Information Technology Services
Eastern New Mexico University

Policies and Procedures


                                                                                       ENMU AGP&P 60-1

                                           60-1 Computer Use

   60-1-1 Purpose - 60-1-2 Policy - 60-1-3 Administration - 60-1-4 Computer Accounts in General -
   60-1-5 Student Accounts - 60-1-6 System Accounts - 60-1-7 Affiliate Accounts - 60-1-8 Account
   Protection - 60-1-9 Resource Limits - 60-1-10 Protection of the System - 6-1-11 Non-Confidentiality
                       60-1-12 Rules - 60-1-13 Consultation - 60-1-14 Copyrights -
                       60-1-15 Recreational and Personal Use - 60-1-16 Sanctions

   1. Purpose. The purpose of this policy and procedures is to cultivate computer use at Eastern 
      New Mexico University System (the System), to regulate computer use as necessary to protect 
      individual privacy, to provide an equitable sharing of limited resources and to promote 
      responsibility in the use of all computer systems of the ENMU System.

   2. Policy. The ENMU System's general policy for use of its computer systems and equipment are:
      A. The primary guiding authority regarding the use of the System computer systems and network 
         is the System's "Bill of Rights and Responsibilities for All Members of the ENMU System"
         (AGP&P, 15-1).
      B. All computer users have the responsibility to use the System computer systems in an effective,
         efficient, ethical and lawful manner.
      C. The use of the System computer facilities is a privilege, not a right. The System may protect
         legitimate facilities' users by imposing sanctions on users who abuse the privilege.
      D. Computer users shall:
         (1) Respect the intended use of accounts established for their use;
         (2) Respect the integrity of the System's computer systems and network;
         (3) Respect the privacy of other computer users;
         (4) Respect the rules, regulations and procedures governing the use of System computer
             facilities, equipment and systems, and
         (5) Respect the proprietary rights of software owners and comply with all copyright laws,
             treaties and compacts of the United States and all laws of the state of New Mexico, 
             including the New Mexico Computer Crimes Act, NMSA 1978, & 30-45-1 to -7 (1989 as 
             amended through 2006).
      E. Standards of common sense and common decency must be applied in determining what uses are
         proper when using the public resources of the System.
      F. The System shall not provide computer access to persons or entities not affiliated with the 
         System as that would violate state regulations prohibiting donations by the state to private 
         individuals or entities.
      G. The System acknowledges that the computer medium provides its students, faculty and staff
         opportunities for research, dialogue and expression. However, the System and each computer
         user have the responsibility to use each of the computer systems, which are state property, 
         in a manner related to the educational process for which the systems are intended.

   The foregoing purposes and policy are implemented System wide by the following.

                                      Procedures

   3. Administration. This policy and procedures shall be administered by the ENMU System chief
      information officer (CIO). Lead Information Technology Services (ITS) personnel at the branch
      community colleges report to the branch community college president but are accountable to 
      the system CIO for upholding and adhering to this policy and procedures outlines below.
      A. Student concerns not resolved by the CIO may be presented to executive administrator
         for Student Affairs.
      B. Faculty and staff concerns not resolved by the CIO may be presented to the executive
         administrator of the employee's primary area of assignment.

   4. Computer Accounts in General. All computer accounts shall be the property of the System. The
      privileges of such accounts shall be given by the colleges, authorized units, departments and 
      offices of the System for specific academic, administrative or other authorized uses. There 
      shall be four (4) types of accounts, as set forth in sections 5, 6, 7 and 8 below.

   5. Student Accounts. Student accounts may be opened and maintained only by virtue of an
      individual's status as a student and account use shall comply with this policy and all other 
      policies and procedures of the System. Records related to each student account shall be kept 
      by ITS.
      A. Official Student E-Mail Address. Upon enrollment, a student shall be assigned an official 
         e-mail address in the format of firstname.lastname@enmu.edu for ENMU-Portales and
         ENMU-Ruidoso and firstname.lastname@roswell-enmu.edu for ENMU-Roswell campus.  The e-mail
         address shall remain the same throughout the student's academic career unless the student's 
         name is changed for legal purposes or other extenuating circumstances.
      B. Use of Student E-Mail. The student e-mail account shall be activated after admittance at
         any campus of the System. Students shall be required to use this e-mail address for all
         official communications with the System.

   6. System Accounts. System accounts may be opened and maintained only for the use of the faculty
      or staff for academic or administrative work. Authorizations for each System account shall be 
      made, and appropriate records of the account kept by the appropriate manager or department 
      head.

   7. Affiliate Accounts. Affiliate accounts may be opened and maintained for individuals or 
      groups who are not directly associated with the System but whose access to the System 
      network has a clear and distinct connection to and provides some intrinsic value for the 
      System. All authorizations for affiliate accounts shall be approved by the System CIO.

