86 Information Technology
Policy Statement:
The Board encourages the development of products, processes, and ideas for such technologies that are deserving of investigation by the College and directs the administration to develop those procedures necessary to meet the mandates of the Oklahoma Technology Transfer Act (70 O.S. 2001 § 3206.3).
Introduction
Murray State College (MSC) is dedicated to maintaining advanced information technology systems that support the college’s mission. This commitment requires responsible use by all users, including students, faculty, staff, and others utilizing MSC’s computers, networks, distance learning facilities, and communication technologies. Users are expected to operate these resources effectively, efficiently, and ethically, adhering to standards derived from common sense and decency applicable to all public resources within the college.
Purpose
The development and maintenance of information technology at MSC aim to:
- Promote Learning and Research: Facilitate access to and exchange of knowledge and information to support educational and scholarly activities.
- Conduct Official MSC Business: Enable the execution of official college operations and activities.
Resources encompassed by this policy include telephones, fax machines, photocopiers, computers and peripherals, distance learning tools, the local area network, and internet connections via the Oklahoma State Regents for Higher Education’s OneNet.
User Responsibilities and Prohibited Conduct
All users of MSC technology must adhere to the following guidelines. Violations are considered unethical and, in some cases, unlawful. Use of MSC’s technological resources is a privilege, not a right, and misuse may result in sanctions to protect legitimate users. Potential disciplinary actions include advisement, revocation of use privileges, dismissal, and/or legal action.
Prohibited conduct includes, but is not limited to:
- Interference with Technology Use: Disrupting or obstructing the intended use of technology resources.
- Unauthorized Access: Accessing or attempting to access confidential resources and information without authorization.
- Unauthorized Modifications: Altering any technology, programs, files, or other resources without permission.
- Destruction or Disfigurement: Destroying, dismantling, or defacing any technology, programs, files, or other resources.
- Privacy Violations: Infringing upon the privacy of other individuals or entities who are users or providers of information resources.
- Intellectual Property Violations: Breaching copyrights, patents, authorization agreements, licensing agreements, or other contractual agreements.
- Harassment: Engaging in conduct that meets the definition of harassment under Oklahoma law, including developing or using programs that harass other computer users.
- Inappropriate Messaging: Using technology, including telephones, to send fraudulent, harassing, obscene, indecent, profane, intimidating, or other messages that violate state or federal law.
- Commercial Use: Engaging in for-profit activities, including transmitting commercial or personal advertisements, solicitations, and promotions.
- Illegal Activities Support: Transmitting messages that support illegal activities.
- Transmission of Destructive Programs: Distributing programs intended to damage or disrupt other systems.
Copyright Compliance
All software protected by copyright must not be copied except as specifically allowed by the copyright owner. Protected software should not be copied into, from, or by any MSC system except in accordance with applicable licensing agreements. The number and distribution of copies must not exceed the number of original copies purchased unless otherwise stipulated in the purchase contract.
Images and written materials available via electronic resources may be subject to copyright laws. Individual users are responsible for acquiring appropriate permissions for any use of such materials. Additional information on copyright compliance is available in a separate MSC copyright procedure.
Display of Offensive Materials
Displaying materials that may reasonably be considered offensive, including ethnic, sexual, or otherwise inappropriate content, where others can view them, is prohibited. Special arrangements may be made for research or projects requiring the viewing of such materials. Users responsible for publicly displaying offensive material may have their user privileges revoked if complaints are substantiated.
Limiting Use
MSC reserves the right to limit a user’s sessions if resources are insufficient or if the user violates or abuses user rights. Protecting the rights of all technology users depends on maintaining the integrity of the MSC system as a whole.
Monitoring and Reporting
The Information Technology (IT) department is authorized to electronically monitor MSC’s information technology resources. Users are responsible for reporting any abuses, defects in system accounting, or security issues to the IT department immediately upon discovery. Suspected violations should be reported to the appropriate supervisor or administrator.
Violations supported by evidence will be handled according to applicable procedures for counseling students, staff, faculty, and administrative personnel. Supervisors or administrators will be notified of any violations and are responsible for determining the appropriate course of action.
Password Security
System security is maintained in large part by password protection of computer accounts. Users are responsible for safeguarding their passwords and must not share them with others.
By adhering to these operational rules, MSC aims to ensure that its technology resources are used responsibly and ethically, supporting the educational mission of the college.