Faculty, Staff, Students and Guests have an obligation to exercise safe, responsible, ethical behavior when using the University's computers, information, networks and resources, and must abide by University policies, local, state, and federal laws.
View the Code of Ethics for Computing & Communications
This is an official agreement that each student undertakes when registering for/connecting to ResNet service.
View the ResNet Acceptable Use Policy
Time parameters for backups for various IT systems.
View Backup & Retention Policy
EKU adheres to the federal guidelines concerning student privacy. The Family Educational Rights and Privacy Act (FERPA) affords students certain rights to privacy with respect to educational records. EKU adheres to this guideline and prohibits inappropriate use of student information.
Visit the official government site for information regarding FERPA
All copyrighted information, such as text, recordings, and images, retrieved from electronic resources or stored, transmitted or maintained with electronic resources, must be used in conformance with applicable copyright and other laws. Copied material, used legally, must be properly attributed in conformance with applicable legal and professional standards. While peer-to-peer usage can provide a beneficial file sharing service, it also provides an opportunity for abuse, infringements and virus transmission, as there is no filtering of this sort of data transmission. EKU strictly prohibits any form of copyright infringements, including illegal media downloads, plagiarism, bootlegging, or any other illegal use of materials.
Illegal downloads are often detected and reported by the movie and recording industries, and IT Security are notified so these incidents can be managed appropriately, including disciplinary and/or legal actions. EKU is required by Federal Law to respond to notifications of copyright violations on its networks. Offenses such as illegal use of peer-to-peer will result in consultations with university officials, and may result in disciplinary actions, up to and including suspension or termination of network privileges, expulsion, or dismissal. In addition, the names of the violators will be referred to the appropriate authorities for criminal or civil prosecution.
Per the EKU Code of Ethics for Computing and Communications and Federal Laws regarding copyright infringements, all copyrighted information retrieved via electronic sources within EKU networks must be used in conformance with applicable copyright protection laws. See U.S. Copyright laws.
Employees are required to change network passwords every 90-days. The use of "Strong" passwords and passphrases is encouraged. Sharing passwords is not permitted, and can be grounds for disciplinary actions.
Password & Accounts: Employees
Password & Accounts: Students
To develop and foster a university-wide culture of technology accessibility, focusing on a proactive approach, rather than ad hoc responses to immediate needs. To identify best practices and opportunities to implement them in support of all individuals who use technology. The Technology Accessibility Council will assess the university’s regulatory compliance with ADA, as well as other legal requirements, as it relates to technology and provide direction and oversight to ensure compliance and a proactive culture of technology accessibility.
View Accessibility Website
HR processing of the Position Action Form (PAF) indicating employee separation will result in termination of security codes, e-mail accounts, and any additional Information Technology accounts.
View Employee Separation from Employment
Faculty and Staff are required to follow proper policy and procedures when sending campus-wide communications.