The Wayback Machine - https://web.archive.org/all/20060102184853/http://www.etsu.edu:80/oit/ppp/policies/ethics.asp
Computer Lab Office of Information Technology (OIT) Calendars Contact OIT Index Help
East Tennessee State University

Code of Ethics

Computer Network and Internet Access: Privileges & Responsibilities - East Tennessee State University (ETSU) operates a wide-area network that interconnects local area networks in academic and administrative offices, student computer labs, and in the future dormitory rooms.  The University maintains connections into the Tennessee Education Cooperative Network (TECnet), the Internet and the World Wide Web. Thus, the University's network is a part of the global network that provides access to information and information processing technologies.  By having access to the University's network and its resources, students, faculty, and staff can communicate and collaborate among themselves and their counterparts throughout the world.  This privilege carries with it responsibilities with which all users must comply.

 Everyone within the ETSU community who uses networked computing and communications facilities has the responsibility to use them in an ethical, professional and legal manner and to abide by TECnet policies.  Users should respect the privacy rights of others.  ETSU's facilities and network access capabilities should never be used for purposes intended to incite crime.  Communications which violate Tennessee, federal, or international law are not acceptable.  For example, the use of ETSU's computer and network resources to threaten or harass others or the misrepresentation of one's identity in electronic communications for the purpose of illegal or unauthorized actions or activities will not be tolerated.  These statements concerning responsibility are not meant to be exhaustive.  Any questionable use should be considered "not acceptable."  Serious or repeated instances of abuse will be referred to the proper authority for disciplinary or legal action.

Computer Resources -  All users of any institutionally maintained electronic data, data files, software, and networks are expected to handle the resource in a responsible and ethical manner.  A user's interest ceases when it invades the right of personal and/or institutional privacy; results in the destruction of personal and/or institutional property; demonstrates a potential for loss, embarrassment, litigation to the individual and/or institution; or causes a limited resource to be used in a wasteful or careless manner.

 All information processed through Information Technology is considered sensitive and/or confidential.  The responsibility for the release or discussion of data is assigned to the official custodian of the data file(s).  Access to information is based on a legitimate "need to know" and directly related to assigned duties.

 University electronically maintained data, data files, software, and networks will be used for authorized purposes only.  Users are responsible for the security of the resources.

 Any use of the resource deemed irresponsible or unethical (as defined in the Faculty Handbook section 1.10) will result in the immediate denial of use of the resource.  The violation will be referred to the proper authorities for disciplinary and/or legal action including, but not limited to, restitution, restrictions, reprimand, suspension, probation, expulsion, termination, and, if necessary, legal action.  Appeals will be handled through due process channels (APA) already established for students and/or staff.  Student violations will be referred to the Vice President for Student Affairs and/or Vice President for Health Affairs, faculty violations will be referred to the Vice President for Academic Affairs and/or the Vice President for Health Affairs, and staff violations will be referred to the Vice President for Administration and Development.

 The following examples attempt to convey the intent of irresponsible and/or unethical use:  violation of Federal/State copyright laws; violation of the Family Educational Rights and Privacy Act of 1974; use of the resource for obscene material; deliberate wasteful use of the resource; unauthorized altering of hardware, software, or data; piracy of data or software belonging to another person; or careless use of the resource which may result in the release of restricted information.

 **WARNING** Any person who knowingly brings on campus, has in their possession or distributes any virus without the authorization and written permission of the Office of Information Technology, will be considered to be in violation of the above and will be vigorously prosecuted.  **Campus** is defined to include any property owned, leased, maintained or controlled by ETSU and includes any site or area where any system owned, leased, operated and/or maintained by ETSU is housed.

NOTICE TO USERS:  It is the policy of East Tennessee State University to protect all institutional computing resources including, but not limited to, hardware and software, consisting of the actual equipment being supplied by the university as well as the programs and related materials used in conjunction therewith.  In accordance with local, state, and federal law, indiscriminate examination of individual user's files is not permitted, nonetheless as a means of maintaining the integrity and security of those aforementioned resources.

 East Tennessee State University retains the right to inspect individual accounts and files stored on any system owned, maintained and/or leased by said university.  While no prior authorization by individual users is required to inspect those files and accounts, you are, by virtue of accepting the account offered by ETSU and "logging" on to its computing equipment, granting to the university prior unrestricted permission, subject to university policy, to review, examine and/or otherwise view, by any method at the sole discretion of the university and without any additional advance notice to said user, any account and/or file stored on university computer resources.

 Should such a review take place, you will be given notice, as a courtesy only, of the results of said review within a reasonable time after the review is completed.  While use of university computing resources for personal use is strictly forbidden, should you have materials for which you have any reasonable expectation of privacy or which you consider to be confidential for any reason, you should retain those materials on a disk which can be secured as you would any other personal items or materials which you consider private in nature.

 For such a policy to work, it is essential that users observe responsible and ethical behavior in the use of the resources.  In an effort to assist the user community in effective use of the limited computer resources, it seems reasonable to highlight some specific responsibilities and types of behavior that represent abuse of a user's privilege.  The examples do not constitute a complete list but are intended to convey the intent of the code.

 Users should not damage or attempt to damage computer equipment or to modify or attempt to modify equipment so that it does not function as originally intended.  It is equally wrong to damage or modify or attempt to damage or modify the software components:  operating systems, compilers, utility routines, etc.

 Users should not use or attempt to use an account without authorization from the owner of that account.  Users have the responsibility of protecting their accounts through the proper use of passwords, but the fact that an account is unprotected does not imply permission for an unauthorized person to use it.  Further, accounts are to be used only for the purposes for which they have been established.  (Only the individual owner of an account is authorized to use that account.  Providing passwords or in any way permitting or making it possible for anyone other than the authorized owner of the account to use computer resources is not authorized and may be a violation of Tennessee Law.  Under this condition both the owner and the unauthorized user may be subject to legal action if determined to be appropriate by ETSU legal counsel.)  Additionally, it is wrong to use a university-sponsored account for funded research, personal business, or consulting activities.  There are special accounts for such purposes.

 Users should not use private files without authorization.  Owners of such files should take precautions and use the security mechanisms available.  However, the fact that a file is not protected does not make it right for anyone to access it, unless it is specifically designated as a public access file.  It is equally wrong for anyone to change or delete a file that belongs to anyone else without authorization.  Violation of property rights and copyrights covering data, computer programs, and documentation are also wrong.  In the event of accidental access or private files, confidentiality of those files must be maintained.

 Any deliberate wasteful use of resources is irresponsible; it encroaches on others' use of facilities and deprives them of resources.  Printing of large unnecessary listings and the playing of games solely for entertainment are examples of such abuse.  Users are expected to be aware of the resources they are using and to make reasonable efforts to use these resources efficiently.

 All state and federal copyright laws will be abided by at all times.  Users must not copy any part of a copyrighted program or its documentation which would be in violation of the law or the licensing agreement without written and specific permissions of the copyright holder.

 Serious or repeated instances of abuse of computer facilities and resources will be referred to the proper authorities for disciplinary or legal action including, but not limited to restitution, restrictions, reprimand, suspension, probation, expulsion, or termination.

If you have questions or problems implementing any of the above please contact the Office of Information Technology.

 

 

OIT Home | Academic Technology Support | Administration| ETSU Home | Human Resources | Institutional Effectiveness and Planning | Public Safety | Students | Security | Virus InformationOffice of Information Technology
Campus Box 70558
Room 308, Burgin Dossett Hall
East Tennessee State University
Johnson City, TN 37614
Help desk: 423-439-4648
fax: 423-439-5770