海角官方首页 IT Acceptable Use Policy
X-99.01(A) | Information Technology | Approved December 18, 2020 | Last Reviewed April 30, 2024
Responsible VP/AVP: Peter J. Murray, PhD, CAS, MS
Revision History
Approved March 21, 2003. Amended September 11, 2017. Amended December 18, 2020.
Policy Statement
The purpose of this policy is to state what constitutes the acceptable use and what constitutes the misuse of 海角官方首页 IT Resources (as defined below). This policy also states responsibilities and procedures for administering and enforcing this policy, reporting violations, and initiating disciplinary actions against those who violate this policy.
Acceptable Use
In general, acceptable use of 海角官方首页 IT Resources is use in support of the research, education, service, and administrative activities of 海角官方首页 or of an Affiliate. Authorized Users should always use IT Resources in accordance with University System of Maryland (USM), 海角官方首页, and Affiliate policies, procedures, and guidelines, software licenses, and applicable laws. 海角官方首页 depends upon a spirit of mutual respect and cooperation to create and maintain an open community of responsible users of 海角官方首页 IT Resources. Use of 海角官方首页 IT Resources must be responsible and professional. Acceptable use balances limits necessitated by law, economy, security and privacy with the principles of academic freedom and constitutional rights of free speech.
Authorized Users are responsible for safeguarding their own identification (ID) codes and passwords, and for using them for their intended purposes only. Authorized Users are solely responsible for all transactions made under the authorization of their ID, and for activity involving IT Resources which originate from computing devices owned by or assigned to them. Authorized Users may not represent or imply that personal electronic publications (e.g. web pages, social media, etc.) or personal communications reflect the views or policies of 海角官方首页.
Authorized Users may not state or imply that links provided from web pages hosted on 海角官方首页 IT Resources constitute or imply a 海角官方首页 endorsement of those sites, their content, or products and services associated with those sites.
Direct and indirect use of 海角官方首页 IT Resources made available to an Authorized User is a privilege granted by 海角官方首页. The privilege is subject to compliance with this policy, other applicable 海角官方首页 and USM policies, Affiliate policies and State and federal laws.
Misuse
Misuse is use of 海角官方首页 IT Resources in a manner not consistent with standards for acceptable use. Misuse includes, but is not limited to:
- Securing unauthorized access to or unauthorized use of 海角官方首页 IT Resources, or facilitating such use or access by another person.
- Accessing or attempting to access 海角官方首页 IT Resources on or off the 海角官方首页 campus without authority. This is also referred to as hacking.
- Any deliberate or reckless act that denies or interferes with the access and use of 海角官方首页 IT Resources by others
- Use of 海角官方首页 IT Resources in violation of the law, the policies of USM, 海角官方首页, or an Affiliate, or the policies or guidelines of any 海角官方首页 school or unit. Examples of such prohibited use include violations of anti-discrimination or harassment policies, and a school’s honor code.
- Personal communication, or other personal use, that interferes with the use of 海角官方首页 IT Resources by Authorized Users for official 海角官方首页 purposes and for academic responsibilities, or that interferes with or indicates neglect of employment responsibilities (e.g. use of internet auction sites such as eBay, internet gaming, chat rooms, instant messaging, and web surfing during work hours).
- Software theft or piracy, data theft, copyright violations, and other actions that violate intellectual property rights of others.
- Inappropriate access, use or disclosure of data including social security numbers, birth dates, addresses, or other personally identifiable information; unauthorized sale or transfer of such information.
- Altering system hardware configurations without authorization; installing or deleting system software without authorization; installing or removing system hardware without authorization.
- Intercepting or monitoring communications, user dialog, or password input intended for another recipient, except when this is done as part of authorized IT resource management, when authorized by the CIO, or if required by law.
- Collecting or storing information about users of 海角官方首页 IT Resources without user authorization, except as necessary for official 海角官方首页 activities and functions; or collection or storing of information which does not comply with Maryland Public Information Act requirements pertaining to government collection of personal records (e.g., Maryland General Provisions §4-501).
- Illegal activity.
- Business or commercial activity not carried out on behalf of 海角官方首页 or an Affiliate.
