Information Technology Services
Eastern New Mexico University

Policies and Procedures


                                                                                       ENMU AGP&P 60-1

                                  60-1 Technology Acceptable Use

   60-1-1 Purpose  60-1-2 Definitions  60-1-3 Policy  60-1-4 Adminitration  60-1-5 User
       Accounts  60-1-6 Student Accounts  60-1-7 Employee Accounts  60-1-8 Affiliate
   Accounts  60-1-9 Account Protection  60-1-10 Resource Limits  6-1-11 Protection of the
   System  60-1-12 Rules  60-1-13 Consultation  60-1-14 Recreational and Personal Use 
                                     60-1-15 Sanctions

   1. Purpose. The purpose of this policy and procedures is to cultivate computer use at
      Eastern New Mexico University System (the System), to regulate computer use as
      necessary to protect individual privacy, to provide an equitable sharing of limited
      resources and to promote responsibility in the use of all computer systems of the
      ENMU System.

   2. Definitions.
      A. Technology Resources: All System owned or managed assets including, but not
         limited to, hardware (e.g. desktop computers, laptops, cell phones), software,
         networks, systems, and data.

      B. Institutional data: encompasses any information created, stored, or processed
         through technology resources, such as spreadsheets, documents and
         presentations.

           (i) For information on Confidential Information, please refer to policies 65-1 and
           65-7.

      C. User(s): Any individual who accesses or uses the System's technology resources.

      D. Information Technology Services (ITS): Refers to the individual departments on the
         System's campuses responsible for managing and supporting the technology
         resources for their respective campuses.

   3. Policy. The ENMU System's general policy for use of its Technology Resources are:

      A. All Users have the responsibility to use the System Technology Resources in an
         effective, efficient, ethical and lawful manner.

      B. The use of the System Technology Resources is a privilege, not a right. The System
         may protect Users by imposing sanctions on Users who abuse the privilege.

      C. Users shall:

         (1) Respect the intended use of accounts established for their use.

         (2) Respect the integrity of the System's Technology Resources.

         (3) Respect the privacy of other Users.

         (4) Respect the rules, regulations and procedures governing the use of System
             Technology Resources, and

         (5) Respect the proprietary rights of software owners and comply with all copyright
             laws, treaties and compacts of the United States and all laws of the state of New
             Mexico, including the New Mexico Computer Crimes Act, NMSA 1978, § 30-45-1
             to -7 (1989 as amended through 2006).

      E. Standards of common sense and common decency must be applied in determining
         what uses are proper when using the Technology Resources of the System.

      F. The System shall not provide Technology Resources to any person or entity not
         affiliated with the System as that would violate New Mexico State Anti-Donation
         Clause.

      G. The System acknowledges that Technology Resources provides its users
         opportunities for research, dialogue and expression. However, the System and
         each user have the responsibility to use each of the technology resources, which
         are state property, in a manner related to the educational process for which they
         are intended.

                                      Procedures

   4. Administration. This policy shall be administered by the Executive Director for ENMU
      System Information Technology (EDSIT). Lead Information Technology Services (ITS)
      personnel at the branch community colleges report to the branch community college in
      consultation with EDSIT for upholding and adhering to this policy and the procedures
      outlined below.

      A. Student concerns not resolved by the EDSIT may be presented to the executive
         administrator for Student Affairs.

      B. Faculty and staff concerns not resolved by the EDSIT may be presented to the
         executive administrator of the employee's primary area of assignment.

   5. User Accounts. All User accounts shall be the property of the System. The privileges
      of such accounts shall be given by the colleges, authorized units, departments and
      offices of the System for specific academic, administrative or other authorized uses.

      A. Official User Email Address: Users shall be assigned an official e-mail address
         based on the User's official first and last name. The e-mail address shall remain the
         same unless the User's name is changed for legal purposes or other extenuating
         circumstances.

      B. Email Communication: The System reserves the right to send official
         communications to the User's System email account with the full expectation that
         the User will receive emails and read these emails in a timely fashion.

