Body
Purpose
This acceptable use policy will establish the general guidelines for the use of Southwestern Oklahoma State University system including, but not limited to, computing resources equipment, services, software, and accounts.
Scope
This policy applies to all SWOSU users, invited guests, and its affiliates and from any location.
Statement
Southwestern Oklahoma State University (SWOSU) provides technology and network resources for the use of its students, faculty, staff, or agents to support its academic and administrative functions. Access to these critical resources promotes the University's academic and research objectives. All individuals utilizing these services must ensure that technology and network resources are used ethically and lawfully; adhere to applicable codes of conduct, including those akin to the SWOSU student and employee handbook ; remain consistent with the educational mission, research goals, outreach, and administrative objectives of the institution; comply with all relevant laws, regulations, institutional policies, contractual and licensing agreements; protect the Confidentiality, Availability, and Integrity of the resources; respect the rights of all users; and use the resources in accordance with their role or relationship to the University, and only to the extent authorized by the University.
Policy
- Policy Definitions
- Technology resources- Includes computers, computer equipment, software, computer accounts provided by SWOSU, electronic communication facilities that includes electronic mail, Internet access, and network access, browsing, storage media, mobile computing devices or systems with similar functions.
- Computer account- Combination of username and password that allows an individual access to computer equipment, servers, or some other shared computer or network.
- Network resources- A group of computers and peripherals that share information electronically, typically connected to each other by either cable or Wi-Fi connection.
- Software- Computer programs installed on computers, mobile devices, or any other technology equipment.
- User- Any individual who uses, logs in, attempts to use, or attempts to log in to a system, whether by direct connection or across one or more networks, or who attempts to connect to or traverse a network, whether via hardware, software, or both.
- User Responsibility
- Appropriate Use of Technology Resources
- The technology resources provided by SWOSU, to authorized users, are primarily intended for teaching, educational, research, and administrative purposes, and may generally be used only for SWOSU related activities. Use of the technology resources is governed by all applicable SWOSU policies, including, but not limited to, sexual harassment, copyright, as well as comply with all relevant laws, regulations, institutional policies, contractual and licensing agreements.
- Unauthorized Usage of Technology Resources
The misuse of technology and information resources, as well as the abuse of associated privileges, is deemed unethical and not allowed by this policy. Such misconduct is grounds for potential disciplinary measures. Instances of technology resource misuse include, but are not limited to, the following:
- Unauthorized entry, modification, or deletion of another user’s data, software, electronic correspondence, or voice messages.
- Endeavors to illicitly gain access to local or remote computer systems or networks.
- Efforts to evade established security protocols or to acquire access rights that the user is not legitimately entitled to.
- Undertakings to undermine or manipulate overall system performance or functionalities.
- The inclusion of indecent, menacing, coercive, or intimidating content in the computer system or its transmission via electronic methods.
- Deliberate viewing of explicit or sexually suggestive imagery in situations where such visuals could be exposed to individuals who find them offensive. Distributing, printing, or duplicating explicit materials is likewise forbidden.
- The knowing execution, installation, or distribution of a program or data file that could be categorized as malicious, a computer virus, worm, or Trojan horse, whether directly or indirectly.
Moreover, utilizing technology resources for personal gain, unrelated to legitimate academic or institutional pursuits, is considered a breach of policy and is strictly prohibited.
Enforcement
Individuals who violate this policy may be subject to disciplinary action based off associated handbooks. When appropriate, SWOSU may restrict a violator’s access to SWOSU resources pending further investigation of a possible violation of this policy. Individuals who violate security policies, standards, or security procedures are subject to disciplinary action up to and including dismissal but may also include criminal or civil legal actions.
Incident Reporting
Violations of this policy should be reported to the SWOSU ITS Helpdesk via phone at (580) 774-7070 or via email at helpdesk@swosu.edu.
Policy Review
ITS Operations Administrator will be responsible for reviewing and updating this policy at least annually.
Revision & Approval History
|
Date of Change
|
Version
|
Responsible
|
Summary of Change
|
Date Approved
|
Approved By
|
|
9/14/2023
|
1
|
ITS
|
Created as policy
|
6/26/2025
|
ECC
|
|
|
|
|
|
|
|