Protecting System Integrity
Users must not intentionally degrade system performance, disrupt services, or attempt to damage or destroy University information systems. Information systems include, but are not limited to, networks, computers, workstations, personal devices connected to the network, and telephone systems.
Authorized Use Only
Users may access only those systems, accounts, and resources for which they have been explicitly authorized. Unauthorized use of another individual’s account, credentials, telephone PIN, or other resources is strictly prohibited unless the account owner has granted express permission.
Users must not exploit security vulnerabilities or software flaws to gain unauthorized access, obtain additional resources, or interfere with other users or systems. Violations may result in disciplinary action and, where applicable, civil or criminal prosecution.
Copyright Compliance
Users must comply with all applicable copyright and licensing agreements. Copying, installing, or distributing copyrighted software is prohibited except as expressly permitted by the license. Use of software on networks or multiple devices must comply with the licensing terms. Violations may result in personal, civil, or criminal liability.
Confidentiality of Student Records (FERPA)
The Family Educational Rights and Privacy Act (FERPA) requires McMurry employees to safeguard the confidentiality of student records stored on University systems. Access to confidential information is granted only when a legitimate educational interest exists.
Disclosure of student information to external parties is prohibited unless the information qualifies as directory information, the student provides written authorization, or disclosure is permitted under University policy. Questions regarding record confidentiality should be directed to the Registrar.
University Ownership and Use
All information systems are the property of McMurry University and are provided for University-related purposes only. Commercial use or non-University activities are prohibited without explicit authorization.
System Access and Modification
Users must obtain prior approval from Computer Services before accessing or modifying central information systems, including servers and shared infrastructure. Any program or file added to or removed from public directories requires approval from the Computer Information Director.
Privacy and Confidentiality
Electronic communications and files—including email, voicemail, and stored data—are treated as private and confidential when accessed appropriately. However, the University cannot guarantee absolute privacy due to limitations in network and Internet security. Authorized system administrators may access data as necessary for operational, business, or security purposes.
Authorized File Access
Only authorized personnel from Computer Services or University Administration may access or review network files, and only when required for legitimate business, maintenance, or security reasons.
Prohibited Content
Users must not create, transmit, request, store, or print fraudulent, harassing, threatening, or obscene material using University systems. Pornographic material is considered harassing and is strictly prohibited.
Account Responsibility
Account holders are responsible for safeguarding their login credentials and for all activity conducted under their accounts. Accounts may not be shared or used by others without explicit authorization.
Account Expiration and Data Retention
Expired accounts and associated files are removed in accordance with University retention policies. Student email accounts and messages are deleted at the conclusion of each academic semester.