Early Closure

McMurry University will close at 3 p.m. on Friday, January 23, due to winter weather conditions. Visitors should postpone campus visits. Additional updates will be shared as conditions develop.

Acceptable Use of University Information Systems

McMurry University provides access to institutional information systems—including networks, email, software, and University-owned or managed devices—to support academic instruction, learning, and campus operations. Access to these systems is a privilege, not a right. All students, faculty, and staff are expected to use University resources responsibly, ethically, and in full compliance with institutional policies and applicable laws.

University policies are regularly reviewed to ensure equitable access to resources while appropriately balancing academic freedom, Christian values, and responsible system use. Misuse of University information systems may result in restricted or revoked access and other appropriate administrative action.

For the most current version of this policy, please visit the McMurry University website or contact Computer Services.

University Information Systems Policies and Guidelines

Information Systems Acceptable Use Standards
Enforcement of Information Systems Policies
McMurry University Computing Laboratories

Protecting System Integrity

Users must not intentionally degrade system performance, disrupt services, or attempt to damage or destroy University information systems. Information systems include, but are not limited to, networks, computers, workstations, personal devices connected to the network, and telephone systems.

Authorized Use Only

Users may access only those systems, accounts, and resources for which they have been explicitly authorized. Unauthorized use of another individual’s account, credentials, telephone PIN, or other resources is strictly prohibited unless the account owner has granted express permission.
Users must not exploit security vulnerabilities or software flaws to gain unauthorized access, obtain additional resources, or interfere with other users or systems. Violations may result in disciplinary action and, where applicable, civil or criminal prosecution.

Copyright Compliance

Users must comply with all applicable copyright and licensing agreements. Copying, installing, or distributing copyrighted software is prohibited except as expressly permitted by the license. Use of software on networks or multiple devices must comply with the licensing terms. Violations may result in personal, civil, or criminal liability.

Confidentiality of Student Records (FERPA)

The Family Educational Rights and Privacy Act (FERPA) requires McMurry employees to safeguard the confidentiality of student records stored on University systems. Access to confidential information is granted only when a legitimate educational interest exists.
Disclosure of student information to external parties is prohibited unless the information qualifies as directory information, the student provides written authorization, or disclosure is permitted under University policy. Questions regarding record confidentiality should be directed to the Registrar.

University Ownership and Use

All information systems are the property of McMurry University and are provided for University-related purposes only. Commercial use or non-University activities are prohibited without explicit authorization.

System Access and Modification

Users must obtain prior approval from Computer Services before accessing or modifying central information systems, including servers and shared infrastructure. Any program or file added to or removed from public directories requires approval from the Computer Information Director.

Privacy and Confidentiality

Electronic communications and files—including email, voicemail, and stored data—are treated as private and confidential when accessed appropriately. However, the University cannot guarantee absolute privacy due to limitations in network and Internet security. Authorized system administrators may access data as necessary for operational, business, or security purposes.

Authorized File Access

Only authorized personnel from Computer Services or University Administration may access or review network files, and only when required for legitimate business, maintenance, or security reasons.

Prohibited Content

Users must not create, transmit, request, store, or print fraudulent, harassing, threatening, or obscene material using University systems. Pornographic material is considered harassing and is strictly prohibited.

Account Responsibility

Account holders are responsible for safeguarding their login credentials and for all activity conducted under their accounts. Accounts may not be shared or used by others without explicit authorization.

Account Expiration and Data Retention

Expired accounts and associated files are removed in accordance with University retention policies. Student email accounts and messages are deleted at the conclusion of each academic semester.

McMurry University reserves the right to immediately suspend an individual’s access to University information systems upon discovery of a potential policy violation. Suspected violations will be reported confidentially to the Dean of Students or the appropriate administrative authority for review and adjudication.

Violations of information systems policies are addressed in accordance with the University’s established disciplinary procedures. Sanctions may include, but are not limited to, suspension or revocation of system access, disciplinary action up to and including dismissal from the University, and referral for legal action. The University may impose any or all applicable sanctions based on the severity of the violation.

Certain violations may also constitute criminal offenses under applicable law, including provisions of the Texas Penal Code (V.T.C.A., Penal Code §33.01 et seq.). In such cases, the University may cooperate fully with law enforcement authorities.

Rules of Use

The official policies governing academic computing are outlined in the Policies for Information Systems at McMurry University. The following rules outline key requirements and expectations for the use of University computing laboratories.

