Acceptable Uses of IT Infrastructure and Resources Policy Statement
There should be no expectation of privacy in the access and use of IT Resources. The University reserves the right to access, inspect, examine, monitor, intercept, remove, restrict, and take possession of all University-owned and managed IT Resources, including but not limited to, email, network connectivity, storage, printed material, data, software, printers, voice mail, fax machines or services, scanners, computers, mobile devices, telephone equipment, connected devices, laptops, and other files.
The University further reserves the right to examine, use, and disclose any data or content found on the University's IT Resources to further the health, safety, discipline, legal rights, security, or intellectual or other property of any User. Information that the University gathers from such permissible monitoring or examinations may also be used in disciplinary actions. Such information also may be disclosed to law enforcement officials.
The University may exercise these rights for various reasons, including but not limited to:
- Ascertaining whether Users are using the systems per the IT policies and other University guidelines;
- Preventing, investigating, or detecting unauthorized use of the University's IT Resources; and
- Ensuring compliance with applicable laws and regulations.
For the avoidance of doubt, the utilization of a password or other means of access control is to assure applicable confidentiality of University-related information and files and not the privacy of the User.
Users should note that the University also may require backup and caching of various portions of the IT Resources; logging of activity; monitoring of general usage; and other activities that are not directed against any individual User or User account, for protecting the University's IT Resources and systems, maintaining security and maintenance, or restoring normal operations of the IT Resources.