Skip to main content

HR-518 Computer Utilization

Summary

Utilization of University computer networks, equipment, and connecting resources are restricted. This policy applies to all users including faculty, staff, students and their guests.

Guidelines

Users of University computer resources have the responsibility to respect intellectual property rights of authors, contributors and publishers in all media and to protect user ID, password and system from unauthorized use. They must also adhere to the terms of software licenses and other contracts and to other University and data access policies.

Inspection

All information technology resources, including computer networks, equipment and connected resources, provided by the University are the property of the University.  The University values the principles of academic freedom and privacy and does not condone casual inspection of the information contained within or transmitted via these resources.  However, electronic information on University networks or equipment, including but not limited to electronic mail and personal information is subject to examination by the University, inlcuding, but not limited to the following circumstances:

  • If it is necessary to maintain or improve the functioning of University computing resources.
  • If there is a suspicion of misconduct under University policies, or suspicion of violation of federal or state law.
  • If it is necessary to comply with or verify compliance with federal or state law, including e-discovery procedures.
  • If it will serve a legitimate business need of the University.
Prohibited Use

Unauthorized or excessive personal use is prohibited if it overburdens a network, results in substantial use of system capacity or otherwise subjects the institution to increased costs or risks. Employees may be subject to discipline for unauthorized or excessive personal use of computer resources. Other prohibited uses include interference with the proper functioning of the University's information technology resources, interference with the ability of others to use University computer resources, any attempt to gain unauthorized access to the computer system or files of another, infringement on the intellectual property rights of others, or the use of University computer resources for personal profit, except as permitted by HR 507 Conflict of Interest.

Enforcement

Employees in violation of this policy will be denied access to University information technology resources and may be subject to disciplinary action.

See Also

HR 507 Conflict of Interest

Date Created: 11/01/2001

Last Updated: 8/22/2010

Reviewed 2019-08-12