Use of academic computing resources is a privilege, not a right. All users are expected to act responsibly and in accordance with University policy. Misuse of computing resources may result in loss of access and additional disciplinary action.


Access

Users must present a valid McMurry University ID to access computing laboratories. Exceptions may be granted only by Computer Services under limited circumstances.

Password Security

Users are responsible for safeguarding their passwords and complying with required password changes. Failure to maintain secure credentials may result in access issues or disruption to academic activities.

Prohibited Use

Users must not create, send, request, view, print, or store fraudulent, harassing, threatening, or obscene content on University-owned systems or property.

Academic Priority

Computing laboratories exist primarily to support academic instruction and coursework. Non-academic activities—including gaming, entertainment, email, or chat services—may not take precedence over educational use.
During periods of high demand, authorized staff may require users engaged in non-academic activities to vacate workstations. Failure to comply constitutes a policy violation.

Intellectual Property

Users must respect intellectual property rights. Plagiarism in any form—including electronic files, images, graphics, or other digital media—is prohibited and may result in disciplinary action.

Equipment Use

Users must promptly report hardware or software issues to lab assistants or Computer Services. Users may not repair, disassemble, tamper with, or remove University-owned equipment. Unauthorized interference with equipment violates University policy.

Assistance

Lab assistants are available to provide basic assistance with equipment and software. Users are expected to be courteous and respectful when requesting help.

System Settings

Users may not modify system configurations, software settings, or file structures on lab computers. Intentional tampering or damage may result in immediate loss of privileges.

File Storage

Users must save personal files to approved personal or network storage locations. Files stored on lab hard drives are subject to regular deletion. Copying copyrighted or licensed software for personal use is prohibited.

Printing

Printing resources must be used responsibly. Multiple-copy printing is discouraged, and authorized staff may charge $0.25 per page for excessive or non-essential printing.

Lab Etiquette

Eating, drinking, and tobacco use are not permitted in computing laboratories.

Workstation Availability

When all workstations are occupied, users must place their name on the waiting list with the lab assistant. Users may not remain on the list while using a workstation, and waiting list positions are non-transferable. Workstations left unattended for more than 20 minutes may be reassigned.

Enforcement

McMurry University reserves the right to suspend or revoke computing privileges for any user who violates these rules or related information systems policies.

The official standards governing University email use are defined in the Policies for Information Systems at McMurry University. The provisions below outline key expectations and responsibilities regarding email use. Access to University email systems is a privilege, not a right, and must be exercised responsibly and ethically. Misuse may result in suspension or loss of email access and other information system privileges.


Privacy and Security

Users should not assume email or other electronic communications are private or secure. Email functions similarly to a postcard and may be viewed as it traverses multiple networks.

While McMurry University implements reasonable security measures, the University cannot guarantee complete privacy or confidentiality of electronic communications.

Users should remain vigilant for forged or suspicious messages. If an email appears unusual or inconsistent with the sender’s typical communication, users should verify its authenticity through alternative means before responding.


Prohibited Uses

Users must not:

  • Send, print, request, store, or transmit fraudulent, harassing, threatening, or obscene content

  • Use email in a manner that disrupts system performance or limits access for others

  • Send chain letters, unsolicited mass messages, or spam

  • Use University email for commercial or personal business purposes

  • Transmit messages that violate University policies or local, state, or federal laws

  • Forge, spoof, or misrepresent email identities

Email forgery and spoofing constitute serious policy violations and may result in disciplinary action.


User Responsibilities

Users are responsible for the content, organization, and maintenance of their email accounts. This includes:

  • Reviewing email regularly

  • Deleting messages that are no longer needed

  • Saving critical communications to personal storage beyond system retention limits, if necessary

System administrators may delete read messages that exceed established retention periods. All student email accounts and messages are deleted at the end of each academic semester.


Software and Access

McMurry University provides licensed email software for use on University-owned computers. Users of personal devices are responsible for properly acquiring and maintaining licensed software and compatible hardware.

Educational-use licenses for specific software, such as web browsers, may be made available to students and faculty under applicable license terms.


Virus Protection

All devices connected to the McMurry network—including personally owned computers—must run active virus protection software with up-to-date definitions.

Information Services must certify each device before network access. Systems that do not meet security requirements will be removed from the network until compliance is achieved.


Support

Information Services provides guidance and recommendations regarding approved software, security practices, and compliance requirements to help users maintain a secure and reliable email environment.