This is a collection of University and College policies regarding technology. Pertinent parts are included, please review the full policy for more information. This is not a comprehensive listing, but a sampling of policy related to technology.
Acceptable Use Policy (AUP) for information technology
- All information technology resources, including computer networks, equipment and connected resources, provided by the University of Missouri are the property of the University.
- Respect the intellectual property rights of authors, contributors, and publishers in all media.
- Protect userID, password and system from unauthorized use
- Adhere to the terms of software licenses and other contracts
- All IT and Telecom products and services must be utilized or purchased from the central IT department of each business unit (your IT pro).
- All software must be approved by IT prior to use, even if the software is free.
- Any employee who commits the University to a purchase, sale, lease or other arrangement without proper authorization may be personally liable for the transaction. The University is under no obligation to authorize payment for expenditures not made in compliance with applicable policies.
- Consult with your IT professional regarding appropriate and efficient tracking of technology
- IT Professionals have been charged with inventorying all monitors, computers, printers and tablets. For this purpose IT equipment should not be relocated with prior approval of IT staff.
- Establish appropriate controls for all moveable property and equipment.
- Maintain records and controls for sensitive or portable equipment
- Ensure all electronic storage devices are processed by a professional IT staff person (or delegate approved by the ISO) before being transferred.
- Ensure all devices are completely cleaned and, if appropriate, reimaged prior to transfer to another user, another department or to Surplus Property.
- University employees must ensure that University data is removed from their personally owned electronic storage devices prior to leaving the University. Employees should seek assistance from professional IT staff to ensure adequate removal of electronic data.
- All information security incidents and suspected incidents must be immediately reported to the appropriate central information security office at your campus or business entity.
- All information security weaknesses must be immediately reported to your departmental IT office or central IT office.
- Physical thefts of computers or related materials should be reported to both the police and to IT security to ensure that both departments receive the information.
- University departments and employees are required to use IT and telecom resources provided, endorsed or approved by the central IT division at the applicable business unit when conducting University business.
- Non-University entities (including courtesy appointments) may be permitted use of IT and telecom resources provided such use is consistent with the goals and mission of the University.
- Any use authorized under this section must be documented in a written and signed agreement (MOU) that specifies the rights and responsibilities of the University and the non-University entity.
- As a general policy, employees should not use personal property on University premises to perform their jobs.
- Exceptions to this policy may be approved by the administrative head if it is believed to be in the best interest of the University.
- If employees use personal property such as cell phones, tablets, computers, calculators, or tools, the University will not insure or assume liability for the loss or damage of said property.
- An agreement should be executed between the employee and their administrative superior (MOU). This agreement shall identify the equipment to be used and the length of service required.
- University employees must use the University provided email account assigned to them when using email to conduct University teaching, learning research or other University-related business activities.
- The use of a University e-mail account for personal business should be limited.
- Automatic forwarding of University email to a non-university email account is prohibited.
- Supervisors must work with their employees, prior to their departure, to transfer any emails necessary for business continuity, particularly those that include University legal correspondence, proprietary or confidential information, compliance related correspondence and any records to an appropriate custodian prior to their last day of employment.
- University email accounts will be deactivated and ultimately deleted when the individual to whom the account was assigned, is no longer approved to have UM email. See Electronic Mail (Email) Use and Management Procedures for eligibility requirements.
CVM External Study Site Policy (Final approved by teaching committee January 2014)
A number of websites external to the university offer tools to help students study. Examples include StudyBlue and Quizlet. They may utilize resources such as electronic flash cards, study guide generation, study games, and others. These sites may also offer the ability to upload or copy media (images, sounds, etc.) to use with these study tools.
It is the position of the CVM administration that these tools can be beneficial to the academic efforts of students. It is also recognized that these systems can easily lead to violations of copyright and other restrictions placed upon university-owned resources.
Unless a course leader has specifically provided permission to do so, you may not upload any media (images, video, etc.) or substantive verbatim text from the course to a public or external site. Regular notes you personally take during class are your own and may be used as you see fit.
If a course leader has given consent to use course materials on External Study Sites, you may utilize such sites with certain protections in place. Any materials must be restricted so as not to be available to non-MU CVM students. Most External Study Sites offer the ability to keep materials private, or to share them only with designated classmates. Any External Study Sites that do not offer this capability should not be used.
This policy may change as necessary. Students making use of External Study Sites in the manner described must adhere to any changes in CVM policy upon notification.
Students violating the applicable policy may be subject to consequences associated with violating the MU IT Acceptable Use Policy (AUP) and legal prosecution in the event copyright law has been violated.
College/University-related messages to be sent to all members of the College (MU CVM All), all CVM students (MU CVM Students), all CVM faculty (MU CVM Faculty), all CVM staff (MU CVM Staff), all Residents/Interns (MU CVM Residents and Interns), or some combination of these “Top Level” groups should be sent to email@example.com. Mailings must be related to legitimate College or University functions. When you send to the CVM Mail Filter address you will receive an automatic response, so that you know that it has been received by the CVM Mail Filter for processing. All messages are subject to review, approval and reformatting. You may include attachments, if necessary, which will be included in the mailing. Formatting should be minimal (bold, italic, underline). Please note that e-mail messages from non-University issued accounts are automatically deleted before reaching the CVM Mail Filter’s Inbox. The CVM Mail Filter account is managed and monitored by CVM Strategic Communications.