Summary
Utilization of University computer networks, equipment, and connecting resources are restricted. This policy applies to all users including faculty, staff, students and their guests.
Guidelines
Users of University computer resources have the responsibility to respect intellectual property rights of authors, contributors and publishers in all media and to protect user ID, password and system from unauthorized use. They must also adhere to the terms of software licenses and other contracts and to other University and data access policies.
Inspection
All information technology resources, including computer networks, equipment and connected resources, provided by the University are the property of the University. The University values the principles of academic freedom and privacy and does not condone casual inspection of the information contained within or transmitted via these resources. However, electronic information on University networks or equipment, including but not limited to electronic mail and personal information is subject to examination by the University, inlcuding, but not limited to the following circumstances:
- If it is necessary to maintain or improve the functioning of University computing resources.
- If there is a suspicion of misconduct under University policies, or suspicion of violation of federal or state law.
- If it is necessary to comply with or verify compliance with federal or state law, including e-discovery procedures.
- If it will serve a legitimate business need of the University.
Prohibited Use
Unauthorized or excessive personal use is prohibited if it overburdens a network, results in substantial use of system capacity or otherwise subjects the institution to increased costs or risks. Employees may be subject to discipline for unauthorized or excessive personal use of computer resources. Other prohibited uses include interference with the proper functioning of the University's information technology resources, interference with the ability of others to use University computer resources, any attempt to gain unauthorized access to the computer system or files of another, infringement on the intellectual property rights of others, or the use of University computer resources for personal profit, except as permitted by HR 507 Conflict of Interest.
Enforcement
Employees in violation of this policy will be denied access to University information technology resources and may be subject to disciplinary action.
See Also
Date Created: 11/01/2001
Last Updated: 8/22/2010
Reviewed 2019-08-12