Policies

Special Services
To request reasonable accommodations for disabilities, please notify the Office of Continuing Medical Education, in writing, at least two weeks prior to the start of the conference.

Dietary Needs
The Office of Continuing Medical Education will work to accommodate dietary requests (including, but not limited to: kosher, vegetarian, low-cholesterol, and low-sodium meals) received, in writing, at least two weeks prior to the start of the conference.

Substitution/Cancellations
Substitutions may be made at any time without an additional charge. Refunds will be issued for all cancellations received two weeks prior to the start of the conference. Should cancellation occur less than two weeks prior, a credit towards another course will be issued, not a refund. An administrative fee will be charged for all refunds and credits. (Administrative fees vary based on conference. Please see specific conference registration page for correct fee.) “No shows” are subject to the full conference fee. Cancellations/substitutions must be made IN WRITING. No refunds or credits will be issued once the conference has started. This conference is subject to change and/or cancellation.

Disclosure Policy
It is the policy of Boston University School of Medicine Office of Continuing Medical Education, that faculty disclose to program participants any real or apparent conflict of interest. In addition, faculty are asked to disclose any discussion pertaining to the unapproved use of pharmaceuticals and devices.

 


Privacy and Confidentiality Policy

The Office of Continuing Medical Education adheres to Boston University’s Information Security Policy and the Conditions of Use and Policy on Computing Ethics.

Data gathered from participants who subscribe to Boston University School of Medicine’s (BUSM) Continuing Medical Education (CME) e-mail listserv or who participate in BUSM CME Internet-Based CME program is confidential.

Individual identifiable information is not shared with outside parties. Cumulative data may be analyzed by CME personnel, and upon occasion, by individuals external to BUSM CME, in order to determine trends.

 


Boston University Information Security Policy

Purpose
To establish the basic policy of the University for the use, protection, and preservation of computer-based information generated by, owned by, or otherwise in the possession of the University, including all academic, administrative, and research data (“University Information”).

Applicability
This policy applies to all users of Boston University computer facilities and to all University Information.

Policy
University Information is a vital asset of the University and as such requires protection from unauthorized access, modification, disclosure, or destruction.

Responsibilities
Each unit of the University is responsible for identifying and protecting all University Information within its area of control.

Management of each unit of the University is responsible for ensuring that all employees in the unit understand and satisfy their obligation to protect University Information. Management is also responsible for developing and implementing such additional policies and procedures as are necessary to implement fully this Policy. (Please see the Boston University Information Security Management Guidelines.)

All users of Boston University computer facilities are responsible for complying with this Policy and with any other applicable policies and procedures pertaining to the protection of University Information, including the Boston University Conditions of Use and Policy on Computing Ethics and policies regarding disclosure of student or personnel records.

Compliance
Non-compliance with this policy may lead to disciplinary action by the University, including revocation of computer use privileges and, in the case of employees, dismissal from the University. Under certain circumstances, unauthorized access to or modification, disclosure, or destruction of University Information may give rise to civil and/or criminal liability. Any computer system which fails to comply with security procedures described in the Boston University Information Security Management Guidelines or for which no specific procedures are published by the University may be refused access to the Campus Network and may be deemed inappropriate for storing or accessing University Information.

 


Conditions of Use and Policy on Computing Ethics (January 1997)

Notice to All Users: Users of the University’s computing facilities, including University-supported electronic mail, are on notice, and by using these facilities agree, that no representation has been made to them as to the privacy of any communication or data stored on or sent through these facilities; that the University has reserved the rights set forth below and in the Boston University Information Security Policy and Policy on Computing Ethics; and that the use of these facilities is restricted to University-authorized purposes.

The use of the University’s computing facilities in connection with University activities and de minimis personal use is a privilege extended to various members of the University community; it is not a right. Users of the University’s computing facilities are required to comply with, and by using such facilities agree that they are on notice of and agree to comply with, be subject to, and grant the University the right to implement, the Boston University Information Security Policy, the Policy on Computing Ethics and these Conditions of Use. Users also agree to comply with applicable federal, state, and local laws and to refrain from engaging in any activity that is inconsistent with the University’s tax-exempt status or that would subject the University to liability. The University reserves the right to amend these Conditions and Policies at any time without prior notice and to take such further actions as may be necessary or appropriate to comply with applicable federal, state, and local laws.

