Computer accounts for Southern Arkansas University users are created and assigned for the purpose of fulfilling the University mission statement. Accounts will be created for SAU employees and students. In addition, limited access may be granted to individuals with special, unique, or circumstantial needs or requirements relative to the University. Any such request will be reviewed on a case-by-case basis with the user agreeing to follow University guidelines.
Users must not share accounts. User accounts and/or administrative systems are not to be used for any unethical, illegal, or criminal intent or purpose. If a problem exists with an account, please contact ITS at extension 4083.
Computer hardware, software, and application resources are the property of SAU. Therefore, any information stored on University resources is owned by and is the property of SAU and must be in compliance with local, state and federal laws and University policies. Every effort will be made to maintain privacy and security of user files. Inspection of the account content (including e-mail retrieved and restored from backup files, mailbox contents, public folder postings, files saved to local hard drives, etc.) may occur in accordance with applicable state and federal laws and University policies.
Misuse of Accounts
SAU supports the statement on software and intellectual rights adopted by EDUCOM, a consortium of several hundred colleges and universities with active interest in the educational uses of accounts and computers:
Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media. It encompasses respect for the right to acknowledgment, right to privacy, and right to determine the form, manner, and terms of publication and distribution. Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against members of the academic community.
Users should also be aware that some types of computer abuse are not only against University policies but are also in violation of state and Federal criminal codes (unauthorized reproduction of copyrighted software, intentional damage to hardware or accounts, and unauthorized alteration or access to computer systems).
Violations
Violations of these policies and procedures are subject to disciplinary actions.