable Use

Definitions

Information technology resources include all hardware, software, services, accounts, voice or data network access, and electronic information that is owned, leased, contracted, managed, operated, stored, or provided by Missouri State University.

Policy statement

Missouri State University information technology resources are provided for University-related purposes, including support for the University’s mission of teaching, research, and public service, its administrative functions, and student and campus life activities.

The responsibilities of users of information technology resources are:

  • Behave in a manner consistent with the University’s mission and purpose.
  • Respect the intellectual property rights of creators, owners, contributors, and publishers.
  • Respect the privacy, confidentiality, and personal rights of others.
  • Protect assigned information technology resources from unauthorized use.
  • Access information technology resources only when authorized to do so.
  • Comply with all applicable laws, regulations, and University policies.
  • Adhere to the terms of software licenses and other contractual agreements.

Information technology resources must not be used to:

  • Violate applicable laws, regulations, or University policies.
  • Commit, attempt to commit, or facilitate acts of academic dishonesty.
  • Disrupt, attempt to disrupt or facilitate disruption of information technology resources.
  • Circumvent, attempt to circumvent, or facilitate circumvention of the University’s technical, administrative, or process controls or measures.
  • Engage in paid consulting, non-University business purposes, or activities for political gain, unless allowed by other University policies.
  • Send, post or display material in emails, webpages, or other electronic forms of communication in violation of Sections 565.090, 537.523, 537.110, or 573.010-573.065 of the Missouri Revised Statutes, or other local, state, or federal law.

The University values the principles of academic freedom and privacy and does not condone casual inspection of the information contained within or transmitted via information technology resources. However, this information is subject to authorized examination and inspection by the University when it is deemed appropriate by the Chief Information Officer in consultation with the Office of General Counsel. Access to, and use of, information technology resources may be limited, restricted, suspended, or revoked when it is appropriate to:

  • Investigate suspicion of misconduct under University policies.
  • Investigate suspicion of violation of Federal and State laws.
  • Comply with or verify compliance with Federal or State laws.
  • Meet legitimate business needs of the University.