Regulations & Policies
Information Technology Services
Network Acceptable Use |
||
Number: | 15.0010P |
Policy Status:
Major Revision Responsible Division/Department: Administration & Finance / Office of the CIO/ Information Technology Services |
Effective Date: | 07/01/97 | |
Revised Date: | 04/27/17 |
I. OBJECTIVE & PURPOSE
In keeping with the spirit of free intellectual inquiry that is fundamental to our mission, the principles of academic freedom and individual privacy will be respected by the University as outlined in this policy. In turn, all users of the University's computing and information technology resources are expected to demonstrate the highest respect for the rights of others in their use of these resources. Access to and use of these resources and services are privileges. These privileges may be limited or revoked by the President or his designee if an individual violates University policies or state or federal laws.
This policy outlines the standards for acceptable use of University computing and information technology resources that include, but are not limited to, equipment, software, networks, data and telecommunications equipment whether owned, leased or otherwise provided by 成人AV视频. This policy reflects the University's commitment to information technology as a strategic resource. All users are expected to familiarize themselves with the contents of this policy.
II. STATEMENT OF POLICY
Computing, networking, telecommunications, and all other information technology resources of the 成人AV视频 are available and intended to advance the education, research, administration and public service mission of the University. Accordingly, the University encourages and promotes the use of these resources by the University community, within institutional priorities and financial capabilities. Access to and use of these resources and services are privileges which must be accepted in strict compliance with all applicable laws and regulations and with the highest standards of ethical behavior.
This policy applies to all persons accessing and using computing, networking, telecommunications, and other information technology resources through any facility of the University. Such resources include mobile devices, computer and network systems, hardware, software, databases, support personnel and services, physical facilities and data communications systems and services.
III. STATEMENT OF PROCEDURES
Access to computing and information technology granted by the University to an individual is solely for the grantee's own use. User access privileges must not be transferred or shared, except as expressly authorized by an appropriate University official.
All users of computing, networking, telecommunications, and other information technology resources of the University are required to:
- Comply with Florida's public records law and state records retention schedules for public records, including electronic mail.
- Comply with legally required disclosures (e.g., pursuant to a lawfully issued subpoena or search warrant, discovery request) and cooperate in University investigations, as well as collaborative investigations with outside entities, and in access necessary for repairs, maintenance, and monitoring of University facilities.
- Comply with all applicable federal, state, and local laws and regulations, including, but not limited to copyright, trademark and licensing laws, the Florida Computer Crimes Act (Chapter 815, F.S.), state obscenity laws (Chapter 847, F.S.), and all Florida Board of Governors and University rules, policies, and procedures. Existing University policies applicable to standards of behavior (such as code of conduct, ethics, sexual harassment, disruptive behavior, academic integrity, use of facilities, etc.) are incorporated in this policy by reference.
- Comply with applicable U.S. export control and sanctions regulations, including but not limited to those governing the export and re-export of hardware, software and technical data. In addition, travel with any University equipment to a U.S. embargoed country is prohibited unless otherwise authorized by applicable regulations and written approval is obtained. (Embargoed country list: )
- Protect the confidentiality, accuracy and integrity of institutional data (such as, but not limited to, student education records) which are subject to federal and state confidentiality laws.
- Protect the integrity of passwords. Computer accounts, passwords, access codes, and other authorizations are assigned to individual users. It is a violation of this policy to use another's account, password, access code, or other such authorization, to permit access by unauthorized users, or to otherwise misrepresent one's identity in accessing or using any information technology resource of the University.
- The University employs passwords for the proper administration of its facilities only, and the requirement and use of a password should not give the user an expectation of privacy as to any information on a University system or facility.