Technology Resources Usage Policy

Policies and Regulations Regarding the Use of University Computers

The abuse or misuse of technology resources by Drury students, university employees or Drury citizens is prohibited on universityowned or controlled property, in conjunction with university-sponsored or supervised activities, or at any activity or event that an observer would associate with Drury students, university employees or Drury citizens.

The use of all computer accounts and resources is the personal responsibility of each account holder. Use of Academic Computing resources must be consistent with institutional policies governing how to conduct one’s self as a member of the community, including policies regarding cheating, plagiarism, harassment and theft. It is the computer user’s responsibility to comply with all general campus and computing policies.

Academic Computing services and resources are made available to support the academic programs and activities of Drury University. Use of these services and resources is a privilege that is not to be abused and may be taken away without prior consent, when required by law or when there is a substantiated reason to believe that violations of law or policy have occurred. In timesensitive cases, access may be restricted to meet critical operational needs.

Each computer user is responsible for the storage of personal files created on Drury computing facilities. Hard disks will be routinely cleared of files. Under no circumstances will Drury University be held responsible for any files stored on or deleted from its hard disks.

Each computer user is responsible for taking reasonable care for the security of his/her campus account and password. Every user should change his/her password frequently and should not, under any circumstances, give his/her password to another person.
Violations include but are not limited to:

  1. Using a computer account that belongs to another individual
  2. Modifying, copying, or deleting programs or data without proper authorization
  3. Using College resources for commercial purposes and/or for personal profit
  4. Circumventing logon or other security measures
  5. Modifying system facilities or attempting to disrupt the University computing systems
  6. Using information systems for any illegal or unauthorized purpose
  7. Using network resources to send or publish abusive, obscene, or harassing communications
  8. Making, acquiring, or using unauthorized copies of computer software
  9. Denying or interfering with computing service to other users in any way, which may include propagating chain letters, spamming (spreading email or postings widely and without good reasons), or bombing (flooding an individual, group, or system with numerous or large email messages)
  10. Using the University computer system in a way that suggests the University’s endorsement of any political candidate or ballot initiative
  11. Playing sounds or messages which could create an atmosphere of discomfort or harassment of others
  12. Sending forged email, using remailers or any shielded identity programs
  13. Using electronic communications to fabricate research data
  14. Creating, launching, distributing, or maintaining computer viruses, worms, destructive or other rogue programs, including the unintended participation in such activity by not providing an Antivirus program which can be updated daily (a requirement for network access).
  15. Reading other users’ information or files without permission
  16. Using electronic communications to steal another person’s works, or otherwise misrepresent one’s own work
  17. Engaging in academic dishonesty as defined in the University’s Academic Integrity Policy.
  18. Cracking or guessing and applying the ID or password of another user
  19. Downloading or posting illegal, proprietary, or damaging material to a College computer
  20. Removing or modifying any College-owned or administered computer equipment or data
  21. Using systems in violation of criminal or civil law at the federal, state, or local levels (examples include receiving, transmitting, possessing child pornography; making bomb threats; promoting a pyramid scheme; distributing illegal obscenity; infringing copyrights, and so on)
  22. P2P downloading or sharing programs are not permitted on campus. This includes the use of Limewire, Ares, Torrents, etc. Use of any P2P programs in any manner, may result in network access being revoked which will require the equipment be brought to the Technology Services Department. The use of iTunes and other legal websites is permitted.
  23. Creating a network disruption, which provides or takes an unfair portion of network resources to or from others, may also result in network access being revoked
  24. Using electronic or other devices to make an audio or video record of any person while on University premises without his/her knowledge, or without his/her effective consent when such a recording is likely to cause injury or distress. This includes, but is not limited to, surreptitiously taking pictures of another person in a gym, locker room, or restroom

Intellectual Property

All communications and information accessible via the Internet should be assumed to be copyrighted and should be accessed and re-distributed using regular copyright rules. When sources found on the Internet are cited, the name, date and location of the information must be included.

Anyone discovered to be hindering normal operations or making inappropriate use of computing resources will be contacted, and appropriate action will be taken. Upon report of a violation, the user may be denied access to Drury computing facilities. All pertinent information on the alleged violation will be given to the appropriate vice president who will oversee the judicial review process.

The university and its staff shall treat all electronically stored information as confidential, but may examine or disclose information when authorized by the owner of the information, when approved by appropriate vice president, or required by local, state or federal law including, but not limited to, laws regarding harassment, libel and defamation of character.

Email Policy Statement and Definition

The official account/address for email communication at Drury University shall be the “” account/address assigned by the university to each member of the community. All official email communication from employees of the university to other members of the university community is sent from and directed to official Drury email accounts.

No assurance is given when using non-Drury email accounts. Neither the university nor its personnel make any assurance of delivery or receipt when attempts are made to communicate through a non-Drury email address.

It is the user’s responsibility to keep his/her Drury email account useable. Unattended email accounts accumulate messages and the “box” may rapidly fill at which time incoming email messages are typically lost. Drury is not responsible for failed delivery when a user’s Drury email “box” becomes full. Users are responsible for eliminating enough old messages to keep the “box” active. Old messages can be archived in a way that preserves them without consuming space in the “box.”

The email system at Drury exists to provide a convenient (not necessarily confidential) way of communicating between students, faculty, colleagues and friends. It is expected that Drury computer users will use common courtesy in the use of email.

This policy establishes protocol for using Drury email accounts, but it does not preclude any member of the Drury community from having a non-Drury email account or from corresponding with another member of the Drury community at a non-Drury email account.


  1. Electronic mail (email) is a form of public communication and cannot be guaranteed to be private. Messages can be intercepted while in transit through the system. Be discreet.
  2. The systems and network administrators have access to all files stored on the university servers. In the course of routine system maintenance, trouble-shooting and mail delivery problem resolution, staff may inadvertently see the content of email messages. However, these individuals are prohibited from accessing personal files except as otherwise stated in this handbook.

Computer Resources Usage Policy Violation Sanctions

Violators of this policy will be subject to sanction ranging from official letters of warning and reprimand to disciplinary suspension from the university, according to the severity of the offense.