About WUSTL

Compliance & Policies

Computer Use Policy

Contents


Introduction

This document provides guidelines for appropriate use by students, faculty and staff of computer facilities and services at Washington University. It is not a comprehensive document covering all aspects of computer use. It offers principles to help guide members of the Washington University community, and specific policy statements that serve as a reference points. It will be modified as new questions and situations arise.

While the proliferation of computers and information technologies does not alter basic codes of behavior in academic life, it does place some issues in new contexts. Using these technologies enables people to do varied things-both good and bad-more easily. They are an enormously rich resource for innovation in the furtherance of Washington University's academic mission. They also offer new forums for the University's historic commitment to the expression and discussion of a wide diversity of ideas and opinions. But they increase the risks of actions, deliberate or not, that are harmful in various ways, including: (a) interference with the rights of others; (b) violation of the law; (c) interference with the mission of the University; or (d) endangering the integrity of the University's information computer network. The guidelines that follow in the next section of this document seek to forge the link between established codes of conduct and use of new technologies. Computer networking has greatly expanded our ability to access and exchange information, requiring more vigilant efforts and perhaps more secure safeguards to protect individuals' rights of privacy. Property as well as privacy rights may be infringed whenever files or data belonging to others, however gained, are used without authorization; moreover, while freedom of inquiry and expression are fundamental principles of academic life, assaults upon the personal integrity of individual members of the University community and dissemination of offensive materials may undermine the foundations of that community. Other actions taken by individuals may, under some circumstances, jeopardize the integrity of the computer network and the ability of others to communicate using this system. Accordingly, the guidelines that follow seek to both preserve the freedom to inquire and share information and sustain the security and integrity of individuals within the community and the computer system itself.

While some of the guidelines therefore call for respectful and responsible use of the computer networks to protect the rights of individuals, others warn against actions that may violate the law: users within the community must understand the perils of illegal use, exchange, or display of copyrighted, deceptive, defamatory, or obscene materials on a web page or through other electronic communication channels.

The community at large has rights and expectations that must be considered. When individuals misrepresent either themselves or the University, or when they act by computer in a manner unacceptable within the University or in the larger community, the integrity and mission of the University itself is endangered.

Finally, the guidelines seek to protect the integrity of the University information systems themselves: the computing or networking resources need to be accessible and secure for appropriate uses consistent with the mission of the University; the usurpation of these resources for personal gain, commercial gain or without authorization is unacceptable. Moreover, even the individual right to privacy may, when personal files may need to be accessed for troubleshooting purposes, be overridden by authorized personnel to protect the integrity of the University's computer systems.