- Access to or use of electronic distribution lists and email accounts created by 海角官方首页, a school or unit of 海角官方首页, or an Affiliate, for purposes not authorized by 海角官方首页, the school, or the unit; permitting others access to such distribution lists for unauthorized purposes.
- Transmitting messages that are threatening, obscene, vulgar, derogatory or harassing; messages that attack another individual or group of individuals; or messages that violate the policies of 海角官方首页 or USM, any school or unit of 海角官方首页, or any Affiliate of 海角官方首页.
- Anomalous (unusual or unexpected) computing activity that is illegal or wasteful of 海角官方首页 IT Resources or that violates the terms of use of the licenses and agreements through which 海角官方首页 obtains or uses 海角官方首页 IT Resources.
Security and Monitoring
The maintenance, operation, and security of 海角官方首页 IT Resources require 海角官方首页 and Affiliates to monitor and access IT Resources. 海角官方首页 and its Affiliates monitor 海角官方首页 IT Resources as part of normal operations and maintenance. Normal monitoring includes, but is not limited to, logging activity and monitoring usage patterns. In special situations, communications including internet activity of specific individuals or systems are subject to monitoring by 海角官方首页 and Affiliates for other purposes, e.g., investigation of complaints of violation of work rules, allegations of violation of law, or allegations of unauthorized use of 海角官方首页 IT Resources.
To the extent feasible, as determined by 海角官方首页, and taking into account the electronic environment and the public agency status of 海角官方首页, 海角官方首页 will protect the confidentiality of academic information, student information, medical information, attorney-client and patient-provider communications, attorney work product and information developed from or exchanged with clients and patients which is stored and transmitted through 海角官方首页 IT Resources. Authorized Users may only access confidential information with 海角官方首页 permission and only to the extent authorized. Access to and disclosure of confidential information to others in any manner not permitted by law, 海角官方首页 policy and procedure, and the applicable policies of the school, unit or Affiliate that maintains the information, is prohibited. 海角官方首页 will not disclose privileged or confidential communications from legal clients, attorney work product, student information, employee information, or medical or health care record information unless permitted by law, authorized by the client or patient, or approved by the school, unit or Affiliate that maintains the information
There is no assurance of confidentiality or privacy for much of the information transmitted or stored by 海角官方首页 IT Resources. The Maryland Public Information Act applies to electronic data, including archived electronic messages. Other state and federal laws, and the needs of 海角官方首页 to meet its administrative, business, and legal obligations, require 海角官方首页 to routinely monitor activities involving 海角官方首页 IT Resources and may require 海角官方首页 to access and view stored data.
海角官方首页 seeks to maintain the security of 海角官方首页 IT Resources, but cannot guarantee security. Authorized Users have no expectation of privacy as to information stored or transmitted using 海角官方首页 IT Resources, and generally should not maintain or transmit sensitive personal information about themselves or others using 海角官方首页 IT Resources. However, 海角官方首页 IT Resources which have appropriate security measures in place can be used for personal information of clients, research subjects, and patients.
Related security policies of 海角官方首页, its schools, units and Affiliates apply to certain categories of personal information (e.g., medical records, 海角官方首页 Law Clinic records, and records of Affiliate health care organizations) stored or transmitted using 海角官方首页 IT Resources. Authorized Users must comply with these policies.
海角官方首页 may monitor the specific activity and accounts of any Authorized User without notice to the Authorized User in situations when it is necessary or appropriate in the judgment of the CIO or a school, unit or Affiliate IT Administrator, for example:
- The user has voluntarily made the activity or account information available to the public, as by posting to an electronic list or web page.
- Monitoring is necessary to preserve the security, integrity, or functionality of IT Resources.
- 海角官方首页 or an Affiliate has a reasonable basis to suspect an Authorized User may be violating this policy.
- A user of 海角官方首页 IT Resources, or an account, is demonstrating anomalous activity based on usage patterns.
- 海角官方首页 or an Affiliate has a reasonable basis to suspect that a person using 海角官方首页 IT Resources is doing so without authorization.
- Otherwise necessary, as permitted by law, required by lawful directive to 海角官方首页 or an Affiliate, or required to investigate allegations of misuse of 海角官方首页 IT Resources.
