See the latest updates and information regarding the COVID-19 pandemic at semo.edu/covid19.
Classification Code: 08-01
Access to information technology and network systems owned, operated or leased by Southeast Missouri State University is given for the sole purpose of supporting the University’s education, research, and regional service mission. Users of the University’s information technology and network systems are responsible for using the systems in a manner consistent with this mission and in compliance with local, state, and federal laws, MORENET regulations, and all policies and procedures of the University. The operating procedures to implement this policy shall be issued and maintained by the Vice President for Finance and Administration.
Classification Code: OP 08-01
This set of University-wide procedures and guidelines is intended to ensure the appropriate use of all Southeast Missouri State University computer, telecommunications, and network systems, to protect the integrity of these systems, to provide equitable access for all users, and to promote proper management of the systems.
University policy, procedures and guidelines for information technology and network system usage apply to all users of the system, including students, faculty, and staff, and to any other individuals or groups granted access to the University information technology and network system. The University information and technology network system includes, but is not limited to, all personal computers, peripherals, software, personal digital assistants, networking devices, servers, minicomputers, workstations, telephones, computer and communication facilities owned, leased, operated, or contracted by the University.
Authorized agents of the University may access and review any files, records, usage logs, or other sources of information on the University’s information technology and network system necessary to assure the proper functioning of the University. Authorization of access will comply with rights to privacy, such as those defined in HIPPA and FERPA regulations and follow Human Resources policies and procedures. Typically access will be made under due cause and only when access is required to comply with local, state, or federal laws; or to determine whether usage inconsistent with the University’s Information Technology and Network Systems policies and procedures has occurred; or to protect the integrity of information technology and networking systems; or in the course of an investigation regarding compliance with other University policies and procedures. Such access will be logged and regularly audited to assure reasonable protection of the rights of users.
With the privilege to use the information technology resources of the University come specific responsibilities and expectations. Users of the University’s information technology and network systems should respect the rights of other users; comply with local, state, and federal laws; adhere to all University policies and procedures, such as those governing intellectual property and sexual harassment; and avoid practices that compromise the University’s information technology resources. Specific responsibilities and expectations are detailed in the following procedures.
Electronic information on University networks or equipment, including, but not limited to, electronic mail and personal information, is subject to examination by the University where:
Users of the University's information technology resources are expected to:
Violation of the Acceptable Use Policy may result in a denial of access to University computer resources, and other disciplinary actions provided or authorized by Southeast Missouri State University.