ORIGINATOR: Chief Information Officer and Chief Information Security Officer
The University of Maryland University College (UMUC) owns and operates University computing resources to support the administrative, educational and instructional activities at UMUC. The use of these resources is a privilege that is extended to members of the UMUC community for UMUC-related purposes, provided the users act responsibly, respectfully and in a manner that does not infringe upon the rights of others or violate law or this Policy.
This Policy applies to all users of Computing Resources owned or managed by UMUC. Individuals covered by this Policy include, but are not limited to, UMUC faculty, staff and students accessing UMUC's network services via UMUC's Computing Resources and/or facilities. Computing Resources include all UMUC owned, licenses, or managed hardware and software and use of UMUC's network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.
Members of the UMUC community utilizing UMUC's Computing Resources must:
Comply with all federal, Maryland, and other applicable law; all applicable University rules and policies; and all applicable contracts and licenses. For example, users are not permitted to download movies or music from the Internet without proper authorization or transmit unlawful or harassing content utilizing University Computing Resources. Users who engage in electronic communications with persons in other states or countries or on other systems or networks may also be subject to the laws of those other states and countries and the rules and policies of those other systems and networks. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses.
Safeguard computer accounts provided by the University. Personal computer accounts may not be shared with anyone, unless prior approval is authorized by the user's departmental supervisor.
Respect the privacy of other users and their accounts, regardless of whether those accounts are securely protected. Ability to access other persons' accounts does not imply authorization to do so.
Adhere to the finite capacity of those resources and limit use so as not to consume an unreasonable amount of those resources or to interfere unreasonably with the activity of other users. The University may require users to limit or refrain from specific uses.
Refrain from using Computing Resources for personal commercial purposes or financial or other gain. Limited personal use of University Computing Resources for other purposes is permitted when it does not interfere with the performance of the user's job or other University responsibilities and is in compliance with the law and this Policy. Further limits may be imposed upon personal use in accordance with normal supervisory procedures.
Refrain from stating or implying that they speak on behalf of the University and from using University trademarks and logos without authorization to do so. Authorization to use University trademarks and logos may be granted only by the Senior Vice President for the University's Office of Communications.
Refrain from viewing pornography and other types of inappropriate websites or content on UMUC issued computers and/or other computer resources at any time.
Refrain from unauthorized distribution or sharing of proprietary information outside of the university domain.
Comply with UMUC Policy 270.10 – University of Maryland University College Email Guidelines, UMUC End User Device Guidelines, UMUC Google Services Guidelines, and UMUC Guidelines for Participation in Social Media.
Confidential data (including, but not limited to PII, FERPA, and HIPAA) should not be shared with unauthorized persons.
Security and Privacy
Users should have no expectation of privacy when utilizing UMUC's Computing Resources. As part of its regular operations, UMUC may monitor the patterns and frequency of use of UMUC's Computing Resources by individuals. This monitoring may include, for example, the length and frequency of login sessions and communications.
UMUC may monitor or inspect the content of communications containing sensitive university data (PII, FERPA, and HIPAA); it may also monitor UMUC's Computing Resources under the following circumstances:
For quality assurance and performance management purposes for employees who have contact with UMUC's students, applicants, and prospective students.
When UMUC reasonably suspects a violation of law or of university policies or practices, or suspects use of UMUC's Computing Resources that may harm UMUC or impede its operations, UMUC may monitor and inspect the content of an individual's use of UMUC's Computing Resources as well as monitor the patterns of use. Any such individual monitoring must be specifically authorized in advance by the President or designee, Provost, or the Chief Business Officer.
The University, in its discretion, may disclose the results of any such general or individual monitoring, including the contents and records of individual communications, as appropriate. All information created, received or contained in UMUC's Computing Resources is available to the public unless an exception to the Maryland Public Information Act applies.
Users who violate this Policy may be denied access to UMUC's Computing Resources and may be subject to other penalties and disciplinary action, both within and outside of UMUC. Alleged violations by students will normally be handled in accordance with the University Code of Student Conduct. UMUC faculty or staff members who violate this Policy may be subject to disciplinary action up to and including termination of employment. The Office of Human Resources and the Office of Legal Affairs will be notified of any alleged violations. UMUC may confiscate or temporarily suspend or terminate use of Computing Resources when necessary.