Chapter 6

Section A. Computer Use on Campus


Faculty Senate Bill 16-A-5 begins here.

Use of Southeast Personal Computer Keys
  1. Access to University-provided data processing resources is controlled by the issuance of personal identification codes. An employee or student receiving a personal identification code assumes responsibility for all computing activity performed under that code (whether he or she personally performs the activity or not).
  2. Computer facilities made available by personal identification code should only be used to conduct University business (either job- or class-related activities).
  3. Use of personal identification codes may not be transferred to another person or group. No person or group other than the person to whom it was issued may use that person’s code.
Use of Computer Facilities - User Priorities

According to the Business Policy and Procedure Manual: Information Technology and Networks, “Access to information technology and network systems owned, operated or leased by Southeast Missouri State University is given for the sole purpose of supporting the University’s education, research, and service mission. Users of the University’s information technology and network systems are responsible for using the systems in a manner consistent with this mission and in compliance with local, state, and federal laws, MORENET regulations, and all policies and procedures of the University.”

Registered guests are permitted to use university computer facilities according to established Information Technology procedures. (See Procedures section of Chapter 6).


Persons below high school age are not permitted to use university computer facilities unless registered with a temporary guest login.

Under no circumstances are users permitted to duplicate copyrighted programs on University equipment.

Users are not permitted to alter computer hardware or change hardware configurations in University computer laboratories.

Theft, or deliberate destruction of University equipment (i.e., hardware, software, manuals, etc.) will be reported to the Department of Public Safety; users will be held financially liable for the replacement cost of lost or stolen resources

University Inspection of Personal Electronic Information

According to Section 5 of the Information Technology and Network Systems Acceptable Use Policy and Procedures, “Electronic information on University networks or equipment, including, but not limited to, electronic mail and personal information, is subject to examination by the University where:

  1. It is necessary to maintain or improve the functioning of University computing resources
  2. There is a suspicion of misconduct under University procedures, or suspicion of violation of Federal or State laws or
  3. It is necessary to comply or verify compliance with Federal or State law”
Software Copyright Policy

According to the Southeast Missouri State University Copyright Manual, “Southeast Missouri State University respects the rights of copyright holders and the copyright laws, and recognizes that in an electronic age copyrighted works are particularly vulnerable to misuse and unintended further distribution…. [The Copyright Manual provides] a summary of current interpretations of U. S. Copyright law as it relates to the use of copyright-protected works in the classroom and library at the University, and to provide guidelines and procedures for obtaining copyright permissions to use these works…. As such, it offers information and clarification about compliance with relevant portions of the United States Copyright Act, U.S.C. Title 17.” (Copyright Manual, p. 4).

Persons loading software on any University computer must adhere to all licensing requirements for the software, except where allowed by University site licenses. Copying software licensed to the University for personal use is a violation of the University Acceptable Use Policy. (Acceptable Use Policy, Guideline #3).

Use of Academic Servers

Faculty retain the right of access and control over their intellectual property hosted on academic servers (any servers for teaching and learning online) subject to MORENET regulations, including:

  1. Access to the Learning Management System for professional duties, including teaching, research, and student advising
  2. Ownership and control over personal intellectual property hosted on academic servers
  3. Due process in the event of account or access closure, including notification and sufficient time to remove any personal data from academic servers
  4. Confidentiality in development of projects, research, promotion and tenure documents, or other legitimate faculty interests

The principles of academic freedom extend in their entirety to the online environment.

Faculty Senate Bills 85-A12, 88-A-12, 88-A-13, and 88-A-14 are hereby repealed February 24, 2016.
Approved by Faculty Senate, Bill 16-A-5 February 24, 2016, Reviewed by President August 9, 2016, Approved by Board of Regents September 9, 2016.


A. Computer Use on Campus

Faculty Senate Bill 16-A-6 begins here.

Use of Personal Computer Access Codes (Southeast Keys)

The personal identification code used to access university-provided data processing resources is referred to as a Southeast Key. The Department of Information Technology recommends that users change their Southeast Key passwords at least every six months. Passwords should not be displayed openly in written material.

Use of Computer Facilities

Users agree to comply with all guidelines and restrictions outlined in this Chapter and the Information Technology and Network Systems Acceptable Use Policy and Procedures. Violation “may result in denial of access to University computer resources and other disciplinary actions provided or authorized by Southeast Missouri State University.” (Acceptable Use Policy Item #8)

Guest use of computer facilities provides a secure connection to the Southeast LAN and WiFi network. For a guest account, a temporary username and password must be requested of the Information Technology Department by a Southeast Missouri State University academic or administrative unit. The responsible academic or administrative unit is required to obtain and retain current identifying information about the guest user before allowing guest access. Accounts are set to expire after 1-10 consecutive days, depending upon the request. The sponsoring department is responsible for providing the account and password to the guest. All guests must abide by the Information Technology and Network Systems Acceptable Use Policy and Procedures

Software Copyright Procedures

Southeast Missouri State University does not condone any illicit use of software. What constitutes licit use depends upon the individual software licensing agreement. Negotiation of liberal site licensing agreements with vendors is encouraged.

Generally speaking, the following will be considered to be lawful use of software by someone who owns the license to a copy of computer software:

  1. Configuring the software and making other reasonable modifications specifically designed to fit the software to the user's needs. (Note: In some instances, such action may void any warranty on the software.)
  2. Configuring the operating systems and installing and configuring software on a faculty member’s office devices to fit the user’s needs as allowed by manufacturer and license agreements.
  3. Using the software on only one machine at a given time.
  4. Selling or giving the original copy and documentation to another, provided that the transferor keeps no copies whatsoever of either the software or documentation and provides the transferee only the original copies. (This assumes that the copy of the software is owned by the transferor rather than borrowed or leased.)

The following are actions that are considered illicit and may subject the actor to sanctions by the University:

  1. Providing copies of copyrighted or licensed software to others while maintaining copies for one's own use unless there is a specific provision in the license allowing such activity. The activity is forbidden even if the software is provided without cost for an educational purpose.
  2. Using software or documentation known to have been obtained in violation of the copyright law or a valid license provision. Use of a copy of a copyrighted program obtained from another party for which no license exists that allows such a transfer will be presumed to be knowing, and the burden of demonstrating that the use was innocent will rest with the user.
  3. Using a copyrighted program on more than one machine at the same time, including use on a campus network or multiple workstations accessing the same copy of the program unless a specific license provision permits such activity.

Approved by Faculty Senate, Bill 16-A-6 February 24, 2016, Reviewed by President August 9, 2016, Posted for 15 Day Review August 10, 2016