Privacy

There should be no expectation of privacy in the access and use of IT Resources.  

The University reserves the right to access, inspect, examine, monitor, intercept, remove, restrict, and take possession of all University-owned and managed IT Resources, including but not limited to email, network connectivity, storage, printed material, printers, voice mail, fax machines or services, scanners, computers, mobile devices, telephone equipment, connected devices, and other files. 

The University further reserves the right to examine, use, and disclose any data or content found on the University's IT Resources to further the health, safety, discipline, legal rights, security, IP, or other property of any User. Information that the University gathers from permissible monitoring or examinations may also be used in disciplinary actions. Such information also may be disclosed to law enforcement officials or other third parties. 

Users should note that the University also may require backup and caching of various portions of IT Resources, logging of activity, monitoring of general usage, and other activities that are not directed against any individual User or a User account for protecting the University's IT Resources and systems, maintaining security and maintenance, or restoring normal operations of IT Resources. 

The University may exercise these rights for various reasons, including but not limited to the following: 

  • Ascertaining whether Users are following IT policies and University guidelines when using IT Resources; 
  • Preventing, investigating, or detecting unauthorized use of the University's IT Resources;  
  • Accessing a User's personal mobile device in the event of litigation (User will be required to cooperate with the University in providing access to the device for that purpose), and 
  • Ensuring the University's compliance with applicable laws and regulations. 

Sections in Acceptable Uses of IT Infrastructure and Resources Policy

  1. User Responsibilities and Statement of Prohibited Uses
  2. Intellectual Property
  3. Privacy
  4. Monitoring, Reporting, Violations, and Sanctions
  5. User Obligation to Review
  6. Implementation Information and Revision History

Need Help?


Walk-In Centers

McShane Center 266 | RH
Leon Lowenstein SL18 | LC

View Our Walk-In Hours