A. Computer Use on Campus

Faculty Senate Bill 88-A-13 begins here.

  1. Access to Computer Services provided data processing resources is controlled by the issuance of user codes. An employee or student receiving a user code assumes responsibility for all computing activity performed under that user code (whether he or she personally performs the activity or not).
  2. User codes are normally granted to individuals. Upon approval of the Computer Services manager, a user code may be issued for use by a group. Such approval is contingent upon acceptance of responsibility for all computing activity performed under that user code by the group's supervisor (whether group members perform the activity or not).
  3. Computer facilities made available by user code should only be used to conduct University business (either job- or class-related activities).
  4. User codes may not be transferred to another person or group.
  5. Requests for access to CICS transactions must be submitted in memo form to the Computer Services manager. Requests must include the following:
    • Signed endorsement from the employee's supervisor.
    • List of specific CICS transactions to which access is desired.
    • Type of access (review only or update) desired for each transaction.
    If a transaction is administered by an office other than that of the requestor, a signed endorsement from the administering office will also be required. The manager of Systems Analysis and Programming will provide guidance in preparing these requests. Some transactions require authorization beyond a user code. The manager of Systems Analysis and Programming can supply the name of the appropriate application administrator to contact.
  6. Requests for MUSIC user codes are made on a User Code Request form obtained from Computer Services. Requests by faculty/staff members for personal administrative or research codes must be signed by the employee's supervisor. Faculty members requesting instructional user codes for use by their students must obtain the signature of a faculty sponsor.
  7. A password is issued with each user code. The password should be changed by the user a minimum of once each month. Passwords are never to be displayed openly in written material.
  8. CICS user codes remain valid as long as the employee's job status and computer access requirements remain the same.
  9. MUSIC administrative and research user codes remain valid as long as the employee's job status and computer access requirements remain the same. Instructional user codes expire at the end of the semester in which they are issued.
  10. Supervisors must report to the Computer Services manager on a timely basis any change in an employee's status that affects his/her computer access requirements (transfer, termination, reclassification, etc.).
  11. A list of personnel with user codes will be provided to departmental supervisors on a semi-annual basis. Upon reviewing the list and indicating any necessary changes, the supervisor will sign and return the list to the Computer Services manager.

Approved by Faculty Senate Bill 88-A-13 - November 16, 1988
Approved by Board of Regents - December 1988

Faculty Senate Bill 88-A-14 begins here

User Priorities

Southeast Missouri State University students, faculty, and staff are the primary constituencies is served. Other educators, adult members of the community, and high school students are eligible to use the laboratory on a space available basis.

Persons below high school age are not permitted to use the laboratory.

Guidelines for Users

Users agree to comply with all guidelines and restrictions outlined in this statement. Those who do not comply will be asked to leave the laboratory.

Users must sign in upon entry to the laboratory and will be required to give the laboratory assistant their official I.D. card (for Southeast Missouri State University students, faculty, and staff) or a valid driver's license (for other users) when assigned a computer. All materials issued on a borrower's I.D. are the responsibility of the cardholder who will pay for fines, damages, or losses.

Users must return all University-owned software before leaving the lab. Failure to return software at the time of original departure will result in fines and/or replacement cost charges.

Several manuals describing software operation are available. Users are expected to read and follow these directions carefully.

When there are more users than available computers, user time will be limited to a 90-minute period. A waiting list will be established to ease scheduling at such times. Also, one IBM-PC and one Apple IIe computer will be designated for express use with a time limit of 45 minutes for any user.

Use of certain machines may be restricted to printer use only during peak user hours.

Users will be asked to vacate the laboratory 30 minutes before the official closing of the library.


Under no circumstances are users permitted to duplicate copyrighted programs on University equipment.

Laboratory software cannot be checked out for use outside the laboratory. Users are not permitted to alter computer hardware or change hardware configurations.

Theft, or deliberate destruction of University equipment (i.e., hardware, software, manuals, etc.) will be reported to the Department of Public Safety; users will be held financially liable for the replacement cost of lost or stolen software.

Use of the telephone in the laboratory is restricted to official business by employees only.

Food, beverages, and smoking are not permitted in the laboratory. Use of laboratory computers for game playing is not permitted. Excessive printer output, such as signs or banners, is not permitted. Functions of Laboratory Assistants

Laboratory assistants have been hired to supervise the operation of the laboratory in accordance with guidelines noted above.

The laboratory assistants are also responsible for:

  1. Distributing, monitoring, and collecting laboratory-owned software;
  2. Removing and filing completed printouts from the mainframe computer every 30 minutes.

As time permits, laboratory assistants will be available to provide basic directions on the use of the laboratory hardware. The laboratory assistants will not be familiar with all the software available for use in the laboratory.

The laboratory assistants cannot provide users with help in the completion of course assignments.

Comments and Complaints

Comments and complaints about the operation of the Microcomputer Laboratory should be sent to the Director of Computer Services.

Approved by Faculty Senate, Bill 88-A-14 - November 16, 1988
Approved by Board of Regents - December 1988

Faculty Senate Bill 85-A-12 begins here

In accordance with the 1980 Computer Software Copyright Act and in the interest of upholding a sound code of ethical behavior, Southeast Missouri State University does not condone any illicit use of software. What constitutes licit use depends upon the individual software licensing agreement. Negotiation of liberal site licensing agreements with vendors is encouraged.

Generally speaking, the following will be considered to be lawful use of software by someone with legitimate access to a copy:

  1. Making backup copies for one's personal use, even if the software is copy protected.
  2. Configuring the software and making other reasonable modifications specifically designed to fit the software to the user's needs. (Note: In some instances, such action may void any warranty on the software.)
  3. Using the software on only one machine at a given time.
  4. Selling or giving the original copy and documentation to another, provided that the transferor keeps no copies whatsoever of either the software or documentation and provides the transferee only the original copies. (This assumes that the copy of the software is owned rather than borrowed or leased.)

The following are actions that are considered illicit and may subject the actor to sanctions by the University:

  1. Providing copies of copyrighted or licensed software to others while maintaining copies for one's own use unless there is a specific provision in the license allowing such activity. The activity is forbidden even if the software is provided without cost for an educational purpose.
  2. Using software or documentation known to have been obtained in violation of the copyright law or a valid license provision. Use of a copy of a copyrighted program obtained from another party for which no license exists that allows such a transfer will be presumed to be knowing, and the burden of demonstrating that the use was innocent will rest with the user.
  3. Using a copyrighted program on more than one machine at the same time, including use on a local area network or multiple workstations accessing the same copy of the program unless a specific license provision permits such activity.
For Display in All Student Labs:

Illegal copying of copyrighted programs on University equipment is prohibited and will be considered a breach of the University Code of Academic Honesty.
Approved by Faculty Senate, Bill 88-A-12 - November 16, 1988
Approved by Board of Regents - December 1988

Additional Access Server Installed

Faculty, staff, and students at Southeast may make use of the Internet dial-up service. For software and installation instructions, bring two blank high density (1.44 MB) diskettes to the Computer Services office in Academic Hall Room 110.