Principles and Guidelines

  1. Respect the rights and sensibilities of others
    1. Electronic mail should adhere to the same standards of conduct as any other form of mail. Respect others you contact electronically by avoiding distasteful, inflammatory, harassing or otherwise unacceptable comments. (In an academic community, the free and open exchange of ideas and viewpoints preserved by the concept of academic freedom may sometimes prove distasteful, disturbing or offensive to some. This policy is not intended to restrict such exchange.)
    2. Others have a right to know who is contacting them.
    3. Respect the privacy of others and their accounts. Do not access or intercept files or data of others without permission. Do not use the password of others or access files under false identity.
    4. Distribution of excessive amounts of unsolicited mail is inappropriate.
    5. While the University encourages respect for the rights and sensibilities of others, it cannot protect individuals against the existence or receipt of materials that may be offensive to them. Those who make use of electronic communications may come across or be recipients of material they find offensive or simply annoying.
  2. Be aware of the legal implications of your computer use.
    1. The Internet enables users to disseminate material worldwide. Thus the impact of dissemination on the internet is often far broader than that of a statement made on paper or in routine conversation. Keep in mind that a larger audience means a greater likelihood that someone may object with or without legal basis.
    2. Much of what appears on the internet is protected by copyright law regardless of whether the copyright is expressly noted. Users should generally assume that material is copyrighted unless they know otherwise and not copy or disseminate copyrighted material without permission. Copyright protection also applies to much software, which is often licensed to the University with specific limitations on its use. Both individual users and the University may, in some circumstances, be held legally responsible for violations of copyright.
    3. Many other state and federal laws, including those prohibiting deceptive advertising, use of others' trademarks, defamation, violations of privacy, and obscenity apply to network-based communications.
    4. Because the internet is international, it can be argued that the (often more restrictive) laws of other countries may apply. This does not mean that members of the University community should be censored by extremely restrictive foreign laws, but in some situations the University must take into consideration whether violations of foreign laws may affect the activities of the University in those countries.
  3. Respect the mission of the University in the larger community
    1. The University makes internet resources available to students, faculty and staff to further the University's educational, research, medical, service and University-related activities and missions. Recognizing that the Internet is also an integral part of socialization and leisure among students living on campus, the network is available to students for purposes of non-academic communications and entertainment to the extent that such use does not compromise the network or the amount of bandwidth available for academic-related uses.
    2. The University does not monitor the content of web pages, electronic mail or other on-line communications and is not responsible for the views expressed by individual users. Under certain circumstances, however, the University may be held liable if it fails to take reasonable remedial steps after it learns of illegal uses of its computer facilities. Use computer resources lawfully.
    3. Remember that you are responsible for all activity involving your account. Keep your account secure and private. Do not use identifying data or common words as a password; your password should be difficult to crack or otherwise guess either by individuals or by sophisticated computer programs. Review WUSTL password guidelines.
    4. The University is the custodian of a wide array of personal and financial data concerning its students, staff, faculty and patients, as well as the University itself. Respect the University obligations of confidentiality as well as your own. Only those with authorization may access, communicate or use confidential information.
    5. Material posted on web pages is generally accessible and thus deserves even greater thought and care than your private electronic mail. Remember that, absent restrictions, your web page is available to anyone, anywhere, and act accordingly.
    6. The University has a right to expect that computer users will properly identify themselves. Computer accounts are assigned and identified to individuals. Don't misrepresent yourself.
  4. Do not harm the integrity of the University's computer systems and networks.
    1. Today's information technology is a shared resource. Respect the needs of others when using computer and network resources. Do not tamper with facilities and avoid any actions that interfere with the normal operations of computers, networks, and facilities.
    2. Avoid excessive use of computer resources. They are finite and others deserve their share. "Spamming" and similar inappropriate uses of University resources are not acceptable. Web pages that are accessed to an excessive degree can be a drain on computer resources and, except where significant to the University's mission, may require the University to ask that they be moved to a private Internet provider.
    3. Although a respect for privacy is fundamental to the University's policies, understand that almost any information can in principle be read or copied; that some user information is maintained in system logs as a part of responsible computer system maintenance; that the University must reserve the right to examine computer files, and that, in rare circumstances, the University may be compelled by law or policy to examine even personal and confidential information maintained on University computing facilities.
    4. You are granted privileges and responsibilities with your account. While these vary between groups, the use of University resources for personal commercial gain or for partisan political purposes (not including the expression of personal political views, debate and the like) is inappropriate and possibly illegal.
    5. Individual University computer systems have varying resources and demands. Some have additional and sometimes more restrictive guidelines applicable to their own user.

Implementation

  1. All University codes of conduct apply to information technology as well as to other forms of communication and activity.
  2. Systems managers or other individuals within an academic or administrative unit may be empowered to suspend some or all privileges associated with computer use in cases of misuse or threat to the integrity of all or part of the University's information management resources.
  3. Before any permanent action is taken against a user, the user will be advised of the bases for the proposed action and given an opportunity to respond. Concerns about such actions may be raised through the usual administrative or academic channels associated with the dean, school, facility or resource in question.
  4. Where a violation of University policies or applicable law appears to warrant action beyond a suspension or elimination of computer privileges, the matter may be referred to a supervisor, administrator or University disciplinary body with appropriate authority or to law enforcement authorities.
  5. Complaints or concerns about another's use of University computer resources should be directed to the administrator responsible for the facility or resource in question.

Approved, Washington University Faculty Senate, May 1997.

Revised and approved in form by the Washington University Faculty Senate Council, May 2007.

For questions about this policy, contact your school, department, or unit system manager or send e-mail to Kevin Hardcastle, Chief Information Security Officer.