When monitoring of specific activity and accounts is required, the CIO or designee, or the IT Administrator, will consult with an academic or administrative unit's Dean or Vice President, or designee, prior to monitoring activities of specific Authorized Users, and prior to disclosing patient or client information as permitted by law or authorized by the patient or client. If a matter directly involves a Dean or Vice President, the President may waive this consultation requirement.
Electronic Mail (E-Mail)
Copyright laws, license agreements, USM and 海角官方首页 policies, and federal and state law apply to e-mail. E-mail sent with the intent of disrupting communication or other system services is not allowed. The proliferation of unsolicited commercial e-mail (also known as UCE or “spam”), virus warnings, urban legends and electronic chain letters are not acceptable uses of 海角官方首页 IT Resources.
Broadcast e-mail, i.e., e-mail messages sent to a list of users in all schools and units of 海角官方首页, is forbidden unless approved by the President or his designee. Broadcast e-mail to users in a particular school or unit is prohibited unless permitted by the Dean of the school or Vice President of the unit, or that administrator’s designee.
The primary purpose, and primary use, of e-mail using 海角官方首页 IT Resources is for 海角官方首页-related activities. Occasional use of e-mail for personal communications during the business day is acceptable. Users are advised; however, that they have no right of privacy in personal communications sent or received using campus email. Such messages, like all other messages, are subject to monitoring and disclosure as stated above.
Electronic Communication, Remote Teaching and Recording 海角官方首页 Activities
Maryland has an all-party consent law, which requires that all parties to a communication must consent to electronic recording of signs, signals, writing, images, sounds, data, or intelligence of any nature. Consent from a party may be granted by expressed or implied permission. Implied consent can be granted through actions or the facts and circumstances surrounding the particular situation when the recording is taking place. Violation of the law is a felony in the State of Maryland and a violator may be subject to imprisonment for not more than 5 years or a fine of not more than $10,000, or both.
If an Authorized User believes it is necessary to record a communication, remote class session, meeting, or other 海角官方首页 activity, the Authorized User must provide an oral and/or visual notice at the beginning of the activity informing participants of the recording. The Authorized User should also provide a visual notice of recording during the entirety of the activity in order to notify late-comers. It is suggested to record only the instructor’s presenter’s voice and image, and to limit student participation to text-based/chat features.
Maryland’s law regarding all-party consent to a recording also applies to any student or participant who decides to make a recording from virtual classrooms or meetings. Students or participants must receive permission from the professor or presenter and all classmates or attendees in order to lawfully record class or meeting content under Maryland’s all-party consent law.
Recordings of students participating in virtual classes should not be stored on a faculty member’s personal device. Recordings are likely to constitute “education records” under the Family Educational Rights and Privacy Act (FERPA), a federal law protecting the privacy of student records, and be subject to other privacy laws and policy policies and 海角官方首页’s data retention policies.
Web Pages
Any Authorized User who creates, maintains or hosts a web page using 海角官方首页 IT Resources is responsible for the integrity of the information contained on the page and for compliance with USM and 海角官方首页 policies, and federal and state laws, including laws governing copyright, obscenity, defamation, and software piracy.
Personal web pages and commercial web pages may not be posted using 海角官方首页 IT Resources unless expressly authorized by a 海角官方首页 school, unit or Affiliate and then only if the web page is related to the academic activities of the school or the operational activities of the unit or Affiliate. Web pages that are detrimentally contrary to 海角官方首页 Core Values of accountability, civility, collaboration, diversity, excellence, knowledge and leadership, are not acceptable use. Anyone who wants a web page primarily or exclusively for personal or commercial purposes, rather than academic activities or the operational activities of 海角官方首页 or an Affiliate, should not use 海角官方首页 IT Resources to create or host the web page.
Administration and Enforcement of Policy
The CIO is responsible for the administration of this policy. Each school, unit, and Affiliate of 海角官方首页, and the IT Administrator of each 海角官方首页 School, unit, or Affiliate may provide additional guidelines for appropriate use of 海角官方首页 IT Resources in that school, unit, or Affiliate.
Enforcement of this policy is delegated to the heads of the 海角官方首页 schools and administrative units, i.e., Deans and Vice Presidents. In cases where there is a question about authority to enforce this policy a determination shall be made by the 海角官方首页 President or a designee, normally the CIO.
