Skip to main content

Acceptable Uses of IT Infrastructure and Resources

3. Privacy

3. Privacy

The University reserves the right to access, inspect, examine, monitor, intercept, remove, restrict, and take possession of all University owned and operated IT Resources, including but not limited to, electronic mail network connectivity, hard disks, printed media, devices, data, software, printers, voice mail, removable media, fax machines, scanners, computers, mobile devices, telephony equipment, connected devices, laptops, documents, and other files.

The University also reserves the right to access, inspect, examine, monitor, intercept, remove and restrict use and access to the IT Resources indicated above.

The University may exercise these rights for various reasons, including but not limited to:

  • Ascertaining whether Users are using the systems in accordance with the IT Policy and other university guidelines;
  • Preventing, investigating, or detecting unauthorized use of the University’s systems;
  • Ensuring compliance with applicable laws and regulations.

Users are expected and obligated to use such IT resources in a manner consistent with the purposes, objectives, and mission of the University and this policy.

Except where applicable law provides otherwise, Users should have no expectation of a reasonable level of privacy while accessing or using University’s IT Resources. For example, issuance of a password or other means of access is to assure appropriate confidentiality of University-related information and files. However, it does not guarantee privacy, especially for personal or unlawful use of IT Resources.

Users should note that the University may also require back-up and caching of various portions of the IT Resources; logging of activity; monitoring of general usage; and other activities that are not directed against any individual User or User account, for protecting the University’s IT Resources and systems, maintaining security and maintenance, or restoring normal operations of the IT Resources.

The University reserves the right to examine, use, and disclose any data or Content found on the University’s IT Resources for the purposes of furthering the health, safety, discipline, legal rights, security, or intellectual or other property of any User or other person or entity. Information that the University gathers from such permissible monitoring or examinations may also be used in disciplinary actions. Such information may be disclosed to law enforcement officials when necessary.

Users are responsible for the security of their own User IDs and passwords. Passwords must not be shared with other persons.