Code for Computer Resource Use
Computer resources at the University of Montevallo are available to
authorized students, faculty and staff. Access is obtained from the Technology Services
Department and is granted with the understanding that the resources will be used as stated
in the request and in keeping with the philosophy that one's interest ceases when it
invades the rights of others personal and/or institutional property, demonstrates a
potential for loss, or creates the possibility for the embarrassment or litigation to the
individual and/or institution because of irresponsible use of a limited resource.
It is essential that users observe responsible and ethical behavior in the use of
computing resources. In an effort to assist the user community in the effective use of
computer resources, some specific responsibilities and types of behavior that represent
abuse of a user's privilege are outlined below. The examples do not constitute a complete
list but are intended to convey the intent of the code.
- Users should not damage or attempt to damage computer equipment or to modify or attempt
to modify equipment so that it does not function as originally intended. It is equally
wrong to damage or modify or attempt to damage or modify software components: operating
systems, compilers, utility routines, and the like.
- Users should not use or attempt to use an account without authorization from the owner
of that account. Users have the responsibility of protecting their accounts through the
proper use of passwords, but the fact that an account is unprotected does not imply
permission for an unauthorized person to use it. Further, accounts are to be used only for
the purpose for which they have been established. Additionally, it is wrong to use a
college-sponsored account for personal business or consulting activities.
- Users should not use private files without authorization. Owners of such files should
take precautions and use the security mechanisms available. However, the fact that a file
is not protected does not make it right for anyone else to access it, unless it is
specifically designated as a public access file. It is equally wrong for anyone without
authorization to change or delete a file that belongs to anyone else. Violation of
property rights and copyrights covering data, computer programs and documentation are also
wrong. In the event of accidental access of private files, confidentiality of those files
must be maintained.
- Any deliberate wasteful use of resources is irresponsible; it encroaches on other
people's use of facilities and deprives them of resources. Users are expected to be aware
of the resources they are using and to make reasonable efforts to use these resources
- Users should adhere to the operating procedures as established by the Office of
- Administrators, faculty, staff, the Office of Technology Services, and others in positions
of trust within the University of Montevallo community have a professional responsibility
to ensure that the equipment, software, and services provide the most efficient levels of
support and consider the needs of the total user community. Persons who misuse
computing resources or take advantage of their positions to access data not required in
the performance of their duties are displaying unprofessional behavior.
The unauthorized use or distribution of computer software violates Federal laws. The
making of copies of microcomputer software is subject to Federal copyright laws. Violation
of such laws may result in disciplinary sanctions, including dismissal, civil lawsuit and
Any use of the computing resources without authorization is prohibited.
It is the responsibility of all users to report to the Office of
Technology Services any
violation of the Code of Computer Resource Use.
The Code is posted in prominent locations in all University of Montevallo computer
laboratories. Failure to comply with the Code will subject the violator to appropriate
Whenever there is an indication that any user usage interferes with the intended
functions of the system, impinges on another user's rights, or is an otherwise
irresponsible use of the computer resource, the Office of Technology Services shall
investigate and implement those actions deemed necessary to protect the system and/or
Abuse of computer facilities and resources will be referred to the proper authorities
for disciplinary action including but not limited to restitution, restrictions, reprimand,
suspension, probation, expulsion, termination, and when judged a felony, legal action.