obli

ACCEPTABLE USE POLICY FOR IT RESOURCES


Section 1: Policy Statement Section 6. Appropriate Use
Section 2. Basic Standards Section 7. Tolerated Use
Section 3. Definitions Section 8. Enforcement Procedures
Section 4. Scope And Applicability Section 9. Waiver

 

Section 5. General Responsibilities

a. General Responsibilities of Users.

In general, users of the IT System must:

  1. use the IT System only for its intended purpose, and refrain from misusing or abusing it;
  2. maintain the integrity, reliability, availability, confidentiality and efficiency of computer-based information resources;
  3. refrain from seeking to gain unauthorized access or exceed authorized access;
  4. respect software copyright and licenses and other intellectual property rights;
  5. respect the rights of other computer users; and
  6. be aware that although computing and information technology providers throughout the university are charged with preserving the integrity and security of resources, security sometimes can be breached through actions beyond their control. Users are therefore urged to take appropriate precautions such as safeguarding their account and password, taking full advantage of file security mechanisms, backing up critical data and promptly reporting any misuse or violations of the policy.

Every member of the University community has an obligation to report suspected violations of the Acceptable Use Policy for Information Technology of the U.P. System or any of its units. Reports should be directed to the system and network administrators, Chairs, Deans, Chancellors or the President.

b. General Responsibilities Of System And Network Administrators

  1. System and network administrators and providers of University Information Technology resources have the additional responsibility of ensuring the integrity, confidentiality, and availability of the resources they are managing. Persons in these positions are granted significant trust to use their privileges appropriately for their intended purpose and only when required to maintain the system. Any private information seen in carrying out these duties must be treated in the strictest confidence, unless it relates to a violation or the security of the system.
  2. System and network administrators are expected to treat the contents of electronic files as private and confidential. Any inspection of electronic files, and any action based upon such inspection, will be governed by this Policy, other university rules and all applicable laws.

c. General Responsibilities Of University Administrators

  1. To be informed and knowledgeable about these policies
  2. To initiate systematic programs to inform academic and non-academic personnel of these policies

 

Section 4. Scope And Applicability TOC Section 6. Appropriate Use