[Main] [History] [Employment] [Benefits] [Compensation] [Training] [Absences] [Conduct] [Health] [Resources] [Appendix]
Code of Professional Conduct Policy
The code of professional conduct policy is available for download in PDF.
Computing Resources, Responsible Use of
St. Thomas encourages computer use in accordance with its mission and purpose by providing computing resources to the university community. This Policy describes the University’s guidelines and policies governing responsible use of computing resources by students and employees.
Acceptable Uses of UST Computing Resources
Computing resources are intended for instruction, study, academic research, and the official work of campus organizations and university offices. In addition, as with any resource on campus, access to academic computing resources is provided, in part, to allow members of the community to learn, explore, and grow.
All users of University computing resources must:
- Comply with all federal, Minnesota and other applicable law, with all applicable University rules and policies, and all applicable contracts and licenses.
- Use only those computing resources that they are authorized to use, and use them only in the manner and to the extent authorized.
- Respect the privacy of other users and their accounts.
- Respect the limited capacity of the University’s computer resources, and limit use so as not to consume an unreasonable amount of those resources or to interfere unreasonably with the activity of other users.
- Protect one’s password and I.D. from unauthorized use.
- Access only information that is one’s own, that is publicly available, or to which the user has been given authorized access.
- You are required to cooperate with system administrators if you are advised of potential security problems associated with your account or system.
Unacceptable Uses of UST Computing Resources
Conduct that constitutes unacceptable use under this Policy includes, but is not limited to:
- Accessing another person’s computer, files or data without permission. This includes data in transit on the network.
- Using a system or the network to obtain unauthorized access to or deny services to any offsite system. Such actions may also violate Federal Law.
- Circumventing, violating, or subverting system or network security measures, or exploiting flaws in same, or attempting to do so. Examples include creating or running programs that are designed to identify security loopholes, to decrypt intentionally secured data, or to gain unauthorized access to any system. If you find a hole in the security of any St. Thomas system, notify IRT staff immediately at 651.962.6230.
- Engaging in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services or damaging files or making unauthorized modifications to University data.
- Performing any act, intentionally or otherwise, that will interfere with the normal operation of computers, terminals, peripherals or networks.
- Using University systems for personal commercial purposes or partisan political purposes, such as using electronic mail to circulate advertising for products or for political candidates.
- Making or using illegal copies of copyrighted software or data, storing such copies on University systems, or transmitting them over University networks. Unless given explicit permission by the copyright holder, you may not copy software or computer data, including audio or video data, available through the University. You may not place copyrighted material on any computer connected to the UST network for the purpose of making it available for others to copy, unless you own the copyright or can demonstrate a teaching or research fair-use exemption from copyright. Software piracy constitutes theft and will not be tolerated.
- Using University software or data, including electronic mail, to harass or intimidate another person.
- Saturating network or computer resources to the exclusion of another’s use, for example, overloading the network with either legitimate (file backup, archiving, bulletin boards, synchronous chat sessions) or malicious (denial of service attack) activities.
- Using the University’s systems or networks for personal gain; for example, by selling access to your user id or to University systems or networks, or by performing work for profit with university resources in a manner not authorized by the University.
- Sharing your username and password with others. Providing access to UST systems or networks to users who do not have an official affiliation with the University without IRT permission is prohibited. This includes providing user accounts on personal systems (i.e. Unix shell accounts, PC-Anywhere passwords, or any such analog). If permission is granted, the administrator of that system is responsible for all user activities on that system.
- Attaching any device other than a personal computer to the campus network without the expressed permission of the information technology staff. This includes (but is not limited to) printers, hubs, switches, routers, and protocol analyzers.
- Abuse of E-mail – The following activities specific to e-mail use are prohibited:
- Forging the identity of a user or machine in an electronic communication.
- Failure to comply with a request to stop e-mailing someone or to take them off a distribution list
- Sending all-campus e-mail messages
- Creating or forwarding chain letters
- Initiating or facilitating in any way mass electronic mailing (e.g., “spamming,” “flooding” or “bombing”).
