UMMIT Appropriate Use Agreement

Access to electronic mail, the Internet, databases, computers and other information technology (IT) resources is essential to the mission of UMM, and the achievement of excellence requires their effective use by all assigned users.

Use of information technology must be consistent with the University's mission and with its role as a public agency. Each assigned user is expected to protect the integrity of these resources and to know and adhere to University rules, regulations and guidelines for their appropriate use.

Regulations that govern personal conduct and use of University facilities also apply to the use of IT resources. In addition, the following guidelines apply more specifically to use of IT resources.

I. General Guidelines

Access to University IT resources is a privilege granted to members of the University community and all assigned users, which carries with it the responsibility to exercise common sense and civility when using them.

The library and IT services of the University of Maine at Machias primarily serve the educational, research, outreach, and operational activities of our students, faculty and staff. UMM extends services to community members as fully as possible to the extent that those uses do not interfere with the accomplishment of our primary purposes. As such, community members are regularly granted access to university library and select computer services. However, equipment usage, time availability, physical space, and personnel support are limited. Specific equipment may be exclusively reserved for student or staff use only, and a daily time limit is set for community patron access to university computers.

II. Individual Rights and Responsibilities

Computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. Since electronic information is ephemeral and easily reproduced, users must exercise care in acknowledging and respecting the work of others through strict adherence to software licensing agreements and copyright laws.

III. Existing Legal Context

All existing laws (federal and state) and University regulations and policies apply, including not only those law and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct.

Users do not own accounts on University computers, but are granted the privilege of exclusive use. Under the Electronic Communications Privacy Act of 1986 (Title 18 U.S.C. section 2510 et. seq.), users are entitled to privacy regarding information contained on these accounts. This act, however, allows system administrators or other University employees to access user files in the normal course of their employment when necessary to protect the integrity of computer systems or the rights or property of the University. For example, system administrators may examine or make copies of files that are suspected of misuse or that have been corrupted or damaged. User files may be subject to search by law enforcement agencies under court order if such files contain information, which may be used as evidence in a court of law. In addition, student files on University computer facilities are considered "educational records" under the Family Educational Rights and Privacy Act of 1974 (Title 20 U.S.C. section 1232[g]).

Misuse of computing, networking or information resources may result in the loss of computing and/or network access. Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable University or campus policies, procedures, or collective bargaining agreements. Illegal production of software and other intellectual property protected by U.S. copyright law is subject to civil damages and criminal punishment including fines and imprisonment. The University of Maine at Machias supports the policy of EDUCOM on "Software and Intellectual Rights."

Other organizations operating computing and network facilities that are reachable via the UMM network may have their own policies governing the use of those resources. When accessing remote resources from UMM facilities, users are responsible for obeying both the policies set forth in this document and the policies of the other organizations.

IV. Security

The protection of University IT resources depends heavily on each user's careful handling of "keys" to these resources, since any account can serve as an entry point for theft, damage or unauthorized use. Users must protect the confidentiality of their personal identification codes and passwords and are expected to exercise all reasonable precautions to insure that others cannot use their accounts, including choosing a secure password and protecting it, and logging off correctly. Users are responsible for any activity that comes from their account. Whenever a user uses a university owned computer, i.e. in the labs, clusters, university offices, login, logoff time and computer used will be logged.

Students, faculty, staff and authorized users may use their personal laptop on the network. Users, who use their own personal computer, are responsible for physically securing their computer and network connection. Users are responsible for any activity that comes from their network connection or computer. For security reasons, you are expected to maintain virus and firewall protection on your computer. University IT provides free Symantec Antivirus, which can be obtained from the IT Office (this free software is only available to students, faculty, and staff). Users must refrain from nonacademic uses that endanger the security of the campus, including IRC-based chat programs [HTML-based programs such as AOL, AIM, etc. are acceptable unless specifically prohibited (i.e., in the computer labs and clusters)].

V. "Hacking"

Persons may not obtain or use, or attempt to obtain or use, passwords, IP addresses or other network codes that have not been assigned to them as individuals or authorized for their use as University employees. Persons may not obtain, or attempt to obtain unauthorized access to computer accounts, software, files, or any other University IT resources. Persons may not attempt to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data.

VI. Malicious Activity

Persons may not knowingly or carelessly run or install software on any computer system or network or give to another user a program intended to damage or to place excessive load on a computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan Horses, and worms. Users may not knowingly or carelessly perform an act that will interfere with the normal operation of computer, terminals, peripherals, or networks. Users may not connect unauthorized equipment to the campus network. Users may not use electronic mail to harass or threaten others. This includes sending repeated, unwanted e-mail to another user. Inappropriate mass mailing is prohibited; this includes multiple mailings to newsgroups, listservs, or individuals, e.g. "spamming, flooding, or bombing." Please refer to our Netiquette Policy at for additional guidelines when using electronic forms of disseminating information.

VII. Impersonation and Anonymity

Users may not send electronic messages with the sender's identity forged or send anonymous messages unless the recipient has agreed to receive anonymous messages. Users may not attempt to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the designated user.

VIII. Commercial, Political and Non-University Activities

Persons may not use University IT resources for personal gain unassociated with University business. University employees may not use these resources to support the nomination of any person for political office or to influence a vote in any election or referendum. No one may use University IT resources to represent the interests of any non-University group or organization unless authorized by an appropriate University department.

IX. Computer Facility Usage (Labs and Clusters)

Persons using the computer labs and clusters are expected to follow the rules designated for the area they are using. Intentionally altering desktops and misusing or damaging equipment is prohibited. Displaying obscene, lewd, or sexually harassing images or text in a public computer facility or location that can be in the view of others is prohibited. However, pornographic material may be viewed, if the user is required to do so, for a course and the instructor has contacted the IT Office in advance.

X. De Minimis Usage

In the interest of making the use of IT resources a natural part of the day-to- daylearning and work of all members of the University community, incidental personal use is permitted. However, one should not use non-University sources of e-mail, internet access, and other IT services for activities of an extensive nature that are not related to University purposes except where specifically implied (e.g. as by students in the Residence Halls). Users are asked to refrain from downloading large files, or performing other network intensive activities (i.e. online gaming) during hours of peak usage (6 a.m.-8 p.m.) except for express academic purposes. If it is necessary to download files larger than 50 Megabytes, it should be done after 8 p.m. when possible.

Any storage space on University servers granted to faculty, staff, or students should only be used for academic or Univesity pursuits. It is a violation of this agreement to share assigned storage with others, or use it as a public file distribution node.

XI. State and Federal Laws

Persons may not use University computing facilities to violate State or Federal Laws including plagiarism and redistribution of copyrighted material, e.g. software, video, or music files.

XII. Violations and Enforcement

Violation of University rules governing appropriate use of IT resources may result in loss of access privileges, University disciplinary action, loss of employment and/or criminal prosecution. Enforcement will be conducted via the Office of Student Life, Vice President for Academic Affairs, and/or law enforcement officials, as deemed appropriate.

XIII. Questions or Problems

If you have any questions or concerns about this policy, you may contact the UMM IT Helpdesk at, or be phone at (207) 255-1237

XIV. Other

Use of any University computing resource constitutes acceptance of this policy. Portions of this policy have been adapted from "UMF Polices: Terms of Service for Using UMF Computing Resources" from the University of Maine at Farmington.

Last Revised: August 6th, 2007

Share |