Technology Resource Use Policy


All users have the responsibility to use the Marymount University technology resources in an efficient, ethical, and legal manner, consistent with the goals of the university. Technology users are expected to abide by the following policies, which are intended to preserve the utility and flexibility of the university’s technology resources and infrastructure; protect the work of students, faculty, and staff; and preserve the right to access networks to which the university is connected. These policies operate in conjunction with the university’s Academic Integrity Policy and its Community Conduct Code. These policies are representative but not all-inclusive. Individual Marymount University computer labs may post additional operational rules and restrictions that are considered part of the Marymount University technology resource use policy. Users are responsible for reading and following these rules.

Marymount University also maintains electronic data on students, personnel, and financial records that are integral to the administration of the university. The university has the responsibility to manage this data and to provide the security necessary for their use.

Users will be assigned a Marymount University account to access Marymount technology resources. The university reserves the right to access accounts and the system at any time at its sole discretion.

User passwords allow access to Marymount accounts. It is the user’s responsibility
to protect his/her account from unauthorized use by changing passwords at least
every 180 days and by using passwords that meet the university’s “strong”
password standards. Given the seasonal nature of the academic calendar, password
changes will not be required during Summer Term.

If a password expires, then the account will be deactivated. Requests to re-activate
the account should be submitted to IT Support Services prior to account deletion.
Accounts in a deactivated state for 180 days will be deleted from Marymount
systems, including deletion of the associated Gmail account. In the event that an
account needs to be re-enabled following the purge date, the account will be created
as a completely new account.

Accounts may continue to be used following graduation or separation from the
university for users in good standing. However, the Chief Information Officer
reserves the right to discontinue user privileges for individuals no longer enrolled
with the university.

IT Services recommends that users change their password more frequently than
required. If a user believes that their password has been compromised (e.g. if
another user may have viewed or acquired the password), the password should be
changed immediately.

Users must identify themselves clearly and accurately in electronic communications. Concealing or misrepresenting a name or affiliation is a serious abuse. Using identities of other individuals as one’s own constitutes fraud. Users are prohibited from sharing their password or account credentials with unauthorized persons (e.g. campus guests, relatives).

A password is private information. Users must never give out their IDs or passwords to anyone. Sharing an ID or password or logging on and allowing another person to access information is a violation of this policy. The user is responsible for all transactions which take place under his or her ID.

General Use Responsibilities

Accept responsibility for your own work by learning appropriate uses of technology resources to maintain the integrity of what you create.

Keep archives and backup copies of important work; learn and properly use the features for securing or sharing access to your files on any computers you use.

Any attempt to circumvent system security or authentication, guess other passwords, intercept or monitor data or in any way gain unauthorized access to technology resources is forbidden. Distributing passwords or otherwise attempting to evade, disable, or “crack” passwords or other security provisions threatens the work of many others and is therefore grounds for immediate suspension of your privileges. You may not develop programs or use any mechanisms to alter or avoid accounting for the use of technology resources or to employ means by which the infrastructure and systems are used anonymously or by means of an alias.

Information Technology Services may impose limitations or restrictions on technology resources, such as storage space, time limits, bandwidth throttling or amount of resources consumed when necessary. In addition, personal network devices are prohibited from connecting to the university network, including wireless routers, switches and hubs.

Computer use for course-related assignments takes priority over exploratory use.

Information Technology Services may restrict access to certain sites, services or programs for security or administrative purposes.

Users are expected to refrain from engaging in deliberately wasteful or resource consuming practices such as sending spam or file sharing (e.g. bit torrent). Creation or intentional release of computer viruses or malware or any other actions to compromise or gain unauthorized access to a technology resource is forbidden. Unauthorized transferring of copyrighted materials to or from the Marymount University network without express consent of the owner is a violation of federal law. In addition, use of the Internet from an educational site for commercial gain or profit is prohibited.

Use of technology resources to harass, offend, or annoy other users is forbidden. Obscene, defamatory, or any other material which violates university policy on nondiscrimination or the Code of Conduct will not be tolerated on Marymount University technology resources.


Users are expected to take proper care of the equipment in Marymount facilities. Food, drink, and smoking are not permitted in university computer labs. Please report any malfunctions to the lab assistant on duty or send an email to IT Support Services. Do not attempt to move, repair, reconfigure, modify, or attach external devices to the systems.


Violations of this policy may be treated as violations of university policy and/or as violations of civil or criminal law. Information Technology Services (ITS) will investigate apparent or alleged violations of these guidelines. The Chief Information Officer reserves the right to suspend user privileges, pending investigation of a suspected violation of this policy. Such action will be taken to protect the security and integrity of all university computer systems, network and administrative information repositories and will take precedence over its impact on the individual’s work.

When appropriate, at the discretion of the Chief Information Officer, cases of apparent abuse will be reported to the Office of Student Conduct and Academic Integrity. The Office of Student Conduct and Academic Integrity is responsible for determining any further disciplinary action. Upon finding of a violation, disciplinary measures may include warnings, suspension of user privileges (temporary or permanent), disciplinary probation, suspension, or dismissal from the university.

The university may also pursue civil and/or criminal charges if it deems appropriate.