Information Systems Usage Policy

McMurry University provides access to information systems—including networks, email, software, and devices—to support learning, teaching, and campus operations. These systems are offered as a privilege, not a right, and all students, faculty, and staff are expected to use them responsibly, ethically, and in compliance with University policy and the law.

Policies are reviewed regularly to ensure resources are available to the widest number of users while balancing academic freedom, Christian values, and responsible system use. Misuse of University information systems may result in loss of access. For the most current policy, please visit the McMurry website or contact Computer Services.

Policies

  • Protecting System Integrity
    Users must not deliberately degrade the performance of or attempt to destroy any information system. Information systems include networks, computers, personal computers, workstations, and telephone systems.

  • Authorized Use Only
    Users may access only the resources for which they have explicit authorization. Unauthorized use of another person’s computer account, telephone PIN, or other resource is prohibited unless the owner grants express permission. Users must not exploit security loopholes or bugs to gain extra resources, access another user’s account, or enter systems without authorization. The University will discipline violators and may pursue criminal charges.

  • Copyright Compliance
    Users must not copy copyrighted software to or from campus information systems except as allowed under the license agreement. Software use on a local area network or multiple computers must follow the license terms. Anyone who violates copyright restrictions may face personal, civil, or criminal liability.

  • Confidentiality of Student Records
    The Family Educational Rights and Privacy Act (FERPA) requires all McMurry employees to protect the confidentiality of student information stored on University systems. McMurry grants access to confidential information only when there is a legitimate educational interest. Employees must not disclose information to outside parties unless it qualifies as unrestricted directory information, the student provides written authorization, or University policy specifically allows it. Contact the Registrar for more information about confidentiality and release of records.

  • University Ownership
    The University owns all information systems and authorizes their use only for University-related activities. Users must not use systems for commercial purposes or non-University activities without explicit permission.

  • Access and Modification
    Users must obtain approval from Computer Services before accessing or modifying central information systems (including the DEC ALPHA and various file servers). The Computer Information Director must approve any program or file added to or removed from public directories.

  • Privacy and Confidentiality
    Computer programs, email, voicemail, and electronic files are private and confidential unless explicitly shared with authorized individuals. However, the University cannot guarantee privacy due to Internet and network security limitations. System managers may access files, programs, and messages as they traverse the network.

  • Authorized File Access
    Only authorized personnel from Computer Services or the Administration may browse files on McMurry networks, and only for compelling business or security reasons.

  • Prohibited Content
    Users must not send, print, request, or store fraudulent, harassing, or obscene messages or materials on University computers. The University classifies pornographic material as harassing to most network users.

  • Account Responsibility
    Account owners must protect their credentials and are responsible for all use of their accounts. Others may not use an account without explicit permission from the owner.

  • Account Expiration
    Expired accounts and their files will be deleted in accordance with account terms. The University deletes student email messages at the end of each semester.

McMurry University may immediately suspend an individual’s information systems privileges if a possible policy violation is discovered. The University will confidentially report suspected violations to the Dean of Students for adjudication.

The University addresses violations of these policies as it handles other policy violations. Disciplinary actions may include the loss of information systems privileges, dismissal from the University, or legal proceedings. The University may impose the full range of disciplinary sanctions in all cases.

Some violations may also constitute criminal offenses under the Texas Penal Code (see V.T.C.A., Penal Code §33.01 et seq.).

The official policies governing academic computing appear in Policies for Information Systems at McMurry University. Some of the most important policies are repeated here to highlight their importance.

Using academic computing resources is a privilege, not a right, and users must treat it as such. Misuse may result in the loss of access. These guidelines promote responsible academic computing, and all users must follow the official policies in Policies for Information Systems at McMurry University.

  • Access
    Users must present a valid McMurry ID to use the labs. Only Computer Services may grant notable exceptions when McMurry students or faculty do not use resources.

  • Passwords
    Students must remember and protect their passwords. They must change passwords when prompted by the network. Failure to do so may cause inconvenience or disrupt classroom activities.

