Code of Computing Practices
You are here: Home → Code of Computing Practices
Summary of the Code of Computing Practices
This Summary is compiled to make possible a quick review of the terms and provisions of the University of Arkansas' Code of Computing Practices. By using a University of Arkansas computer account, you are deemed to have agreed to comply with the Code of Computing Practices and to know its provisions. Therefore, it is essential that you review and understand the complete Code; you are responsible for compliance with the full Code of Computing Practices. Read the University of Arkansas Code of Computing Practices (Full Version).
Access to and use of computers, networks, and other computing and information technology resources owned and operated by the University of Arkansas is granted as a privilege in support of the university's mission. As a condition of using such university resources, you accept responsibility for and understand the obligations that this privilege provides.
Your use of computing resources is governed by federal and state law as well as by university policies and regulations. You must only use accounts and resources for the purposes for which they were assigned or as granted in the Code of Computing Practices.
You do not own your computing accounts, but are granted the privilege of exclusive use of those accounts; other access to user accounts may only be granted under limited circumstances.
You MUST use resources in an acceptable manner that:
- Is ethical and legal
- Reflects academic honesty
- Shows restraint in use of shared resources
- Respects intellectual property and data ownership
- Complies with security mechanisms
- Respects personal privacy
- Does not harass or threaten
By accepting use privileges, you AGREE to:
- Use authorized resources only, for authorized purposes only
- Use an approved means of identifying your work
- Use legally licensed software, in compliance with agreements
- Use shared resources judiciously
Furthermore, you AGREE NOT to:
- Attempt unauthorized access to systems
- Interfere with others' use of resources
- Use resources or accounts for personal financial gain
- Undermine restrictions, such as quotas and access
- Attempt to circumvent security in any way
- Provide access to unauthorized persons
- Disclose confidential data
- Create or otherwise knowingly run or distribute a computer virus or other destructive program
- Overload or waste resources, thereby affecting normal operations
- Violate copyright, trademark, or patent laws or licensing agreements by use or distribution
- Harass or threaten another person with obscene language or any actions using computing resources
- Engage in spamming or sending chain email
- Forge communications to appear as if they came from another (spoofing)
- Publish web pages that are in violation of the Code
- Engage in any other activity that is in violation of the full Code of Computing Practices
Any violation of the code is misconduct for purposes of the student code of conduct, the law student code of conduct, and university personnel policies and may be punished accordingly, including, but not limited to, the immediate suspension or revocation of your account.
Any offense that violates local, state, or federal laws may result in the immediate loss of all university computing and network privileges and may also be referred to the appropriate University authority and/or law enforcement agency.
If you have questions or need information about acceptable use of computing resources at the University of Arkansas, contact IT Services at 575-2905.