The Policy for Responsible Computing at the University of Delaware
contains the governing philosophy for regulating faculty, student, and
staff use of the University's computing resources. It spells out the
general principles regarding appropriate use of equipment, software, and
networks. By adopting this policy, the Faculty Senate recognizes that all
members of the University are also bound by local, state, and federal laws
relating to copyrights, security, and other statutes regarding electronic
media. The policy also recognizes the responsibility of faculty and system
administrators to take a leadership role in implementing the policy and
assuring that the University community honors the policy.
Access to the University's computing facilities is a privilege granted to
University students, faculty, and staff. Access to University information
resources may be granted by the owners of that information based on the owner's
judgement of the following factors: relevant laws and contractual obligations,
the requestor's need to know, the information's sensitivity, and the risk of
damage to or loss by the University.
The University reserves the right to limit, restrict, or extend computing
privileges and access to its information resources. Data owners--whether
departments, units, faculty, students, or staff--may allow individuals other
than University faculty, staff, and students access to information for which
they are responsible, so long as such access does not violate any license
or contractual agreement; University policy; or any federal, state, county,
or local law or ordinance.
University computing facilities and accounts are to be used for the
University-related activities for which they are assigned. University
computing resources are not to be used for commercial purposes or
non-University-related activities without written authorization from the
University. In these cases, the University will require payment of appropriate
fees. This policy applies equally to all University-owned or University-leased
computers.
Users and system administrators must all guard against abuses that disrupt
or threaten the viability of all systems, including those at the University
and those on networks to which the University's systems are connected.
Access to information resources without proper authorization from the data
owner, unauthorized use of University computing facilities, and intentional
corruption or misuse of information resources are direct violations of the
University's standards for conduct as outlined in the University of Delaware
Policy Manual, the Personnel Policies and Procedures for Professional and
Salaried Staff, the Faculty Handbook, University collective bargaining agreements,
and the Official Student Handbook and may also be considered civil or criminal offenses.
Approved: May 11, 1992
Information about the Electronic Community Citizenship Examination
University of Delaware home page