  • Prohibited Use
    Users must not send, print, request, store, or view fraudulent, harassing, or obscene messages or materials on University-owned property.

  • Academic Priority
    Labs exist primarily for legitimate educational purposes. While Computer Services recognizes various valid educational uses, non-academic activities—such as gaming, IRC, email, or entertainment—may not take precedence. During periods of high demand, authorized personnel may require users engaged in non-academic activities to relinquish their workstations. Refusal to comply constitutes a violation of policy.

  • Intellectual Property
    Users must respect the intellectual work and property of others. Plagiarism in any form, including electronic media (files, images, graphics), is prohibited and may result in disciplinary action.

  • Equipment
    Users must report suspected hardware or software problems to lab assistants or Computer Services. Users may not repair, disassemble, tamper with, or remove University-owned equipment. Such actions violate McMurry’s computing policies.

  • Assistance
    Lab assistants are available to answer basic questions regarding equipment and software. Users must remain patient and courteous when requesting help.

  • System Settings
    Users must not alter file configurations or system settings on lab computers. The University considers intentional tampering and malicious destruction of property and may revoke privileges for such actions.

  • File Storage
    Users must save personal files to their storage devices, not lab hard drives. The University deletes student files stored on lab hard drives regularly. Users may not copy copyrighted or licensed software for personal use.

  • Printing
    Users must not use lab printers to make multiple copies of a document. Because printing resources are costly, lab assistants or authorized staff may charge $0.25 per page for multiple copies.

  • Lab Etiquette
    Eating, drinking, and tobacco use are prohibited in the labs.

  • Workstation Access
    If all lab workstations are in use, users must place their name on the waiting list with the lab assistant. A user may not remain on the list while occupying a workstation, and positions are not transferable. Workstations left unattended for more than 20 minutes will be reassigned to the next person on the list.

  • Enforcement
    The University may suspend computing privileges for any user who violates these rules.

The official email use policies are in Policies for Information Systems at McMurry University. Some key policies are repeated below to emphasize their importance. Use of the University email is a privilege, not a right. Users must treat it responsibly. Misuse may result in losing email access and other information system privileges. These guidelines promote responsible and ethical email use.

  • Privacy and Security

    • Treat email and other electronic communication as not private or secure. Email is the electronic equivalent of a postcard—it can be read as it travels across networks.

    • Do not assume that email is private or confidential. Although McMurry maintains reasonable security on its systems, the University cannot guarantee complete privacy.

    • Be alert to forged messages. If a message seems out of character for the sender, confirm by another means before responding.

  • Prohibited Uses

    • Do not send, print, request, or store fraudulent, harassing, or obscene messages or materials.

    • Do not use email in ways that congest the system or deprive others of resources.

    • Do not send chain letters, mass mailings, or spam.

    • Do not use email for commercial purposes.

    • Do not send communications that violate McMurry policies or local, state, or federal laws.

    • Do not forge or spoof email. Forgery and spoofing constitute policy violations and will result in sanctions.

  • User Responsibilities

    • You are responsible for the content and maintenance of your mailbox.

    • Read your email regularly and delete messages you no longer need.

    • Save essential messages to personal storage (disk, drive, or print copy) beyond system retention limits if needed.

    • The system administrator will delete read messages older than the set retention period, and all student emails will be deleted at the end of each semester.

  • Software and Access

    • McMurry provides licensed email software for University-owned computers. Users with personal computers are responsible for purchasing their own licensed software and hardware (e.g., modems).

    • Netscape Communications licenses its browser for educational use by McMurry students and faculty, and it may be downloaded under those terms.

  • Virus Protection

    • All computers connected to the McMurry network—including student-owned devices—must run active virus protection software with regularly updated definitions.

    • Information Services must certify each computer before it connects to the network.

    • Computers that fail to comply will be removed from the network until corrected.

  • Support

    • Information Services will provide recommendations for software and help ensure that users meet security requirements.