1) Review of Disclosure Forms
The Office of Continuing Medical Education and the Course Director will review Disclosure of Commercial Support Forms submitted by potential continuing medical education (CME) activity faculty. The CME Office may request additional information from potential faculty.
2) Determination of Whether a Conflict of Interest Exists
On the basis of the information in the Disclosure of Commercial Support Form and any other relevant information provided by the faculty member, the CME Office, in consultation with the Course Director, and when necessary, the Associate Dean for CME and the CME Committee on Conflicts of Interest, will determine whether a conflict of interest exists. In making this determination, consideration will be given to all relevant factors and information, including but not limited to the nature of the CME activity, the magnitude of the financial interest and the degree to which it is related to the CME activity, the extent to which the interest could be directly affected by the CME activity, and the extent to which the CME activity may be affected by the interest.
3) Management and Resolution of Conflicts of Interest
If it is determined that a conflict of interest exists, the CME Office, in consultation with the Course Director, and when necessary, the Associate Dean for CME and the CME Committee on Conflicts of Interest, will make a decision regarding what conditions or restrictions will be imposed to resolve the conflict of interest. Prior to the recommendation of such conditions or restrictions, the faculty member will be given an opportunity to submit additional information. The faculty member will be encouraged to suggest measures designed to resolve the conflict.
To establish the basic policy of the University for the use, protection,
and preservation of computer-based information generated by, owned
by, or otherwise in the possession of the University, including
all academic, administrative, and research data ("University
This policy applies to all users of Boston University computer
facilities and to all University Information.
University Information is a vital asset of the University and
as such requires protection from unauthorized access, modification,
disclosure, or destruction.
Each unit of the University is responsible for identifying and
protecting all University Information within its area of control.
of each unit of the University is responsible for ensuring that
all employees in the unit understand and satisfy their obligation
to protect University Information. Management is also responsible
for developing and implementing such additional policies and procedures
as are necessary to implement fully this Policy. (Please see the
Boston University Information Security Management Guidelines.)
of Boston University computer facilities are responsible for complying
with this Policy and with any other applicable policies and procedures
pertaining to the protection of University Information, including
the Boston University Conditions of Use and Policy on Computing
Ethics and policies regarding disclosure of student or personnel
Non-compliance with this policy may lead to disciplinary action
by the University, including revocation of computer use privileges
and, in the case of employees, dismissal from the University.
Under certain circumstances, unauthorized access to or modification,
disclosure, or destruction of University Information may give
rise to civil and/or criminal liability. Any computer system which
fails to comply with security procedures described in the Boston
University Information Security Management Guidelines or for which
no specific procedures are published by the University may be
refused access to the Campus Network and may be deemed inappropriate
for storing or accessing University Information.
to All Users: Users of the University's computing facilities, including
University-supported electronic mail, are on notice, and by using
these facilities agree, that no representation has been made to
them as to the privacy of any communication or data stored on or
sent through these facilities; that the University has reserved
the rights set forth below and in the Boston University Information
Security Policy and Policy on Computing Ethics; and that the use
of these facilities is restricted to University-authorized purposes.
The use of the University's computing facilities in connection with
University activities and de minimis personal use is a privilege
extended to various members of the University community; it is not
a right. Users of the University's computing facilities are required
to comply with, and by using such facilities agree that they are
on notice of and agree to comply with, be subject to, and grant
the University the right to implement, the Boston University Information
Security Policy, the Policy on Computing Ethics and these Conditions
of Use. Users also agree to comply with applicable federal, state,
and local laws and to refrain from engaging in any activity that
is inconsistent with the University's tax-exempt status or that
would subject the University to liability. The University reserves
the right to amend these Conditions and Policies at any time without
prior notice and to take such further actions as may be necessary
or appropriate to comply with applicable federal, state, and local
To protect the integrity of the University's computing facilities
and its users against unauthorized or improper use of those facilities,
and to investigate possible use of those facilities in violation
of or in aid of violation of University rules and policies, Boston
University reserves the right, without notice, to limit or restrict
any individual's use, and to inspect, copy, remove or otherwise
alter any data, file, or system resource which may undermine the
authorized use of any computing facility or which is used in violation
of University rules or policies. Boston University also reserves
the right periodically to examine any system and any other rights
necessary to protect its computing facilities.
disclaims responsibility for loss of data or interference with
files resulting from its efforts to maintain the privacy and security
of those computing facilities or from system malfunction or any
other cause. As used herein and in the Policy on Computing Ethics
below, the term "computing facility" means, refers to,
and includes any and all forms of computer-related equipment,
tools, and intellectual property, including computer systems,
personal computers, computer networks, and all forms of software,
firmware, operating software, and application software, which
are owned or leased by the University or are under the University's
possession, custody, or control.
of users share the computing facilities at Boston University.
These facilities must be used responsibly by everyone, since misuse
by even a few individuals has the potential to disrupt University
business or the work of others. You are therefore required to
exercise responsible, ethical behavior when using the University's
computing facilities. This includes, but is not limited to, the
1. You must
use only those computer resources which you have been authorized
to use by the University. The unauthorized use of computer resources,
as well as the providing of false or misleading information for
the purpose of obtaining access to computing facilities, is prohibited
and may be regarded as a criminal act and treated accordingly
by the University. You must not use University computing facilities
to gain unauthorized access to computing facilities of other institutions,
organizations, or individuals.
2. You may
not authorize anyone to use your computer accounts for any reason.
You are responsible for all use of your accounts. You must take
all reasonable precautions, including password maintenance and
file protection measures, to prevent use of your account by unauthorized
persons. You must not, for example, share your password with anyone
else, and you should change your password regularly.
3. You must
use the University's computer resources only for the University-related
purposes for which they were authorized. As with all University
equipment, use of the computer facilities, including the Campus
Network, for private or commercial purposes is prohibited, except
as expressly authorized. You must not use the University's computer
resources for any unlawful purpose, such as the installation or
distribution of fraudulently or illegally obtained software. Use
of external networks connected to the University's networks must
comply with the policies of acceptable use promulgated by the
organizations responsible for those networks.
4. You must
not access, alter, copy, move or remove information, proprietary
software or other files (including programs, members of subroutine
libraries, data, and electronic mail) without prior authorization
from the appropriate University data trustee, security officer,
or other responsible party. You must not copy, distribute, display,
or disclose third-party proprietary software without prior authorization
from the licensor. Proprietary software must not be installed
on systems not properly licensed for its use.
5. You must
not use any computing facility irresponsibly or in a way that
might needlessly interfere with the work of others. This includes
transmitting or making accessible offensive, annoying, or harassing
material, or materials such as chain letters, unauthorized mass
mailings, or unsolicited advertising; intentionally, recklessly,
or negligently damaging any system, material, or information not
belonging to you; intentionally intercepting electronic communications
or otherwise violating the privacy of information not belonging
to or intended for you; intentionally misusing system resources
or making it possible for others to do so; or loading software
or data from untrustworthy sources, such as freeware, onto administrative
6. You are
encouraged to report any violation of these guidelines by another
individual and any information relating to a flaw in or bypass
of computing facility security to Information Technology, University
Information Systems, or the Office of Internal Audit.
or improper use of Boston University's computer facilities, including
the failure to comply with the above guidelines, constitutes a
violation of University policy and will subject the violator to
disciplinary and/or legal action by the University, and, in some
cases, criminal prosecution. In addition, the University may require
restitution for any use of service which is in violation of these
guidelines. Any questions about this policy or of the applicability
of this policy to a particular situation should be referred to
Information Technology, University Information Systems, or the
Office of Internal Audit.