IT Policies
There are four University policies relating to appropriate use of the University’s computing facilities and services.
- The Computer Use Policy defines the acceptable use of the University's computing facilities and provides a framework for consistency in computer use procedures and regulations across campus.
- The Electronic Mail (e-mail) Policy defines the acceptable use of electronic mail (e-mail) at the University, outlines responsibilities involving e-mail for both users and service providers, and gives some helpful guidelines for effective practices and processes.
- The Data Management, Data Access and Data Use Policy provides a common basis of understanding of institutional data as a business-critical University resource, and outlines responsibilities associated with use of institutional data and its management by all members of the University community.
- The purpose of the Copyright Compliance - Software Licenses Policy is to ensure that both users and service providers are in compliance with copyright law with respect to software licenses.
Appropriate Use of University Computing Facilities
As a member of the University community, it is your responsibility to obey all laws, University policies, regulations and guidelines regarding use of University computing facilities and services.
Among other things, this means you must:
- Only use computing facilities for bona fide educational purposes, for purposes for which you have been authorized, and in support of University goals and objectives. Other uses, such as conducting commerce not authorized by the University, are not permitted.
- Use the facilities in a responsible manner. Do not waste resources, and do not purposefully consume resources with the purpose of denying or restricting resources to others.
Abide by the security measures and restrictions in place. Do not attempt to circumvent security measures. For example, do not share your account or give your password to anyone else unless you have permission from the computer's custodian or system manager. - Respect the copyrights of authors and software developers.
Refrain from using University computing facilities in a threatening, discriminatory, harassing, or obscene manner. - Respect the policies of external networks and remote sites. Use only facilities for which you have been authorized.
- Respect the privacy of other users. Just because you can read someone's files does not mean that they were intended for you or that you have permission to do so.
- Provide proper and correct sender identification in all electronic correspondence within and leaving University facilities.
- Report violations of this policy and possible security lapses to the appropriate laboratory or system manager, department head or dean, so that security of University computing facilities can be maintained.