The purpose of this policy is to define hosting rules for content distribution on the University’s IT Resources by Users or authorized third parties.
This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
- Hosting of content distribution sites for entities other than University units, University affiliates, or registered student organizations (e.g., professional associations, consortiums, or journals) may be provided on University-managed servers only when the entity has a relationship with the University that supports the University’s teaching, research, or service mission.
- Such a relationship may be demonstrated when the University has or enters into an authorized contractual relationship for hosting the entity’s site.
Hosting is providing network access to a site, or network accessible location, which provides distribution of content.
IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
Related Policies and Procedures
|Responsible Person:||Director, IT Risk and Data Integrity|
|Approved By:||Office of Legal Counsel|
|Approval Date:||May 13, 2019|
|1.0||While this policy is “new,” this policy was formerly in the IT Policy: Acceptable Uses of IT Infrastructure and Resources. Prior revisions to this policy found in that document.|
|1.1||05/13/2019||Updated policy statement|
Policy Disclaimer Statement
Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.