- Applicability of Other University Codes of Conduct
All University of St. Thomas codes of conduct, including those related to plagiarism and harassment, apply also to technology resources. These policies are based on respect for the work and privacy of other St. Thomas community members.
As a general policy, University employees will not read your e-mail or private files (whether they are stored centrally or locally). However, the University of St. Thomas reserves the right to log and examine network traffic, and to retrieve and examine files stored on UST systems when necessary, particularly in the following situations:
- If information is required in a court proceeding. Electronic data, including deleted information that has been restored from back-up tape, has been subpoenaed as evidence during both civil and criminal court cases. If such a situation arises, the university is legally bound to cooperate with law enforcement authorities.
- If an individual is suspected of an infraction of University policy or of the law (e.g., engaged in unacceptable use of UST computing resources as outlined in this Policy), Information Resources & Technologies (IRT) will act as the investigating office and will involve other offices as needed.
If an individual’s private files (electronic or e-mail) are wanted as evidence on a non-computer-related disciplinary matter (such as an academic dishonesty or a sexual harassment investigation), IRT will provide those files on request of the Dean of Student Life, the Dean of the appropriate college, or the Associate Vice President of Human Resources. Unless the infraction involves potentially criminal behavior, IRT will make an effort to inform the individual that their files are being examine.
The University considers violations of acceptable use principles to be serious offenses. The University will take such action as is necessary to copy and examine any files or information resident on University systems allegedly related to unacceptable use, and to protect its network from systems and events that threaten or degrade operations. Blatant violations or repeated offenses will be referred to the appropriate University entity for discipline.
In the case of minor infractions, IRT will attempt to contact the offending party via e-mail, telephone or in person to explain the problem and discuss its resolution.
In the case of major infractions, for example those that impair others’ ability to use networking and computing resources, IRT may restrict systems or network access as it deems necessary to mitigate such activities. Only thereafter will IRT make a reasonable effort to contact the involved parties when these incidents occur.
Violations of this policy will result in disciplinary action by the Dean of Student Life, Associate Vice President of Human Resources, and other appropriate authorities, if necessary. IRT staff may take immediate action as needed to ensure system integrity. This may include, but not be limited to, immediate denial of access to your account, loss of e-mail privileges or removal of your system from the network. In cases involving violations of this Policy on Responsible Use of University Computing Resources or other campus codes, the relevant disciplinary offices will be given all information about an incident that IRT can collect. IRT will advise and testify as requested, and if asked to disable accounts as a result of disciplinary hearings, will do so with all possible speed.
If you have any questions about whether an activity is permissible or not, you may call the IRT Tech Desk at 651.962.6230 or the Dean of Student Life at 651.962.6050.
Conflict of Interest Policy
The conflict of interest policy is available for download in PDF.
The University of St. Thomas is committed to maintaining an academic and work environment in which the principles of mutual respect, professional ethics, fairness, and objectivity are honored. Central to this commitment are the interactions among those in whom the University has placed its trust to uphold these principles. This trust is put at risk when faculty, administrators, staff, or students engage in consenting romantic, intimate, or sexual relationships that involve persons of unequal power, for example, faculty and student, supervisor and supervised employee, administrator and student, or anyone who holds an evaluative or decision-making role over another. Such relationships represent a special form of conflict of interest and, therefore, are prohibited.
The Consenting Relationships policy is available for dowload in PDF.
Hate Crimes Policy and Procedures
The hate crimes and bias-motivated incidents policy is available for download in MS Word or as PDF.
The hate crimes and bias-motivated incidents procedure is available for download in MS Word or as PDF.
Inclement Weather Closing Policy
The inclement weather closing policy is available for download in MS Word or as PDF.
Off-Campus Travel Policy
The off-campus travel policy is available for download in MS Word or as PDF.
Sexual Harassment Policy
The sexual harassment policy is available for download in MS Word or as PDF.
Sexual Violence Policy
The sexual violence policy is available for download in MS Word or as PDF.
VISION Trip and Study Abroad Program Policy
The VISION trip and study abroad program policy is available for download in PDF.
The whistleblower policy is available for download in PDF.