Responsible Computing User Agreement
Users of Western’s IT Resources are obligated to understand their responsibilities under this User Agreement as well as all related University policies that govern ethical and legal behavior.
Acceptable Use
Authorized Users are provided access to IT Resources in order to support their roles and responsibilities at the University. Acceptable use of IT Resources is use that conforms to the University’s policies in support of its educational, research, service, student, and campus life activities; administrative and business functions; and financial and human resource administration.
Responsibilities
Authorized Users are to respect the rights of other computing users; respect the integrity of the physical facilities and controls; and respect all pertinent copyright, license, and contractual agreements. It is the policy of the University that all members of its community act in accordance with these responsibilities, relevant laws and contractual obligations while applying the highest standard of ethics.
Security
All users are expected to comply with the University’s policy on Securing Information Systems. In accordance with this policy, all faculty and staff are required to complete annual information security awareness training.
Social Media
The use of social media, including both official university and personal posts and comments, shall conform to the University’s policy on Using Social Media at Western.
Privacy
The University is committed to protecting the privacy of users and any of their electronic records with personal information in compliance with state and federal regulations. Employees may only access, use, or share personal information in accordance with University policies, including, but not limited to the Affording Individual Privacy Rights, the Managing University Records, and the Student Records policies.
Prohibited Activities
Prohibited computing activities include, but are not limited to:
- Sharing your account password or using another user’s credentials for access.
- Falsifying an identity.
- Circumventing or attempting to circumvent security protocols.
- Assisting in, encouraging, or concealing from authorities any unauthorized use, or an attempt at unauthorized use, of any IT Resource.
- Using electronic communications to threaten, harass or defame.
- Commercial or illegal activities including illegal pornography and theft of intellectual property.
Additional prohibited computing activities by employees in accordance with the Using University Resources Policy include, but are not limited to:
- Soliciting, lobbying, or assisting a political campaign or any commercial activities.
- Activities beyond de minimis use, as determined by state ethics laws and University policy.
Consequences
Failure to comply with the University’s policies on IT Resources may result in loss of privileges, disciplinary action, or prosecution.
References
- POL-U3000.04: Computer Use-Responsible Computing
- POL-U3000.07 Securing Information Systems
- POL-U1500.8: Using University Resources
- POL-U3000.02: Using Electronic Methods for University Communications
- POL-U4910.03: Managing University Records
- POL-U5315.02: Affording Individual Privacy Rights
- POL U5400.13: Using University Property for Political Activity
- POL-U6500.02: Using Social Media at Western
- POL-U7100.01: Student Records Policy
- WAC 516-09 Public Records
- WAC 516-21-160 Misuse of computers, electronic data, or communication systems
Revised: March 25, 2022