COVID-19 Information

See the latest updates and information regarding the COVID-19 pandemic, including a list of University contact information at


Copyright Information

Southeast Missouri State University respects the rights of copyright holders and copyright laws, and expects its faculty, staff, and students to do so as well. While copyrighted works can be easily and unintentionally misused and distributed, it is the responsibility of the University community to make a good faith effort to comply with United States Copyright Law ( and related University policies.

The Higher Education Opportunity Act requires the University to actively address the unauthorized distribution of copyrighted material by users of the campus network. Southeast complies with the requirements of the HEOA.

Acceptable Use of University Resources: When you activate your Southeast Key, you agree to abide by the Information Technology and Network Systems Acceptable Use Policy and Procedures. In particular, you agree to “comply with local, state, and federal laws”, and “adhere to all University policies and procedures, such as those governing intellectual property.” The procedures specifically prohibit the use of University computer resources, including the campus network, to infringe the intellectual property rights of others. The unauthorized use of peer-to-peer file sharing to distribute copyrighted music or videos is considered a violation of the Acceptable Use Policy. In addition, such activity is illegal and may expose you to civil and criminal liabilities.

Penalties for Violation of Federal Copyright Laws: A person found guilty of violating copyright law may be liable for damages and lost profits relating to the violation. In addition, criminal penalties of up to five years in prison and a $250,000 fine are possible.

Policies with Respect to Unauthorized Peer-to-Peer File Sharing Including Illegal Downloading or Unauthorized Distribution of Copyrighted Materials: Violation of the Acceptable Use Policy may result in a denial of access to University computer resources. Moreover, Article 18 of the Code of Student Conduct addresses violations of published University policies, rules or regulations and Article 21 addresses violations of federal, state or local law. With violations of the Code there are a range of sanctions that are employed, including fines, community service, restitution, probation, suspension, and expulsion.

Sources of Legal Alternatives for Downloading Music and Video: A wide variety of information can be located and accessed via the Internet. Unless you know that the copyright owner has given explicit permission for you to use copy or share the material, your safest course of action is to avoid downloading it. Many legal alternatives for downloading both music and video are available on the Internet, both free and for purchase. A large list is maintained by EDUCAUSE.

Copyright resources:

Information Technology & Network Systems Acceptable Use Policy & Procedures

Policy: Access to information technology and network systems owned, operated or leased by Southeast Missouri State University is given for the sole purpose of supporting the University’s education, research, and regional service mission. Users of the University’s information technology and network systems are responsible for using the systems in a manner consistent with this mission and in compliance with local, state, and federal laws, MOREnet regulations, and all policies and procedures of the University. The operating procedures to implement this policy shall be issued and maintained by the Vice President for Finance and Administration.

Purpose: This set of University-wide procedures and guidelines is intended to ensure the appropriate use of all Southeast Missouri State University computer, telecommunications, and network systems, to protect the integrity of these systems, to provide equitable access for all users, and to promote proper management of the systems.

Scope: University policy, procedures and guidelines for information technology and network system usage apply to all users of the system, including students, faculty, and staff, and to any other individuals or groups granted access to the University information technology and network system. The University information and technology network system includes, but is not limited to, all personal computers, peripherals, software servers, minicomputers, workstations, telephones, computer and communication facilities owned, leased, operated, or contracted by the University.

General Statement on Institutional Access and Privacy: Authorized agents of the University may access and review any files, records, usage logs, or other sources of information on the University’s information technology and network system necessary to assure the proper functioning of the University. Authorization of access will comply with rights to privacy, such as those defined in HIPPA and FERPA regulations and follow Human Resources policies and procedures. Typically access will be made under due cause and only when access is required to comply with local, state, or federal laws; or to determine whether usage inconsistent with the University’s Information Technology and Network Systems policies and procedures has occurred; or to protect the integrity of information technology and networking systems; or in the course of an investigation regarding compliance with other University policies and procedures. Such access will be logged and regularly audited to assure reasonable protection of the rights of users.

General Statement on User Responsibilities: With the privilege to use the information technology resources of the University come specific responsibilities and expectations. Users of the University’s information technology and network systems should respect the rights of other users; comply with local, state, and federal laws; adhere to all University policies and procedures, such as those governing intellectual property and sexual harassment; and avoid practices that compromise the University’s information technology resources. Specific responsibilities and expectations are detailed in the following procedures.

University Inspection of Personal Electronic Information: Electronic information on University networks, equipment, or cloud services, including, but not limited to, electronic mail and personal information, is subject to examination by the University where:

  • It is necessary to maintain or improve the functioning of University computing resources
  • There is a suspicion of misconduct under University procedures or suspicion of violation of Federal or State laws or
  • It is necessary to comply with or verify compliance with Federal or State law

Acceptable Use Guidelines: Users of the University’s information technology resources are expected to:

  • Respect the intellectual property rights of authors, contributors, and publishers in all media
  • Protect user ID, password, and system from unauthorized use
  • Adhere to the terms of software licenses and other contracts (Persons loading software on any University computer must adhere to all licensing requirements for the software. Except where allowed by University site licenses, copying software licensed for University use for personal use is a violation of this policy.)
  • Adhere to the University Business Policies and Procedures Manual
  • Use University computer resources in a manner that is compliant with State and Federal law
  • Adhere to data access procedures of the University

Prohibited Uses of University Computer Resources:

  • Unauthorized use (for example, modifying the network) or excessive personal use (for example, use that overburdens a network, results in substantial use of system capacity, or otherwise subjects the institution to increased costs or risks)
  • Uses that interfere with the proper functioning of the University’s information technology resources
  • Uses that unreasonably interfere with the ability of others to make use of University computer resources
  • Attempting to gain or gaining unauthorized access to the computer system, or files of another
    • Use of University computer resources to infringe the intellectual property rights of others
    • Use of University computer resources for personal profit as defined under MORENet regulations

Enforcement of Acceptable Use Policy: Violation of the Acceptable Use Policy may result in a denial of access to University computer resources, and other disciplinary actions provided or authorized by Southeast Missouri State University.

Links to Related Procedures:


Southeast Missouri State University residence halls offer high-speed network connectivity, referred to as our residential network (ResNet).  More information is available on the Information Technology website at