To protect the integrity of the University’s computing facilities and its users against unauthorized or improper use of those facilities, and to investigate possible use of those facilities in violation of or in aid of violation of University rules and policies, Boston University reserves the right, without notice, to limit or restrict any individual’s use, and to inspect, copy, remove or otherwise alter any data, file, or system resource which may undermine the authorized use of any computing facility or which is used in violation of University rules or policies. Boston University also reserves the right periodically to examine any system and any other rights necessary to protect its computing facilities.

The University disclaims responsibility for loss of data or interference with files resulting from its efforts to maintain the privacy and security of those computing facilities or from system malfunction or any other cause. As used herein and in the Policy on Computing Ethics below, the term “computing facility” means, refers to, and includes any and all forms of computer-related equipment, tools, and intellectual property, including computer systems, personal computers, computer networks, and all forms of software, firmware, operating software, and application software, which are owned or leased by the University or are under the University’s possession, custody, or control.

Thousands of users share the computing facilities at Boston University. These facilities must be used responsibly by everyone, since misuse by even a few individuals has the potential to disrupt University business or the work of others. You are therefore required to exercise responsible, ethical behavior when using the University’s computing facilities. This includes, but is not limited to, the following:

You must use only those computer resources which you have been authorized to use by the University. The unauthorized use of computer resources, as well as the providing of false or misleading information for the purpose of obtaining access to computing facilities, is prohibited and may be regarded as a criminal act and treated accordingly by the University. You must not use University computing facilities to gain unauthorized access to computing facilities of other institutions, organizations, or individuals.

  1. You may not authorize anyone to use your computer accounts for any reason. You are responsible for all use of your accounts. You must take all reasonable precautions, including password maintenance and file protection measures, to prevent use of your account by unauthorized persons. You must not, for example, share your password with anyone else, and you should change your password regularly.
  2. You must use the University’s computer resources only for the University-related purposes for which they were authorized. As with all University equipment, use of the computer facilities, including the Campus Network, for private or commercial purposes is prohibited, except as expressly authorized. You must not use the University’s computer resources for any unlawful purpose, such as the installation or distribution of fraudulently or illegally obtained software. Use of external networks connected to the University’s networks must comply with the policies of acceptable use promulgated by the organizations responsible for those networks.
  3. You must not access, alter, copy, move or remove information, proprietary software or other files (including programs, members of subroutine libraries, data, and electronic mail) without prior authorization from the appropriate University data trustee, security officer, or other responsible party. You must not copy, distribute, display, or disclose third-party proprietary software without prior authorization from the licensor. Proprietary software must not be installed on systems not properly licensed for its use.
  4. You must not use any computing facility irresponsibly or in a way that might needlessly interfere with the work of others. This includes transmitting or making accessible offensive, annoying, or harassing material, or materials such as chain letters, unauthorized mass mailings, or unsolicited advertising; intentionally, recklessly, or negligently damaging any system, material, or information not belonging to you; intentionally intercepting electronic communications or otherwise violating the privacy of information not belonging to or intended for you; intentionally misusing system resources or making it possible for others to do so; or loading software or data from untrustworthy sources, such as freeware, onto administrative systems.
  5. You are encouraged to report any violation of these guidelines by another individual and any information relating to a flaw in or bypass of computing facility security to Information Technology, University Information Systems, or the Office of Internal Audit.

The unauthorized or improper use of Boston University’s computer facilities, including the failure to comply with the above guidelines, constitutes a violation of University policy and will subject the violator to disciplinary and/or legal action by the University, and, in some cases, criminal prosecution. In addition, the University may require restitution for any use of service which is in violation of these guidelines. Any questions about this policy or of the applicability of this policy to a particular situation should be referred to Information Technology, University Information Systems, or the Office of Internal Audit.