The Office of Human Resources is providing this information as a service to the campus community. This is a service that is continually under development. We will make every effort to keep this site current and to correct errors brought to our attention.
Computer Use Policy (UCA Board Policy 412)
Q. To whom is the Computer Policy applicable?
A. The Computer Use Policy is applicable to all university faculty, staff, and students. As a user of these resources, all faculty, staff, and students are responsible for reading and understanding the policy.
Q. I know that university computers are for University business and educational purposes. Can I use school computers/internet for personal purposes too?
A. Yes. Limited and reasonable use of these tools for occasional employee personal purposes is permitted as long as the use does not result in additional cost of loss of time or resources for intended business purposes.
Q. What constitutes as “inappropriate uses” of computing resources?
A. Includes, but is not limited to the following:
- Any activity that would negatively affect the use of the network by others (e.g. games, excessive chat, etc.)
- Copying or transmitting copyrighted software or other material licensed or otherwise protected by copyright
- Any activity that would cause another user to lose control or usage of a computer or account
- Commercial or profit-making activities unrelated to the university’s mission
- Creating, transmitting, executing, or storing malicious, threatening, harassing, obscene, or abusive messages, images, programs, or materials
- Misrepresenting an identity or affiliation
- Violating university security, damaging university systems, or using computing privileges to gain unauthorized access to any university computer system and/or any computer system on the Internet
- Any activity that violates federal, state, and local laws, policies or regulations
- Fundraising for any purpose unless sponsored by an official university organization with appropriate university approval
- Permitting another person to use an account
- Accessing or using another person’s account for any reason
- Removing or defacing hardware, software, manuals, etc from open computing labs
- Abusing computer networks or computers at other sites connected to the networks
Q. Under what circumstances could the University gain access to my private University e-mail account?
A. Authorized university officials may access or enter electronic files (including e-mail files) under one or more of the following conditions:
- The user requests or gives permission to the university to access an account
- Pursuant to a valid search warrant or court order
- An emergency situation exists in which the physical safety and/or well-being of a person(s) may be affected or university property may be damaged or destroyed
- Reasonable grounds exist to suspect that a violation of law or university policy is occurring. Access will take place only after a reasonable effort has been made to obtain consent. Responsibility for authorizing access lies with the appropriate vice president
- If necessary to maintain the integrity of the computer system or to protect the rights or property of the university. Responsibility for authorizing access lies with the appropriate vice president.
Q. If I receive offensive e-mail in my University account, can I hold the University responsible?
A. No. The university does not manage the Internet and is not responsible for offensive material that may be encountered. Views and opinions expressed in e-mail are strictly those of the authors. The university is not responsible for the content of e-mail communications.
Q. What happens if I violate UCA’s computer use policy?
A. Engaging in any activity that violates the Computer Use Policy may result in the immediate suspension of an individual’s computer access privileges, other disciplinary and/or legal action. The imposition of any sanction imposed under this policy is subject to review pursuant to applicable provisions of the Faculty, Staff, and Student Handbooks.