Use of Software

  1. It is contrary to Converse University’s acceptable use policy to violate the Federal Copyright Law (www.loc.gov/copyright) by downloading copyrighted audio, video, graphics, or text materials from the Internet without proof of proper licensing arrangements.
  2. Converse University has licensed copies of computer software from a variety of publishers. Licensed and registered copies of software programs have been placed on computers within the organization, and appropriate backup copies made in accordance with the licensing agreements. No other copies of this software or its documentation may be made without the express written consent of the software publisher.
  3. Converse University will provide copies of legally acquired software to meet all legitimate needs in a timely fashion and in sufficient quantities for all of our computers. The use of software obtained from any other source could present security and legal threats to the University, and such use is strictly prohibited.
  4. In some cases, the license agreements for a particular software program may permit an additional copy to be placed on a portable computer or home computer for business purposes. Employees shall not make such additional copies of software or documentation for the software without the approval of the University’s Campus Technology Department.
  5. The unauthorized duplication of copyrighted software or documentation is a violation of the law and is contrary to established standards of conduct for Converse University employees. Employees who make, acquire, or use unauthorized copies of computer software or documentation may be subject to discipline, up to and including immediate termination of employment.
  6. Converse University reserves the right to protect its reputation and its investment in computer software by enforcing strong internal controls to prevent the making or use of unauthorized copies of software. These controls may include frequent and periodic assessments of software use; announced and unannounced audits of University computers to assure compliance; the removal of any software found on the University’s property for which a valid license or proof of license cannot be determined; and disciplinary action including termination in the event of employee violation of this guideline.