Nebraska and College of Business Computing Use Policies
University of Nebraska-Lincoln faculty, staff and students are expected to use all computing resources responsibly
and are expected to adhere to guidelines and policies as set forth by the university and laws and regulations of federal,
state and local government.
CoB computing policy for CoB faculty staff and students includes UNL computing policy as found at
the UNL Computer Use Policies webpage as well as the following:
CoB computing policies include those policies defined by UNL for use of computing resources, including Executive Memorandum No. 16,
and those policies found in CoB ITS policies at the following CoB IT Wiki page. These policies include:
University business use and limited personal use.
Prior approval is required for personal use for outside consulting, business or employment.
Unauthorized access is prohibited.
No one should use the ID or password of another.
When any user terminates his or her position with the University, their ID and password shall be denied further access to University computing resources.
Misuse of Computers and Network Systems
Misuse of University information systems is prohibited, and includes the following:
Attempting to modify or remove computer equipment, software, or peripherals without proper authorization
Accessing without proper authorization computers, software, information or networks to which the University belongs
Circumventing logon or other security measures
Using information systems for any illegal or unauthorized purpose
Personal use of information systems or electronic communications for non-University consulting, business or employment, except as expressly authorized
Violating any software license or copyright, including copying or redistributing copyrighted software, without the written authorization of the software owner
Accessing other users' information or files without permission.
Forging, fraudulently altering, falsifying, or otherwise misusing University or non-University records
Using electronic communications to steal another individual's works, or otherwise misrepresent one's own work
Using electronic communications to fabricate research data
Downloading, transporting or posting illegal, proprietary or damaging material to a University computer
Personal use of any University information system to access, download, print, store, forward, transmit or distribute obscene material
Store social security numbers, credit card numbers, or other account information without proper authorization
User privacy is not guaranteed
IT personnel have authority to access individual user files or data in the process of performing maintenance
With reasonable cause, IT personnel may access account, file, or other data controlled by an alleged violator and
share that data with persons authorized to investigate misuse of computing resources
All policies stated are applicable to email
E-mail should reflect careful, professional and courteous drafting style
College Specific Policies
Service requests should be submitted to the Technical Solutions Center, preferably via the electronic form at the
Service Request webpage.
Emergency information technology issues should be brought to the attention of CoB ITS at (402) 472-5215,
firstname.lastname@example.org, the Service Request webpage
or via walk-in our Technical Solutions Center in CoB 235E as soon as possible.
Application and Enforcement
A failure to abide by the guidelines outlined in this document may result in the imposition of one or more of the following sanctions:
denial of access to information resources and networks, disciplinary action by UNL, civil action and/or criminal prosecution.