Policies & Procedures

Technology Acceptable Use Policy

Daniel Morgan Graduate School provides access to computer systems and networks in order to further the student educational experience. Use of these systems and networks comes with certain responsibilities and obligations, and is subject to all applicable institutional policies, and local, state, and federal laws.

Students are expected to use these resources ethically, considerately, and show restraint in the consumption of shared resources. This also requires the respect of intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy.


All students are expected to follow the below guidelines for acceptable use of DMGS technology resources:

  • Resources will only be used for intended or authorized purposes.
  • Do no share assigned username or other systems/technology you alone are authorized to utilize. You are responsible for all activities tied to your username or system/technology access.
  • Access only information that is your own, that is publicly available, or to which you have been given authorized access.
  • Use only legal, properly licensed, versions of copyrighted software.
  • Refrain from monopolizing systems, overloading networks with excessive data, degrading services, or wasting computer time, connect time, disk space, printer paper, manuals, or other resources.

DMGS considers any violation of acceptable use principles or guidelines to be a serious offense and reserves the right to copy and examine any files or information resident on institutional systems related to unacceptable use, and to protect its network from systems and events that threaten or degrade operations. Offenders also may be prosecuted under laws including (but not limited to) the Communications Act of 1934 (amended), the Family Educational Rights and Privacy Act of 1974, the Computer Fraud and Abuse Act of 1986, The Computer Virus Eradication Act of 1989, Interstate Transportation of Stolen Property, The Virginia Computer Crimes Act, and the Electronic Communications Privacy Act.