   8. Account Protection. The integrity of the computer systems shall be maintained by 
      protection of passwords. Any violation of the integrity of a System computer system shall 
      be deemed a prohibited misappropriation of System property.
      A. Attempts to perform any of the following acts are among such prohibited actions:
         (1) Make an account available to any person not authorized access by the System;
         (2) Defeat the security system of any computer;
         (3) Circumvent the accounting system;
         (4) Access and/or use an account without authorization;
         (5) Use accounts for other than intended purposes (see sections 2.E above and 17 below);
         (6) Misappropriate the data or files of another person or
         (7) Download or upload of copyrighted material illegally.
      B. Authorization for access to any account by someone other than the primary user must be
         approved by the appropriate administrator, who shall arrange for maintenance of
         appropriate records of that authorization.
      C. The account holder shall bear the responsibility and the consequences of allowing any 
         access to his or her account without appropriate administrative authorization.

   9. Resource Limits. The ENMU System reserves the authority to establish computing resource 
      limits of accounts. If resources are low, the account holder should notify the course 
      instructor, ITS or the authorizing manager or department head, whoever or whichever is 
      appropriate for that account.

  10. Protection of the System. Responsible continued use of the computer system requires that 
      each user:
      A. Refrain from development or use of programs or utilities that:
         (1) Harass or interfere with other System's computer users,
         (2) Infiltrate or modify the computer system or an account or
         (3) Damage the hardware or software components of the computer system or
         (4) Perform illegal activities.
      B. When requested, users shall cooperate with computer system administrators in 
         investigations of abuse and report suspected abuse, especially any damage to or 
         problems with the user's files.

  11. Non-Confidentiality. The System recognizes that users may assume computer files, network
      traffic, ENMU systems hosted off campus and e-mail messages are confidential; however, such 
      files, network traffic and messages are not confidential. They are subject to access by ITS 
      for-systems maintenance time or when there is a report of suspected unlawful or improper 
      activities. The System reserves the right to review any information on any ENMU System 
      hardware or software, this includes systems purchased by ENMU but hosted off campus.  In 
      compliance with Section 438 of the "General Education Provisions Act" (as amended) entitled 
      "Family Educational Rights and Privacy Act of 1974" (FERPA), and the Health Insurance 
      Portability and Accountability Act of 1996 (HIPAA), the System recognizes its obligation to 
      provide appropriate access to educational records while protecting their confidentiality 
      (See AGP&P 65-7-5). The removal of any protected, confidential or private data from any of 
      the System campuses by any means including but not limited to laptops, email and removable 
      storage devices is prohibited.

  12. Rules. In addition to these policies and procedures, the System has various specific rules, 
      regulations and procedures governing the use of computing equipment and facilities located 
      around the System and posted in labs or readily available in printed form. Each computing 
      site and environment has operators, consultants and/or supervisors who have the responsibility 
      for the use of that site. Users shall abide by the rules, regulations and procedures of the 
      System and the site and shall cooperate with the operators, consultants and supervisors.

  13. Consultation. Computer users are encouraged to consult with ITS (or other appropriate ENMU
      System consultants) regarding computer use. However, obtaining assistance in completing 
      computer-related academic assignments is prohibited unless permission for consultation is 
      given by the instructor.

  14. Copyrights. Computer users shall not copy software or media protected by copyright except 
      as specifically allowed by the licensing agreements or other stipulations of the owner. 
      Making and distributing copies shall not exceed the number of original copies purchased, 
      unless otherwise stipulated in the purchase contract. ENMU System computer users should 
      presume that software is copyrighted unless they have specific knowledge to the contrary.

  15. Recreational and Personal Use. There are uses of System computer systems that are improper.
      Reasonable recreational and other personal uses are allowed, provided such use does not 
      interfere with ENMU System official business use. The responsibility of using good judgment 
      to avoid improper uses resides with the user. All improper uses cannot be anticipated or 
      listed here, but some examples follow.
      A. Under no circumstances may games be played, or other recreational uses occur, when such 
         use would interfere with the availability of facilities for academic use.
      B. Certain other activities are expressly prohibited by law. Among those are:
         (1) Commercial activities or advertising,
         (2) Libelous statements that would damage a person,
         (3) Dissemination of licensed software and
         (4) Invasion or violation of personal privacy and
         (5) Any form of electronic interaction relating to the promotion of pornography or 
             other sexual content with or toward a minor.

  16. Sanctions. Failure to abide by the guidelines set forth in the foregoing policies and 
      procedures shall subject any user of the System computer system to sanctions, which may 
      result in denial of computer account privileges, and/or disciplinary action, which could 
      lead to expulsion from the System, dismissal from a position or legal action.

      Approved by Board of Regents, May 12, 2006.
      Approved by Board of Regents, December 9, 2010.
      Approved by Board of Regents, March 29, 2019.