      C. Users shall be required to use this e-mail address for all official communications
         within the System.

      D. When a User leaves or substantially changes roles in the System, each User
         account is subject to modifications including but limited to access revocation,
         permission adjustments, password resets, account deactivation, or removal.

      E. Users shall not set automatic forwarding of official emails to any external email
         address not owned or managed by the System.

   6. Student Accounts. Student accounts may be opened and maintained only by virtue of
      an individual's status as a student and account use shall comply with this policy and all
      other policies and procedures of the System. Records related to each student account
      shall be kept by ITS.

   7. Employee Accounts. Employee accounts may be opened and maintained only for the
      use of the faculty or staff for academic or administrative work. Authorization for each
      System account shall be made, and appropriate records of the account kept by the
      appropriate manager or department head.

   8. Affiliate Accounts. Affiliate accounts may be opened and maintained for individuals
      or groups who are not directly associated with the System but whose access to
      Technology Resources has a clear and distinct connection to and provides some
      intrinsic value for the System. All authorizations for affiliate accounts shall be
      approved by the EDSIT.

   9. Account Protection. Any violation of the operation or security of a technology
      resource shall be deemed a prohibited misappropriation of System property.
      A. Attempts to perform any of the following acts are among such prohibited actions:

         (1) Make an account available to any person not authorized to have access by the
             System.

         (2) Defeat the security system of any computer.

         (3) Circumvent the accounting system.

         (4) Access and/or use an account without authorization.

         (5) Use accounts for other than intended purposes.

         (6) Misappropriate the data or files of another person.

         (7) Download or upload copyrighted material illegally.

      B. Authorization for access to any account by someone other than the primary user
         must be approved by the appropriate administrator, who shall arrange for the
         maintenance of appropriate records of that authorization.

      C. The account holder shall bear the responsibility and the consequences of allowing
         any access to his or her account without appropriate administrative authorization.

      D. The operation and security of Technology Resources shall be protected by
         passwords and multi-factor authentication (MFA) where applicable.

      E. Users should never share their account, password, or MFA.

  10. Resource Limits. The ENMU System reserves the authority to establish computing
      resource limits of accounts. If resources are low, the account holder should notify the
      course instructor, ITS or the authorizing manager or department head, whoever or
      whichever is appropriate for that account.

  11. Protection of the System. Responsible continued use of the computer system
      requires that each user refrain from the development or use of programs or utilities
      that:

         (1) Harass or interfere with other System's computer users,

         (2) Infiltrate or modify the computer system or an account or

         (3) Damage the hardware or software components of the computer system or

         (4) Perform illegal activities.

      A. When requested, users shall cooperate with computer system administrators in
         investigations of abuse and report suspected abuse, especially any damage to or
         problems with the user's files.

      B. ITS reserves the right to identify and mitigate any vulnerabilities in Technology
         Resources connected to or owned by the System. These mitigations may be applied
         without prior notice to users, as necessary, to ensure the ongoing security and
         protection of System infrastructure.

  12. Rules. In addition to these policies and procedures, the System has various specific
      rules, regulations and procedures governing the use of computing equipment and
      facilities located around the System and posted in labs or readily available in printed
      form. Each computing site and environment has operators, consultants and/or
      supervisors who have the responsibility for the use of that site. Users shall abide by the
      rules, regulations and procedures of the System and the site and shall cooperate with
      the operators, consultants and supervisors.

  13. Consultation. Computer users are encouraged to consult with ITS regarding
      technology resource use. However, obtaining assistance in completing computer-
      related academic assignments is prohibited unless permission for consultation is given
      by the instructor.

  14. Recreational and Personal Use. Reasonable recreational and other personal uses are
      allowed, provided such use does not interfere with ENMU System official business use
      or illegal and/or against any other System policy.

  15. Sanctions. Failure to abide by this policy may subject any user to sanctions, such as
      denial of computer account privileges, and/or disciplinary action, which could lead to
      expulsion from the System, dismissal from a position or legal action.

                 Approved by Board of Regents, December 13, 2024.