Sidebar Site Navigation
This policy applies to all persons and equipment utilizing the information technology resources of the College of Engineering and Applied Science. This includes but is not limited to, faculty, visiting faculty, staff, students, guests of the administration and authorized individuals or organizations. Equipment that uses the information technology resources of the College of Engineering and Applied Science and the University of Wyoming including equipment which is purchased using non University funds are subject to the same requirements as University equipment and will be held accountable for any misuse.
A system / network manager is defined as the person responsible for the upkeep and maintenance of technology resources. They will make a good faith effort to maintain resource security by applying security patches and taking other security measures. The manager will also actively monitor systems and filter network traffic as needed or required by contractual obligations.
The University has established specific procedures to be followed when abuse of computing resources has allegedly occurred. The College of Engineering and Applied Science shall comply with these procedures.Authorization to use Information Technology Resources:
The College of Engineering and Applied Science system / network managers will comply with UNIREG 3-690. Users of information technology resources should be aware that administrative access to resources assigned to a user may occur. This access may be at the request of a user to correct a problem in their assigned resources. The access may be in response to a system security, resource overload, or other event requiring administrative access. Access may also occur by law enforcement or judicial requirements.
Policies for use:
University of Wyoming and College of Engineering and Applied Science computers, networks and other information technology resources may not be used in any manner prohibited by law, licenses, contracts, or university regulations.
Organizations, faculty, staff, students and other individuals are accountable for the information they publish across College of Engineering and Applied Science and University of Wyoming information technology resources. They must be aware of and abide by university and College of Engineering and Applied Science policies regarding confidential information, intellectual property, harassment, and the acceptable use of information technology resources.
Users are individually responsible for their use of the information technology resources to which they have been granted access. Sharing of personal accounts is prohibited.
Pranks, practical jokes, use of accounts without authorization, cracking systems or accounts, and malicious or unauthorized hacking are prohibited.
Physical damage to information technology resources is prohibited.
Email, executable binary programs, software, recordable media and data files should be treated as possibly containing computer viruses, worms or other destructive programs unless there is reliable evidence to the contrary. Scan first, ask questions later.
College resources are shared resources. Be considerate and refrain from monopolizing systems, overloading networks with excessive data or wasting computer time, disk space, printer paper, manuals or other resources.
All wireless access points used in the College of Engineering and Applied Science facilities will be managed by departments or Information Technology. Access points that are not managed will be removed from the network.
It is a violation federal and state laws and University policy to use College technology resources to intimidate or single out individuals or groups for degradation or harassment. Use of College resources for private financial gain or compensation is prohibited except as permitted under University of Wyoming regulations.
Remediation of policy violations:
Abuse of information technology resources, unauthorized access, inappropriate use, or violation of these policies is cause for dismissal and may result in disciplinary action per university regulations and prosecution under federal or state laws.
Accidental abuse, including but not limited to run-away computer processes, sudden loss of disk space on a shared device, loss of network bandwidth and accidental virus infestations may be corrected by the resource owner or department network manager. Reasonable efforts will be made to notify and educate the user who is abusing a resource if time permits before the resource or access to it is removed. Department network managers may take appropriate action to eliminate the resource abuse including but not limited to the removal of offending processes, accounts and or files. Users suspecting they may have propagated viruses or worms should notify the local administrators as soon as possible.
Intentional or repeated accidental abuse will be reported to the Information Security Office of the Division of Information Technology. The owner or departmental network manager will coordinate all remedial activities with the Information Security office. Department network managers may take appropriate action to eliminate the resource abuse including but not limited to the removal of offending processes, accounts and or files.
This document is to be reviewed by the College of Engineering and Applied Science Technology Committee on at least an annual basis.