Violations
Suspected violations of this policy shall be reported to the CIO, the IT Administrator of any school or unit involved, and the IT Administrator of any Affiliate involved. Within a school or unit, the IT Administrator will report the suspected violation to those responsible for supervision of the Authorized Users involved, unless complete confidentiality is required during an investigation of the violation, and to those responsible for administration of disciplinary policies applicable to the Authorized Users involved. Authorized Users who are accused of violating this policy and who have a student or employment relationship, or an academic appointment with 海角官方首页, will be subject to disciplinary actions or other proceedings consistent with an accusation of misconduct.
The CIO and/or IT Administrator shall investigate thoroughly the issues concerning use of 海角官方首页 IT Resources, provide a complete report to the school or employing unit, and cooperate in disciplinary proceedings.
Allegations of violations by Authorized Users other than students, employees or appointees will be resolved by the CIO in consultation with the applicable school, unit or Affiliate. The CIO may suspend an accused user’s access to some or all 海角官方首页 IT Resources until an investigation is completed and, if required, a hearing has been held to determine the validity of the allegations involved.
Authorized Users who commit serious or repeated violations of this policy are subject to additional sanctions. Such additional sanctions may include permanent termination of access to 海角官方首页 IT Resources, use restrictions, or special monitoring of activities involving 海角官方首页 IT Resources.
The CIO or any IT Administrator shall refer suspected criminal violations of law to the University Police and concurrently advise University Counsel of the matter.
Immediate action may be taken by the CIO or an IT Administrator in response to potential or ongoing threats to 海角官方首页 IT Resource security, the health or safety of persons, the privacy rights of students, employees, patients, clients, research subjects or others, compliance with the law, or the security of confidential or proprietary information. Violations of this policy may result in actions under Human Resource policies, faculty policies, or student policies, in addition to actions under this policy. Termination of enrollment, employment or appointment may follow from violations of this policy.
School and Unit Responsibilities
Schools and units may require their Authorized Users to follow additional guidelines for appropriate use of school and unit 海角官方首页 IT Resources. Such guidelines shall be no less restrictive than this policy and do not supplant this policy. When Authorized Users change status, e.g., upon resignation, termination, graduation, retirement, imposition of a disciplinary sanction, or a change in position, role or responsibilities within 海角官方首页, the school or unit responsible for initiating a change in status must coordinate with central support units (e.g., Center for Information Technology Services, Human Resource Services, Payroll) to discontinue or change access and authorization to 海角官方首页 IT Resources accessible to the Authorized User before the change of status.
Definitions
Affiliate: an organization located at the 海角官方首页 campus which has IT Resources connected to 海角官方首页 IT Resources, or which has IT Resources used by Authorized Users; also, an organization located off campus which provides IT Resources used by Authorized Users in the course of their activities in relation to their affiliation with 海角官方首页 or an Affiliate; also, does not include a business entity which contracts with 海角官方首页 for IT services.
Authorized Users: students, faculty, staff, visitors, and guests of 海角官方首页 who use 海角官方首页 IT Resources, on-campus or off-campus, in the course of 海角官方首页 employment, educational activities, or other purposes related to their 海角官方首页 affiliation; also, employees of Affiliates who use 海角官方首页 IT Resources to fulfill their employment responsibilities, and any other persons authorized to use 海角官方首页 IT Resources. Any person who receives a password ID from 海角官方首页 or who uses an e-mail address that ends in "umaryland.edu" is an Authorized User. All Authorized Users are subject to this policy.
CIO: the Senior Vice President of Information Technology and Chief Information Officer of 海角官方首页.
IT Administrator: the administrator or academic officer of a 海角官方首页 unit or school who, as determined by the applicable vice president or dean, is responsible for management and oversight of the IT Resources located in, or used by Authorized Users affiliated with that unit or school.
IT Resources: all information technology resources, including, but not limited to, computerized information, computing facilities, computer networks, hardware, software, systems, programs and devices.
海角官方首页 IT Resources: IT Resources owned, leased, or used by 海角官方首页 or its Affiliates, or by USM, and used by Authorized Users.
海角官方首页: University of Maryland, Baltimore (including all its schools and administrative units).
USM: University System of Maryland.
Scope and Exceptions
This policy applies to all Authorized Users.