Taxpayers, students, and others providing funding for Missouri State technology resources expect that these assets will be used and offered equitably. Further, they expect use of these resources to support the University's purpose of developing educated persons and mission of public affairs.
To ensure compliance with these expectations, the University requires its authorized users of the information technology resources to follow the computer and network policies outlined below, which are in coordination with the Acceptable Use Policy, Accessibility Policy and Web Policy.
Information Technology Council will periodically review and alter this policy as necessary to promote equitable access to University resources. The University reserves the right to limit, revise or prioritize any University-owned computer resource as it sees fit in the best interest of the University.
Additionally, this policy is subject to all other information technology policies. Please review all the information technology policies.
To conserve resources and maintain efficiency, the University also periodically deletes accounts that are either not being used or are issued to non-current students, staff, or faculty. Authorized users are responsible for archiving their accounts' data files prior to the deletion of their account.
Computer Services follows backup procedures and schedules on central servers to provide security and disaster recovery. Individual workstations are not backed up centrally; however, authorized users have limited file space on central servers where they can copy files they wish to have backed up.
Missouri State University offers high-quality communication services to Missouri State campuses and appropriate affiliates. Communication services include both telecommunication services and infrastructure for data/video networking services.
Communication services must be monitored to ensure the entire campus community receives acceptable service. As such, on-campus University units and student residents must obtain all communications services through Telecommunications Services, including new service and repairs. Additionally, all on-campus wiring for communication services must meet wiring standards set by Communication Services.
For University units, the associated administrator is responsible for determining and approving appropriate communication services, reviewing billing and ensuring proper use of these services. For residence hall service, the student resident is responsible for ensuring proper use of communication services and reviewing any applicable billing.
Networking services include both wireless and cabled video and network systems. Unauthorized network infrastructure electronics may not be connected to the campus network, including hubs, switches, wireless access points and bridges. The University occasionally allows routers with proper approval.
Additionally, workstations or servers must meet minimum computer standards before being connected to the network. Also, all workstations or servers must obtain IP addresses through Dynamic Host Configuration Protocol (DHCP) if possible. Computer Services can handle exceptions by issuing a special registered address. Additionally, workstations or servers connected to the Missouri State network may not host open file shares without an approved exemption from Computer Services.
The 2.4 GHz and 5 GHz spectrum are institutional resources that must be governed appropriately. Administrators of wireless networks that use these radio frequencies must centrally register their network's frequency. Additionally, devices interfering with a wireless network may be disabled, upon review. This coordination helps minimize interference problems between wireless networks and other devices using radio frequencies.
Finally, as a member of the Missouri Research and Education Network (MOREnet), Missouri State also follows MOREnet policies.
Telecommunication services include local, long-distance and messaging services. Users may not accept collect or third party calls without an approved exemption from Telecommunication Services.
The University will reimburse employees for business calls made on personal phones when a charge occurs. Additionally, employees must reimburse the University for personal calls made on business phones when a charge occurs. See the reimbursement procedures for more information.
University units must ensure data and software are not transferred to unauthorized users. As such, University units must erase all data from computer hard drives before transferring computers to new owners. See the workstation data security procedures for more information.
All authorized users who dial up the Missouri State communications servers (modems) will be limited to a specific number of hours per month during peak usage times. While peak usage connect time remains less than the specified time for the month, the user is also granted unlimited connection time during non-peak times.
Once a user consumes his/her peak usage time allowed during a particular month, s/he will only have dialup access to the University during limited timeframes for the remainder of that month. The hour allocation will be reset on the first day of each month.
The University provides the following resources to allow account owners to track their modem usage:
- A personalized web page that displays usage as of the previous day
- Email to account owners when they reach selected thresholds of usage
In addition to the following sections, authorized users must also follow the Acceptable Use Policy related to email.
Emails must be retained pursuant to the State of Missouri and University retention schedules. Once an email message is deleted or purged, the University cannot guarantee the recovery of that email message.
Backups of the entire email system are performed on a regular basis. These backups enable the University to recover the entire email system in the event of a disaster.
Mass email is unsolicited email sent to more than 250 internal or external email addresses, regardless of whether the email is sent in one or several messages. Since it can degrade the email service for all users, mass email should be used sparingly.
As such, the University consolidates campus-wide announcements into two mass emails each week: one email bulletin to faculty and staff and one email bulletin to students. Authorized users may submit items for inclusion in these bulletins.
To send a mass email message outside of the email bulletins, authorized users must follow the mass email procedures. Before the mass email will be sent, the appropriate administrative team member (or his/her delegate) must approve the message.
The University open-access computer lab facilities are considered to be study areas. All activities which disrupt, attempt to disrupt, or support the disruption of a study environment will not be tolerated and corrective action will be taken.
No food or drink is permitted in the University open-access computer labs. Any food or drink must be left outside the lab in designated areas or concealed in a backpack or other bag while in the lab. Food or drink that is concealed may not be consumed while inside the lab facility.
Cellular phone calls must be handled outside of the University open-access computer lab facilities. Cellular phones are not required to be turned off; however, all incoming and outgoing phone calls must be handled outside of the computer lab.
Game playing on University owned machines in the University open-access computer labs is prohibited. Game playing in the process of software creation for a class is permitted, however, for debugging purposes only. Game playing on open network jacks is permitted; however, students pursuing academic interests will take priority.
All computer and network products and services used by the University, including purchased products and outsourced services, must comply with applicable University policies. Applicable policies may include accessibility, security, privacy or hosting requirements.
For more information about which policies apply, contact the appropriate University unit.
Viruses can disrupt the University's technology services, systems or business and damage data files. To avoid these problems on University servers, system administrators will follow procedures to remove viruses from any file found on a University server.
University units must ensure that University-owned computers run virus protection software, and users are responsible for removing viruses from their individual workstations. University units must also ensure that University-owned computers are up-to-date with all operating system critical patches/service packs. Contact the Computer Services Help Desk for assistance or more information.
Approved by Board of Governors: July 30, 2004