Interim Policy on
Acceptable Use of Information Resources

General Principles

The Universityís computer systems and networks are shared resources used by many individuals to carry out the Universityís mission of teaching, research, and service.Use of these resources must be ethical, reflect academic honesty, respect the rights of other users, demonstrate respect for intellectual property and ownership of data, respect system security mechanisms, and promote an environment free from intimidation and harassment.


By using University computer systems and networks, users agree to abide by and comply with the applicable policies, procedures, and laws. All examples given below are illustrative. Application of this policy is not limited to the examples presented.


Users of computer systems and networks have the responsibility to:

The following are examples of uses that are unacceptable:


When it is determined that a system is being used in a way that appears not to comply with University policy, the system or user account may be temporarily removed from the network. When feasible, the owner or user of the system should be informed of the reason the computer was removed from the network and the name of the organization that removed it. It is the userís responsibility to contact the organization and work collaboratively with that organization to resolve the problem.


If the problem cannot be resolved, the Vice President with responsibility for the person whose system was removed from the network will determine the proper resolution.Appeals to the Vice Presidentís decision will be handled through normal administrative channels.Grievances shall be handled by the standard University grievance procedures. In case the grievance procedure requires an appeal to the Vice President who made the original decision, the Provost will handle the appeal.If the original decision was made by the Provost, the Vice President for Administrative Affairs will handle the appeal.


The University considers any violation of these General Principles to be a serious offense.  Further, the University reserves the right to copy, monitor, and/or examine any files or information residing on University systems, networks, or computing resources related to the alleged unacceptable use and to protect its systems and networks from events or behaviors that threaten or degrade operations, and where an applicable Legal Hold notice is initiated, and/or the Office of Legal Counsel otherwise directs such action.Violators are subject to disciplinary action including, but not limited to, those outlined in the Student Code, Staff Handbook, Faculty Handbook and applicable laws.