Usage of the University's information technology systems and resources is a privilege granted to University students, faculty and staff, to support its educational mission. Computer accounts are assigned to individuals for University-related purposes. Passwords and account access may not be shared. Passwords are the frontline of protection for all user accounts. Persons using University information technology resources must safeguard their passwords. Select ‘secure’ passwords using letter, number and symbol combinations that cannot easily be ‘cracked’ by automated tools.
All users of the University’s computer network must maintain the integrity of the information technology systems. Any user who detects a possible security concern on any University system or network must report it immediately to the IT system administrators. The University reserves the right to audit, inspect, limit, revoke or refuse to extend IT privileges or access to its computer systems and electronic resources, at any time, in its sole discretion.
(i) Internet Content
The University does not control information available over the Internet and is not responsible for Internet content. Internet users should be aware that even sites accessed for legitimate educational or research purposes may contain offensive material. Workstations in open-access facilities, such as the University Computer Labs, shall be used in a fashion that is not offensive to the University community or violative of local, state or federal law.
(ii) Personal Use
The University is a non-profit, tax-exempt organization. As such, it is subject to federal and state laws that restrict the use of University property for matters unrelated to its Charter mission. As a recipient of state and federal funds, additional restrictions apply. To ensure compliance with applicable law and University policy, the use of the University’s information technology resources for political, commercial, union or private purposes, is prohibited.
(iii) Physical Security
All computers, data storage media and storage repositories that contain confidential information must be secured against loss or tampering. Portable computing devices such as laptops, hand-held equipment (PDAs) and data storage media pose a unique and significant risk for exposure of protected information and potential access to the University’s administrative systems. For these reasons, special care must be taken with these devices. The login should never be set for automated login, and all protected data stored on any portable device must be encrypted. Store all such devices in a secure location.