Regulations Governing the Misuse of Electronic Resources
National Taiwan Ocean University Regulations Governing the Misuse of Electronic Resources
Ratified by the sixth Executive Council meeting of the first semester of the 2007-2008 academic year on January 17, 2008
Amended by the Library & IT Committee in the first semester of the 2008-2009 academic year on December 19, 2008
Ratified by the first Executive Council meeting of the second semester of the 2008-2009 academic year on February 12, 2009
I. | These Regulations were established by the Office of Library and Information Technology at NTOU to promote the proper use of electronic resources (including databases, e-books, and electronic periodicals) among all faculty members, staff members, and students (including part-time teachers and contract workers). | |||
II. | The definition of "misuse" is based on the terms of user agreements with electronic resource vendors and the Instructions for Use of Electronic Resources at National Taiwan Ocean University. In the event of misuse as notified by electronic resource vendors or as discovered within the campus network (including proxy servers), measures will be taken in accordance with these Regulations. | |||
III. | Instances of handling misuse are as follows: | |||
1. | The IP address and other information of the violator are confirmed. | |||
2. | The motives, purpose, and downloading conditions of the violator are discerned. | |||
3. | The violator is instructed on the proper use of electronic resources and is further required to write a letter of apology confirming that he/she understands his/her violation and that he/she will not display similar behavior in the future. | |||
IV. | The outline of the letter of apology shall be as follows: | |||
1. | Identification of violator: | |||
(1) | If the violator can be identified, he/she shall write the letter of apology. | |||
(2) | In the event that the violator cannot be identified, the head or highest director of the department or office involved shall write a notice emphasizing proper use of electronic resources. | |||
2. | Mandatory contents | |||
(1) | The violator must include in the letter his/her name, student ID number, department, contact information (including the extension to the associated laboratory, cell phone number, and e-mail address), a detailed account of the misuse (including the date, the times at which the misuse began/ended, the purpose of the misuse, the name of the database they downloaded from, the quantity, the means of improper downloading, and their actions subsequent to the downloading), and a statement and guarantee that he/she will not display similar behavior in the future. | |||
(2) | In the event that the violator cannot be identified, the letter written by the department head shall include his/her name and position, the name of the department, contact information, the reasons why the violator could not be identified, and a statement and guarantee that he/she will reinforce education and supervision on the proper use of electronic resources in his/her department or office. | |||
V. | The Executive Council shall ratify, promulgate, and implement these Regulations. |